Matching Items (340)
Filtering by

Clear all filters

153265-Thumbnail Image.png
Description
Corporations invest considerable resources to create, preserve and analyze

their data; yet while organizations are interested in protecting against

unauthorized data transfer, there lacks a comprehensive metric to discriminate

what data are at risk of leaking.

This thesis motivates the need for a quantitative leakage risk metric, and

provides a risk assessment system,

Corporations invest considerable resources to create, preserve and analyze

their data; yet while organizations are interested in protecting against

unauthorized data transfer, there lacks a comprehensive metric to discriminate

what data are at risk of leaking.

This thesis motivates the need for a quantitative leakage risk metric, and

provides a risk assessment system, called Whispers, for computing it. Using

unsupervised machine learning techniques, Whispers uncovers themes in an

organization's document corpus, including previously unknown or unclassified

data. Then, by correlating the document with its authors, Whispers can

identify which data are easier to contain, and conversely which are at risk.

Using the Enron email database, Whispers constructs a social network segmented

by topic themes. This graph uncovers communication channels within the

organization. Using this social network, Whispers determines the risk of each

topic by measuring the rate at which simulated leaks are not detected. For the

Enron set, Whispers identified 18 separate topic themes between January 1999

and December 2000. The highest risk data emanated from the legal department

with a leakage risk as high as 60%.
ContributorsWright, Jeremy (Author) / Syrotiuk, Violet (Thesis advisor) / Davulcu, Hasan (Committee member) / Yau, Stephen (Committee member) / Arizona State University (Publisher)
Created2014
150382-Thumbnail Image.png
Description
This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate

This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate between each two users. The whole trust checking process is divided into two steps: local checking and remote checking. Local checking directly contacts the email server to calculate the trust rate based on user's own email communication history. Remote checking is a distributed computing process to get help from user's social network friends and built the trust rate together. The email-based trust model is built upon a cloud computing framework called MobiCloud. Inside MobiCloud, each user occupies a virtual machine which can directly communicate with others. Based on this feature, the distributed trust model is implemented as a combination of local analysis and remote analysis in the cloud. Experiment results show that the trust evaluation model can give accurate trust rate even in a small scale social network which does not have lots of social connections. With this trust model, the security in both social network services and email communication could be improved.
ContributorsZhong, Yunji (Author) / Huang, Dijiang (Thesis advisor) / Dasgupta, Partha (Committee member) / Syrotiuk, Violet (Committee member) / Arizona State University (Publisher)
Created2011
154172-Thumbnail Image.png
Description
Due to the shortcomings of modern Mobile Device Management solutions, businesses

have begun to incorporate forensics to analyze their mobile devices and respond

to any incidents of malicious activity in order to protect their sensitive data. Current

forensic tools, however, can only look a static image of the device being examined,

making it difficult

Due to the shortcomings of modern Mobile Device Management solutions, businesses

have begun to incorporate forensics to analyze their mobile devices and respond

to any incidents of malicious activity in order to protect their sensitive data. Current

forensic tools, however, can only look a static image of the device being examined,

making it difficult for a forensic analyst to produce conclusive results regarding the

integrity of any sensitive data on the device. This research thesis expands on the

use of forensics to secure data by implementing an agent on a mobile device that can

continually collect information regarding the state of the device. This information is

then sent to a separate server in the form of log files to be analyzed using a specialized

tool. The analysis tool is able to look at the data collected from the device over time

and perform specific calculations, according to the user's specifications, highlighting

any correlations or anomalies among the data which might be considered suspicious

to a forensic analyst. The contribution of this paper is both an in-depth explanation

on the implementation of an iOS application to be used to improve the mobile forensics

process as well as a proof-of-concept experiment showing how evidence collected

over time can be used to improve the accuracy of a forensic analysis.
ContributorsWhitaker, Jeremy (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Yau, Stephen (Committee member) / Arizona State University (Publisher)
Created2015
157413-Thumbnail Image.png
Description
Rapid growth of internet and connected devices ranging from cloud systems to internet of things have raised critical concerns for securing these systems. In the recent past, security attacks on different kinds of devices have evolved in terms of complexity and diversity. One of the challenges is establishing secure communication

