ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at email@example.com.
- 2 English
- 2 Public
Law enforcement, schools and universities, health service agencies, as well as social service agencies, each acquire information from individuals that receive their services. That information gets recorded into the respective application system of each organization. The information, however, gets recorded only in the context of each service rendered and within each system used to record it. Information that is recorded by the police department for one individual is entirely different from the information that is recorded by the hospital for that same individual. What if all the organizations used the same system to record information? What if all the organizations …
- Pullin, Britton Scott, Schildgen, Thomas, Prewitt, Deborah, et al.
- Created Date
The current study examines the role that context plays in hackers' perceptions of the risks and payoffs characterizing a hacktivist attack. Hacktivism (i.e., hacking to convey a moral, ethical, or social justice message) is examined through a general game theoretic framework as a product of costs and benefits, as well as the contextual cues that may sway hackers' estimations of each. In two pilot studies, a bottom-up approach is utilized to identify the key motives underlying (1) past attacks affiliated with a major hacktivist group, Anonymous, and (2) popular slogans utilized by Anonymous in its communication with members, targets, and …
- Bodford, Jessica Erin, Kwan, Virginia S. Y., Shakarian, Paulo, et al.
- Created Date