Matching Items (3)
151936-Thumbnail Image.png
Description
With the number of internationally-run clinical drug trials increasing, the double standards between those in developed nations and those in developing nations are being scrutinized under the ethical microscope. Many argue that several pharmaceutical companies and researchers are exploiting developing nation participants. Two issues of concern are the use of

With the number of internationally-run clinical drug trials increasing, the double standards between those in developed nations and those in developing nations are being scrutinized under the ethical microscope. Many argue that several pharmaceutical companies and researchers are exploiting developing nation participants. Two issues of concern are the use of a placebo control when an effective alternative treatment exists and the lack of drug availability to the country that hosted the clinical trial should the experimental drug prove effective. Though intuitively this seems like an instance of exploitation, philosophically, exploitation theories cannot adequately account for the wrongdoing in these cases. My project has two parts. First, after explaining why the theories of Alan Wertheimer, John Lawrence Hill, and Ruth Sample fail to explain the exploitation in clinical drug research, I provide an alternative account of exploitation that can explain why the double standard in clinical research is harmful. Rather than craft a single theory encompassing all instances of exploitation, I offer an account of a type, or subset, of exploitation that I refer to as comparative exploitation. The double standards in clinical research fall under the category of comparative exploitation. Furthermore, while many critics maintain that cases of comparative exploitation, including clinical research, are mutually beneficial, they are actually harmful to its victims. I explain the harm of comparative exploitation using Ben Bradley's counterfactual account of harm and Larry May's theory of sharing responsibility. The second part of my project focuses on the "standard of care" argument, which most defenders use to justify the double standard in clinical research. I elaborate on Ruth Macklin's position that advocates of the "standard of care" position make three faulty assumptions: placebo-controlled trials are the gold standard, the only relevant question responsive to the host country's health needs is "Is the experimental product being studied better than the 'nothing' now available to the population?", and the only way of obtaining affordable products is to test cheap alternatives to replace the expensive ones. In the end, I advocate moving towards a universalizing of standards in order to avoid exploitation.
ContributorsFundora, Danielle (Author) / McGregor, Joan (Thesis advisor) / Brake, Elizabeth (Committee member) / Portmore, Douglas (Committee member) / Arizona State University (Publisher)
Created2013
187663-Thumbnail Image.png
Description
As computing evolves and libraries are produced for developers to create efficientsoftware at a faster rate, the security of a modern program is an area of great concern because complex software breeds vulnerabilities. Due to the criticality of computer systems security, cybersecurity education must maintain pace with the rapidly evolving technology industry. An example

As computing evolves and libraries are produced for developers to create efficientsoftware at a faster rate, the security of a modern program is an area of great concern because complex software breeds vulnerabilities. Due to the criticality of computer systems security, cybersecurity education must maintain pace with the rapidly evolving technology industry. An example of growth in cybersecurity education can be seen in Pwn.college – a publicly available resource composed of modules that teach computer systems security. In reaction to the demand for the expansion of cybersecurity education, the pwn.college developers designed a new set of modules for a course at Arizona State University and offered the same modules for public use. One of these modules, the “babyfile” module, was intended to focus on the exploitation of FILE structures in the C programming language. FILE structures allow for fast and efficient file operations. Unfortunately, FILE structures have severe vulnerabilities which can be exploited to attain elevated privileges for reading data, writing data, and executing instructions. By researching the applications of FILE structure vulnerabilities, the babyfile module was designed with twenty challenges that teach pwn.college users how to exploit programs by misusing FILE structures. These challenges are sorted by increasing difficulty and the intended solutions utilize all the vulnerabilities discussed in this paper. In addition to introducing users to exploits against FILE structures, babyfile also showcases a novel attack against the virtual function table, which is located at the end of a FILE structure.
ContributorsRatliff, Derek Michael (Author) / Shoshitaishvili, Yan (Thesis advisor) / Wang, Fish (Committee member) / Bao, Tiffany (Committee member) / Arizona State University (Publisher)
Created2023
157136-Thumbnail Image.png
Description
This study examines the representation of Asian online brides by studying the images and profiles that are advertised on Asianonlinebrides.com. To do so, I combined the history and growth of the Human Trafficking industry, the idea of the Asian “exotic OTHER,” the power and structured/constrained agency, and social construction

This study examines the representation of Asian online brides by studying the images and profiles that are advertised on Asianonlinebrides.com. To do so, I combined the history and growth of the Human Trafficking industry, the idea of the Asian “exotic OTHER,” the power and structured/constrained agency, and social construction of gender theories. In particular, I utilized a mixed methods approach for data collection. The content and visual analysis in this study provided the two sides of the analytic coin: the written and the visual. I am particularly interested in the narrative comments offered by the prospective brides, e.g., what they state to be their preferences in their dream man/husband, and the personality traits, and characteristics that they write about themselves. The following were examined: the gender displays, picture frames, feminine touch, and the ritualization of subordination. For example, body language, clothing, skin, hair color, and texture, bone structure, posture, etc. I argue that this data alerts us to the whole host of ideas, assumptions, social, cultural, and gender constructions. The power relations that exceeds the text and inform us of these online brides. The findings have indicated that these women are vulnerable and caught within oppressive social structures. They have nevertheless utilized those structures to their advantage. By doing so, the brides have acted as assertive agents in that they have looked out for the interests of both themselves and their families. Moreover, a significant body of data was provided first hand through the written and visual narratives of the online brides. These brides have offered valuable insight into the field of Asian online brides. Their stories have presented a unique perspective to the online brides’ process that can only be captured through the narratives provided in this research.
ContributorsDai, Linh K (Author) / Cavender, Gray (Thesis advisor) / Jurik, Nancy (Committee member) / Swadener, Elizabeth (Committee member) / Tibbs, Donald (Committee member) / Arizona State University (Publisher)
Created2019