Rapid growth of internet and connected devices ranging from cloud systems to internet of things have raised critical concerns for securing these systems. In the recent past, security attacks on different kinds of devices have evolved in terms of complexity and diversity. One of the challenges is establishing secure communication in the network among various devices and systems. Despite being protected with authentication and encryption, the network still needs to be protected against cyber-attacks. For this, the network traffic has to be closely monitored and should detect anomalies and intrusions. Intrusion detection can be categorized as a network traffic classification problem in machine learning. Existing network traffic classification methods require a lot of training and data preprocessing, and this problem is more serious if the dataset size is huge. In addition, the machine learning and deep learning methods that have been used so far were trained on datasets that contain obsolete attacks. In this thesis, these problems are addressed by using ensemble methods applied on an up to date network attacks dataset. Ensemble methods use multiple learning algorithms to get better classification accuracy that could be obtained when the corresponding learning algorithm is applied alone. This dataset for network traffic classification has recent attack scenarios and contains over fifteen attacks. This approach shows that ensemble methods can be used to classify network traffic and detect intrusions with less training times of the model, and lesser pre-processing without feature selection. In addition, this thesis also shows that only with less than ten percent of the total features of input dataset will lead to similar accuracy that is achieved on whole dataset. This can heavily reduce the training times and classification duration in real-time scenarios.
ContributorsPonneganti, Ramu (Author) / Yau, Stephen (Thesis advisor) / Richa, Andrea (Committee member) / Yang, Yezhou (Committee member) / Arizona State University (Publisher)
Created2019
135545-Thumbnail Image.png
Description
This thesis will examine the recruitment process of educated millennials coming from four-year institutions to their first job out of college. When referring to millennials throughout my research, I am specifically focusing on current college graduates in order to better relate to my own experiences as a soon-to-be-graduate seeking a

This thesis will examine the recruitment process of educated millennials coming from four-year institutions to their first job out of college. When referring to millennials throughout my research, I am specifically focusing on current college graduates in order to better relate to my own experiences as a soon-to-be-graduate seeking a job. I will examine the various recruiting techniques, i.e. channels to connect with graduates, and the hiring and interview process as a whole. This thesis will also discuss the challenges and differences of recruiting millennials versus other generations. It will also discuss the latest trends in college and early talent recruiting. In order to do this, I conducted a number of in-depth interviews with recruiters and hiring managers from various companies that recruit heavily from Arizona State University (ASU), in order to determine what these companies have done to be successful among young college graduates. I aimed to identify the specific techniques that these companies use to connect with recent college graduates, what skills these firms are looking for, and what the hiring process looks like for new millennial employees. I also conducted an extensive online literature search about recruiting educated millennials in the workforce, and I used that information as a basis to form my interview questions. The interviews were meant to confirm or deny that research, but the interviewees also revealed many new trends and insights. I hope that this information will be beneficial not only to college seniors seeking first-time employment, but also to other companies who feel that they are struggling to capture young talent.
ContributorsCapra, Alexandria Luccia (Author) / Kalika, Dale (Thesis director) / Eaton, Kathryn (Committee member) / W. P. Carey School of Business (Contributor) / Department of Marketing (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
135557-Thumbnail Image.png
Description
ASU's international student population has been growing exponentially in the last few years. Specifically, the fastest growing group has been international students from China. However, many of these students are arriving with inaccurate expectations of life at an American university. Furthermore, prospective students in China that have a desire to

ASU's international student population has been growing exponentially in the last few years. Specifically, the fastest growing group has been international students from China. However, many of these students are arriving with inaccurate expectations of life at an American university. Furthermore, prospective students in China that have a desire to attend school in the U.S. are struggling to find a university that is affordable and respected. There is a huge opportunity for ASU to reach this market of students and increase their enrollment of international Chinese students. Our project aimed to create advertisements of ASU that target international Chinese students and their parents. The purpose of our project is to provide inspiration that ASU can utilize to create a professional marketing campaign to target this population of potential students.
ContributorsKagiyama, Kristen (Co-author) / Le, Alethea (Co-author) / Chien, Hsui Fen (Thesis director) / Chau, Angie (Committee member) / W. P. Carey School of Business (Contributor) / Department of Marketing (Contributor) / Department of Supply Chain Management (Contributor) / School of International Letters and Cultures (Contributor) / School of Sustainability (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
Description
This project seeks to investigate the ways in which the W.P. Carey School of Business, at Arizona State University, can improve student retention and engagement efforts. The analysis is being completed through an audit of the business school's current efforts towards student engagement, an examination of the internal and external

This project seeks to investigate the ways in which the W.P. Carey School of Business, at Arizona State University, can improve student retention and engagement efforts. The analysis is being completed through an audit of the business school's current efforts towards student engagement, an examination of the internal and external environments of business schools across the nation, and a review of scholarly data/research on student retention risk factors and methods for improving engagement. The study highlights what exactly contributes to the success of the W.P. Carey School of Business, concluding with recommendations for how its engagement and retention efforts can be further improved to continue to serve students at a nationally ranked level.
ContributorsStinger, Rio W. (Author) / Hillman, Amy (Thesis director) / Mader, Michael (Committee member) / Division of Teacher Preparation (Contributor) / Department of Management (Contributor) / W. P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
135586-Thumbnail Image.png
Description
Fringe: Abstract Fringe is a feature length screenplay and a work of original science fiction. The story takes place in the future, on a planet far from Earth but it is told from the human perspective and is meant to draw into question many issues present in society today: prejudice,

