Matching Items (1,197)
Filtering by

Clear all filters

Description
The main purpose of this thesis was to further explore factors that render particular children more susceptible to bullying and peer victimization. Race, age, and the activities that the children participated in were considered potential predictors of bullying and victimization. Self- and peer-reported data were gathered on 437 first and

The main purpose of this thesis was to further explore factors that render particular children more susceptible to bullying and peer victimization. Race, age, and the activities that the children participated in were considered potential predictors of bullying and victimization. Self- and peer-reported data were gathered on 437 first and third grade children (234 boys and 203 girls, M age = 7 years, 6 months), including the frequency of peer victimization and the extent of their engagement in gender-typed activities. Activities were identified as either masculine (e.g., watching sports on television, playing with tools) or feminine (e.g., playing house, cheerleading) according to which sex was mostly likely to engage in them. Mixed support was obtained for the hypothesis that boys are at greater risk for being targets of peer aggression. Specifically, while peer-reports of victimization supported this hypothesis, self-reports revealed no sex differences. Support was obtained for the hypotheses that engaging in cross gender-typed activities would be a stronger risk factor for peer victimization for boys than for girls.
ContributorsAboud, Lauren Ashley (Author) / Ladd, Becky (Thesis director) / Eggum, Natalie (Committee member) / Ladd, Gary (Committee member) / Barrett, The Honors College (Contributor) / Department of English (Contributor)
Created2013-05
DescriptionDiagnosis is an analysis of human behavior, examined through several types of poetry. The project delves into how individuals act and re-act when put into stress-inducing situations, whether due to that situation, personality, traits, an interaction with another person, or mental illness.
ContributorsBreisblatt, Faith Wood (Author) / Hogue, Cynthia (Thesis director) / Humphrey, Ted (Committee member) / Goldberg, Beckian Fritz (Committee member) / Barrett, The Honors College (Contributor) / T. Denny Sanford School of Social and Family Dynamics (Contributor) / Department of Psychology (Contributor) / Department of English (Contributor)
Created2013-05
DescriptionPoems
ContributorsCinquepalmi, Anthony (Author) / Ball, Sally (Thesis director) / Dubie, Norman (Committee member) / Lussier, Mark (Committee member) / Barrett, The Honors College (Contributor) / Department of English (Contributor)
Created2013-05
Description
This thesis explores how motherhood as a status and social identity influences the help-seeking decisions made by women who experience Intimate Partner Violence (IPV) and enter a domestic violence shelter in Arizona. Specifically, this report examines the types, severity, and frequency of violence experienced by women with children and the

This thesis explores how motherhood as a status and social identity influences the help-seeking decisions made by women who experience Intimate Partner Violence (IPV) and enter a domestic violence shelter in Arizona. Specifically, this report examines the types, severity, and frequency of violence experienced by women with children and the methods of help-seeking among women without children and women with children. Special attention is paid to women who cite their children as a primary reason for seeking legal intervention and those who cite their children as a primary reason for not seeking legal intervention in their relationships. For the purposes of this study, a survey investigating the types and severity of violence experienced, the help-seeking practices of, and the safety-planning measures taken by IPV survivors was distributed to over 600 women in emergency domestic violence shelters in the Phoenix, Arizona area. Data from both closed- and open-ended questions asked on the survey is analyzed in the context of a review of existing literature on the subject and of current Arizona state-level policies and legislation. Conclusions focus on how the surveyed women's status as mothers related to the specific variables of their victimization and the help-seeking methods they used to achieve safety, and how state-level legislation reacts and acts as a barrier to certain types of help-seeking behaviors.
ContributorsHutchinson, Kimberley Robyn (Author) / Durfee, Alesha (Thesis director) / Messing, Jill Theresa (Committee member) / Barrett, The Honors College (Contributor) / School of Social Transformation (Contributor) / Department of English (Contributor)
Created2014-05
Description
I am AZ is the beginning of a personal book project which explores six small town museums around the state of Arizona. They include: Cave Creek Museum (Cave Creek), Rim Country Museum (Payson), Navajo Country Historical Society (Holbrook), Superstition County Museum (Apache Junction), Bisbee Mining and Historical Museum (Bisbee), and

