Filtering by
- Creators: Computer Science and Engineering Program
In the last decade, California’s imprisoned population of women has increased by nearly 400% (Chesney-Lind, 2012). The focus of this thesis is to discuss the treatment—or lack thereof—of women within California’s criminal justice system and sentencing laws. By exploring its historical approach to two criminal actions related to women, the Three Strikes law (including non-violent drug crimes) and the absence of laws accounting for experiences of female victims of domestic violence who killed their abusers, I explore how California’s criminal code has marginalized women, and present a summary of the adverse effects brought about by the gender invisibility that is endemic within sentencing policies and practice. I also discuss recent attempted and successful reforms related to these issues, which evidence a shift toward social dialogue on sentencing aiming to address gender inequity in the sentencing code. These reforms were the result of activism; organizations, academics and individuals successfully raised awareness regarding excessive and undue sentencing of women and compelled action by the legislature.
By method of a feminist analysis of these histories, I explore these two pertinent issues in California; both are related to women who, under harsh sentencing laws, were incarcerated under the state’s male-focused legislation. Responses to the inequalities found in these laws included attempts toward both visibility for women and reform related to sentencing. I analyze the ontology of sentencing reform as it relates to activism in order to discuss the implications of further criminal code legislation, as well as the implications of the 2012 reforms in practice. Through the paper, I focus upon how women have become a target of arrest and long sentences not because they are strategically arrested to equalize their representation behind bars, but because the “tough on crime” framework in the criminal code cast a wide and fixed net that incarcerated increasingly more women following the codification of both mandatory minimums and a male-oriented approach to sentencing (Chesney-Lind et. al, 2012).
This paper will cover topics regarding remote work. More specifically, remote work for the field of logistics. It will also dive into remote work platforms themselves e.g., Slack, Zoom, etc. Microsoft Teams, the specific software we used while I was at my internship, will be analyzed as well. I will, specifically, be analyzing the fundamental issues that occurred during my internship, developing a feasible solution with a laid-out process for each one. After the proper execution of these processes, I will discuss my results. I found that time is the most critical component of an optimal transition to remote work. Finally, I will conclude with reflections on my findings, insights from current working supply chain professionals, and prompt further research that could be done.
Supply chain management is becoming an increasingly vital component in the success of an organization. Business and government leaders continue to recognize the importance of having robust and resilient supply chains. This trend has been accelerated by the COVID-19 pandemic which brought to light the fragility of the modern global supply chain network. Decades of offshoring has led to the inability of businesses to adequately manufacture critical supplies in times of crisis. This reality is most prevalent in the healthcare industry. Antibiotics, pharmaceuticals, PPE, testing equipment are almost entirely sourced from Chinese manufacturers. Building a more resilient healthcare supply chain requires a revaluation of critical items, cooperation between businesses and government, and recognizing the precarious situation for the United States which has become completely reliant on foreign manufacturers. <br/> Businesses are looking to develop more resilient supply chains which can respond and predict unforeseen market circumstances. The federal government is reckoning the national security concern of sourcing nearly all antibiotics, and pharmaceuticals from Chinese manufacturers. Aligning the goals of key stakeholders and developing the necessary incentive structure to encourage domestic manufacturing is necessary to respond to this crisis. As the global economy becomes increasingly interconnected and dependent on changes to markets anywhere on the globe, a renewed focus on proactive strategies is necessary to ensure the security and resiliency of the United States healthcare supply chain.
Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question what should be done. There are unique ethical considerations in regards to affective computing that haven't been explored. The purpose of this study is to understand the user’s perspective of affective computing in regards to the Association of Computing Machinery (ACM) Code of Ethics, to ultimately start developing a better understanding of these ethical concerns. For this study, participants were required to watch three different videos and answer a questionnaire, all while wearing an Emotiv EPOC+ EEG headset that measures their emotions. Using the information gathered, the study explores the ethics of affective computing through the user’s perspective.
Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system is implemented, but none of these systems have truly solved the problem. This thesis surveys existing studies and provides a classification and evaluation of each detection system with the aim of determining their pros and cons. The result of the evaluation indicates that it might be possible to bypass detection of existing systems by modifying the cryptojacking code. In addition to this classification, I developed an automatic code instrumentation program that replaces specific instructions with functionally similar sequences as a way to show how easy it is to implement simple obfuscation to bypass detection by existing systems.
For our project, we explored the growth of the ASU BioDesign Clinical Testing Laboratory (ABCTL) from a standard university research lab to a COVID-19 testing facility through a business lens. The lab has pioneered the saliva-test in the Western United States. This thesis analyzes the laboratory from various business concepts and aspects. The business agility of the lab and it’s quickness to innovation has allowed the lab to enjoy great success. Looking into the future, the laboratory has a promising future and will need to answer many questions to remain the premier COVID-19 testing institution in Arizona.