Fringe: Abstract Fringe is a feature length screenplay and a work of original science fiction. The story takes place in the future, on a planet far from Earth but it is told from the human perspective and is meant to draw into question many issues present in society today: prejudice, hatred, multiculturalism, war, and social division. The screenplay seeks to pose an allegorical relationship between the humanity living on the planet, and the enemies they face, and the present day conflict between America and the Middle East or ISIS. The story follows Miles as he is forced to ally with his sworn enemy, the Lue, and learn to fight together to save his world from destruction. Miles begins the film bitter, resentful, and filled with prejudice towards his foes, much like a majority of Americans today. Instead of focussing on that conflict though, my story unites these two bitter enemies and asks them to put aside their violent and hateful pasts to fight a new, more powerful foe together. As the events unfold my characters learn that their enemies can be just like them and that they have something valuable to offer their world. My screenplay is about finding commonality with the enemy, on both sides of a conflict. By the end of my tale, Miles learns that there is good to be found in the world, even in his sworn enemies, if he looks close enough. It may seem like an archetypal plot on the surface but I worked hard to create a world that has not been seen in film before, an original science fiction universe that can bring these issues into the light and entertain an audience while doing so. I feel that my screenplay does just that, offering entertainment with and edge of social commentary, and stays true to the science fiction form.
ContributorsTrcic, Colton Walker (Author) / Maday, Gregory (Thesis director) / Bernstein, Gregory (Committee member) / WPC Graduate Programs (Contributor) / W. P. Carey School of Business (Contributor) / School of Film, Dance and Theatre (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
135587-Thumbnail Image.png
Description
The January 12, 2010 Haiti earthquake, which hit Port-au-Prince in the late afternoon, was the cause of over 220,000 deaths and $8 billion in damages \u2014 roughly 120% of national GDP at the time. A Mw 7.5 earthquake struck rural Guatemala in the early morning in 1976 and caused 23,000-25,000

The January 12, 2010 Haiti earthquake, which hit Port-au-Prince in the late afternoon, was the cause of over 220,000 deaths and $8 billion in damages \u2014 roughly 120% of national GDP at the time. A Mw 7.5 earthquake struck rural Guatemala in the early morning in 1976 and caused 23,000-25,000 deaths, three times as many injuries, and roughly $1.1 billion in damages, which accounted for approximately 30% of Guatemala's GDP. The earthquake which hit just outside of Christchurch, New Zealand early in the morning on September 4, 2010 had a magnitude of 7.1 and caused just two injuries, no deaths, and roughly 7.2 billion USD in damages (5% of GDP). These three earthquakes, all with magnitudes over 7 on the Richter scale, caused extremely varied amounts of economic damage for these three countries. This thesis aims to identify a possible explanation as to why this was the case and suggest ways in which to improve disaster risk management going forward.
ContributorsHeuermann, Jamie Lynne (Author) / Schoellman, Todd (Thesis director) / Mendez, Jose (Committee member) / Department of Supply Chain Management (Contributor) / Department of Economics (Contributor) / W. P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
135201-Thumbnail Image.png
Description
Traditional educational infrastructures and their corresponding architectures have degenerated to work in opposition to today's scholastic objectives. In consideration of the necessity of formal education and academic success in modern society, a re-imagination of the ideal educational model and its architectural equivalent is long overdue. Fortunately, the constituents of a

Traditional educational infrastructures and their corresponding architectures have degenerated to work in opposition to today's scholastic objectives. In consideration of the necessity of formal education and academic success in modern society, a re-imagination of the ideal educational model and its architectural equivalent is long overdue. Fortunately, the constituents of a successful instructional method exist just outside our windows. This thesis, completed in conjunction with the ADE422 architectural studio, seeks to identify the qualities of a new educational paradigm and its architectural manifestation through an exploration of nature and biophilic design. Architectural Studio IV was challenged to develop a new academic model and corresponding architectural integration for the Herberger Young Scholars Academy, an educational institution for exceptionally gifted junior high and high school students, located on the West Campus of Arizona State University. A commencing investigation of pre-established educational methods and practices evaluated compulsory academic values, concepts, theories, and principles. External examination of scientific studies and literature regarding the functions of nature within a scholastic setting assisted in the process of developing a novel educational paradigm. A study of game play and its relation to the learning process also proved integral to the development of a new archetype. A hypothesis was developed, asserting that a nature-centric educational model was ideal. Architectural case studies were assessed to determine applicable qualities for a new nature-architecture integration. An architectural manifestation was tested within the program of the Herberger Young Scholars Academy and through the ideal functions of nature within an academic context.
ContributorsTate, Caroline Elizabeth (Author) / Underwood, Max (Thesis director) / Hejduk, Renata (Committee member) / De Jarnett, Mitchell (Committee member) / The Design School (Contributor) / W. P. Carey School of Business (Contributor) / School of Sustainability (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05