I am AZ is the beginning of a personal book project which explores six small town museums around the state of Arizona. They include: Cave Creek Museum (Cave Creek), Rim Country Museum (Payson), Navajo Country Historical Society (Holbrook), Superstition County Museum (Apache Junction), Bisbee Mining and Historical Museum (Bisbee), and The Powell Museum (Page). The document highlights these institutions as valuable assets to the community and state as they preserve the stories and artifacts pertaining to both state and local history. This document includes photos of the institutions, local history stories, and interviews with the directors from each of these museums. There are also descriptions of products that came as a result of this project including: postcards as a mode of relaying information about these places, a digital Arizona museum map to highlight the museums I did visit and keep a list of those I have yet to visit, and the accompanying pop-up exhibition that summarizes each place through photos and stories.
ContributorsSimpson, Jessica Mary (Author) / Sweeney, Gray (Thesis director) / Freeman, Stacey (Committee member) / Looser, Devoney (Committee member) / School of International Letters and Cultures (Contributor) / Department of English (Contributor) / School of Art (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
Description

Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question

Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question what should be done. There are unique ethical considerations in regards to affective computing that haven't been explored. The purpose of this study is to understand the user’s perspective of affective computing in regards to the Association of Computing Machinery (ACM) Code of Ethics, to ultimately start developing a better understanding of these ethical concerns. For this study, participants were required to watch three different videos and answer a questionnaire, all while wearing an Emotiv EPOC+ EEG headset that measures their emotions. Using the information gathered, the study explores the ethics of affective computing through the user’s perspective.

ContributorsInjejikian, Angelica (Author) / Gonzalez-Sanchez, Javier (Thesis director) / Chavez-Echeagaray, Maria Elena (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

In this essay, I set out to explore and analyze how Shirley Jackson’s The Haunting of Hill House, and the character of Eleanor Vance in particular, disrupts and redefines the traditional conventions of the Female Gothic within the context of the 20th century. I utilize Tania Modleski's gendering of Freud's

In this essay, I set out to explore and analyze how Shirley Jackson’s The Haunting of Hill House, and the character of Eleanor Vance in particular, disrupts and redefines the traditional conventions of the Female Gothic within the context of the 20th century. I utilize Tania Modleski's gendering of Freud's theory of psychoanalysis in her exploration of the ‘Female Uncanny,’ arguing that the source of the Uncanny in the Female Gothic can be found in the "fear of being lost in the mother." I argue that Jackson's complex personal life, including her fraught relationship with her mother and her difficult marriage with literary critic Edgar Hyman, color her fiction and the primary motivations of her protagonist, Eleanor Vance. I also outline the traditional structure of the Gothic novel and the heroine's journey. With the necessary context provided, I then explain how Eleanor Vance’s character rejects these Gothic traditions and ushers in a new era of Female Gothic fiction.

ContributorsAlcantar, Sarah (Author) / Fette, Donald (Thesis director) / Zarka, Emily (Committee member) / Department of Management and Entrepreneurship (Contributor) / Department of English (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system

Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system is implemented, but none of these systems have truly solved the problem. This thesis surveys existing studies and provides a classification and evaluation of each detection system with the aim of determining their pros and cons. The result of the evaluation indicates that it might be possible to bypass detection of existing systems by modifying the cryptojacking code. In addition to this classification, I developed an automatic code instrumentation program that replaces specific instructions with functionally similar sequences as a way to show how easy it is to implement simple obfuscation to bypass detection by existing systems.

ContributorsLarson, Kent Merle (Author) / Bazzi, Rida (Thesis director) / Shoshitaishvili, Yan (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a generator to attempt to satisfy the discriminator. The network design is described in further detail below; however there are several potential issues that arise including the averaging of a color for certain images such that small details in an image are not assigned unique colors leading to a neutral blend. We attempt to mitigate this issue as much as possible.

ContributorsMarkabawi, Jah (Co-author) / Masud, Abdullah (Co-author) / Lobo, Ian (Co-author) / Koleber, Keith (Co-author) / Yang, Yingzhen (Thesis director) / Wang, Yancheng (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a generator to attempt to satisfy the discriminator. The network design is described in further detail below; however there are several potential issues that arise including the averaging of a color for certain images such that small details in an image are not assigned unique colors leading to a neutral blend. We attempt to mitigate this issue as much as possible.

ContributorsMasud, Abdullah Bin (Co-author) / Koleber, Keith (Co-author) / Lobo, Ian (Co-author) / Markabawi, Jah (Co-author) / Yang, Yingzhen (Thesis director) / Wang, Yancheng (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05