Filtering by
- Creators: Computer Science and Engineering Program
The photographs focused on aspects of life and behaviors that have contributed to happiness in local communities. A website was created and a gallery event was mounted for public review and discussion. Gallery attendees and website visitors were asked to complete a survey to assess (1) gained knowledge of sustainability solutions, and (2) how effective a tool photography is as a means of sustainability solutions communication.
This visual medium allowed people think about how to incorporate sustainable community solutions into their own lives and may have changed people’s interest in, and thoughts about, overall sustainability and sustainable solutions. The survey results demonstrated that photographs can successfully communicate sustainability ideas. Specifically, viewers gained an increased awareness of how community and urban gardening can increase happiness, well-being, and sense of community. This visual approach can continue to be used to more successfully communicate additional sustainability solutions ideas and methods to the public.
This report describes the process by which I created a concise but comprehensive online source of information about best practices in sustainability for urban planners. The goal of the project was to provide accessible information that would help planners in ways that help them comprehend and implement sustainable solutions to common planning problems that are found throughout the United States. To create the website, I researched methods for communicating clearly to planners, took a graduate course in communicating about sustainability, and drew on information that I had compiled on sustainable solutions for transportation, economy, water, green space, and governance.




Aspiring to build the most socially and environmentally sustainable chapter house possible, the Navajo Nation’s Tonalea Chapter collaborated with our ASU research team. Two roundtable discussion with Chapter elders and members, led to a vision foundation that embodies physical, functional and environmental conditions, as well as cultural and spiritual beliefs and values.
Initially, Houde’s (2007) Six Faces of Traditional Ecological Knowledge (TEK) were used to sort commentary. Analysis and review led to expanding the framework from six to eight traditional ecological knowledge categories (TEK8): Culture, Spirituality, Ecosystem, Time, Land, Design, Social Justice and Equity, and Economics.
Sorted narratives and discussions revealed traditional ways of life, beliefs, and values, along with suggestions about who to design for, and what functions are most needed. Based on the TEK8 categorized comments, design recommendations were offered.
Additional work is needed, but a strong foundation for a framework mapping TEK to sustainable design for indigenous people has been developed. By using the TEK8 to address social justice issues through participatory visioning, culturally appropriate design and broader opportunities for happiness may result.
Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question what should be done. There are unique ethical considerations in regards to affective computing that haven't been explored. The purpose of this study is to understand the user’s perspective of affective computing in regards to the Association of Computing Machinery (ACM) Code of Ethics, to ultimately start developing a better understanding of these ethical concerns. For this study, participants were required to watch three different videos and answer a questionnaire, all while wearing an Emotiv EPOC+ EEG headset that measures their emotions. Using the information gathered, the study explores the ethics of affective computing through the user’s perspective.
Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system is implemented, but none of these systems have truly solved the problem. This thesis surveys existing studies and provides a classification and evaluation of each detection system with the aim of determining their pros and cons. The result of the evaluation indicates that it might be possible to bypass detection of existing systems by modifying the cryptojacking code. In addition to this classification, I developed an automatic code instrumentation program that replaces specific instructions with functionally similar sequences as a way to show how easy it is to implement simple obfuscation to bypass detection by existing systems.