Matching Items (1,077)
Filtering by

Clear all filters

Description
Sentencing reform has been the subject of much debate in the 21st century and has resulted in a great deal of consternation in state and federal systems of government (Chesney-Lind, 2012). The public does not view incarceration as an important topic needing attention or requiring change, which makes invisible the

Sentencing reform has been the subject of much debate in the 21st century and has resulted in a great deal of consternation in state and federal systems of government (Chesney-Lind, 2012). The public does not view incarceration as an important topic needing attention or requiring change, which makes invisible the needs and histories of prisoners as a consequence of not addressing them (Connor, 2001). Through an analysis of the spectrum of women’s crime, ranging from non-violent drug trafficking to homicide, I conclude within this paper that the criminal justice system was written as a male-oriented code of addressing crime, which has contributed to women being made into easier targets for arrest and female imprisonment at increasing rates for longer lengths of time.
In the last decade, California’s imprisoned population of women has increased by nearly 400% (Chesney-Lind, 2012). The focus of this thesis is to discuss the treatment—or lack thereof—of women within California’s criminal justice system and sentencing laws. By exploring its historical approach to two criminal actions related to women, the Three Strikes law (including non-violent drug crimes) and the absence of laws accounting for experiences of female victims of domestic violence who killed their abusers, I explore how California’s criminal code has marginalized women, and present a summary of the adverse effects brought about by the gender invisibility that is endemic within sentencing policies and practice. I also discuss recent attempted and successful reforms related to these issues, which evidence a shift toward social dialogue on sentencing aiming to address gender inequity in the sentencing code. These reforms were the result of activism; organizations, academics and individuals successfully raised awareness regarding excessive and undue sentencing of women and compelled action by the legislature.
By method of a feminist analysis of these histories, I explore these two pertinent issues in California; both are related to women who, under harsh sentencing laws, were incarcerated under the state’s male-focused legislation. Responses to the inequalities found in these laws included attempts toward both visibility for women and reform related to sentencing. I analyze the ontology of sentencing reform as it relates to activism in order to discuss the implications of further criminal code legislation, as well as the implications of the 2012 reforms in practice. Through the paper, I focus upon how women have become a target of arrest and long sentences not because they are strategically arrested to equalize their representation behind bars, but because the “tough on crime” framework in the criminal code cast a wide and fixed net that incarcerated increasingly more women following the codification of both mandatory minimums and a male-oriented approach to sentencing (Chesney-Lind et. al, 2012).
ContributorsD'Souza, Kristin Tessa (Author) / Gomez, Alan (Thesis director) / Fonow, Mary Margaret (Committee member) / Leone Hamm, Donna (Committee member) / Barrett, The Honors College (Contributor) / School of Social Transformation (Contributor)
Created2013-05
Description
This thesis explores how motherhood as a status and social identity influences the help-seeking decisions made by women who experience Intimate Partner Violence (IPV) and enter a domestic violence shelter in Arizona. Specifically, this report examines the types, severity, and frequency of violence experienced by women with children and the

This thesis explores how motherhood as a status and social identity influences the help-seeking decisions made by women who experience Intimate Partner Violence (IPV) and enter a domestic violence shelter in Arizona. Specifically, this report examines the types, severity, and frequency of violence experienced by women with children and the methods of help-seeking among women without children and women with children. Special attention is paid to women who cite their children as a primary reason for seeking legal intervention and those who cite their children as a primary reason for not seeking legal intervention in their relationships. For the purposes of this study, a survey investigating the types and severity of violence experienced, the help-seeking practices of, and the safety-planning measures taken by IPV survivors was distributed to over 600 women in emergency domestic violence shelters in the Phoenix, Arizona area. Data from both closed- and open-ended questions asked on the survey is analyzed in the context of a review of existing literature on the subject and of current Arizona state-level policies and legislation. Conclusions focus on how the surveyed women's status as mothers related to the specific variables of their victimization and the help-seeking methods they used to achieve safety, and how state-level legislation reacts and acts as a barrier to certain types of help-seeking behaviors.
ContributorsHutchinson, Kimberley Robyn (Author) / Durfee, Alesha (Thesis director) / Messing, Jill Theresa (Committee member) / Barrett, The Honors College (Contributor) / School of Social Transformation (Contributor) / Department of English (Contributor)
Created2014-05
Description

Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question

Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question what should be done. There are unique ethical considerations in regards to affective computing that haven't been explored. The purpose of this study is to understand the user’s perspective of affective computing in regards to the Association of Computing Machinery (ACM) Code of Ethics, to ultimately start developing a better understanding of these ethical concerns. For this study, participants were required to watch three different videos and answer a questionnaire, all while wearing an Emotiv EPOC+ EEG headset that measures their emotions. Using the information gathered, the study explores the ethics of affective computing through the user’s perspective.

ContributorsInjejikian, Angelica (Author) / Gonzalez-Sanchez, Javier (Thesis director) / Chavez-Echeagaray, Maria Elena (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system

Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system is implemented, but none of these systems have truly solved the problem. This thesis surveys existing studies and provides a classification and evaluation of each detection system with the aim of determining their pros and cons. The result of the evaluation indicates that it might be possible to bypass detection of existing systems by modifying the cryptojacking code. In addition to this classification, I developed an automatic code instrumentation program that replaces specific instructions with functionally similar sequences as a way to show how easy it is to implement simple obfuscation to bypass detection by existing systems.

ContributorsLarson, Kent Merle (Author) / Bazzi, Rida (Thesis director) / Shoshitaishvili, Yan (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a generator to attempt to satisfy the discriminator. The network design is described in further detail below; however there are several potential issues that arise including the averaging of a color for certain images such that small details in an image are not assigned unique colors leading to a neutral blend. We attempt to mitigate this issue as much as possible.

ContributorsMarkabawi, Jah (Co-author) / Masud, Abdullah (Co-author) / Lobo, Ian (Co-author) / Koleber, Keith (Co-author) / Yang, Yingzhen (Thesis director) / Wang, Yancheng (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a generator to attempt to satisfy the discriminator. The network design is described in further detail below; however there are several potential issues that arise including the averaging of a color for certain images such that small details in an image are not assigned unique colors leading to a neutral blend. We attempt to mitigate this issue as much as possible.

ContributorsMasud, Abdullah Bin (Co-author) / Koleber, Keith (Co-author) / Lobo, Ian (Co-author) / Markabawi, Jah (Co-author) / Yang, Yingzhen (Thesis director) / Wang, Yancheng (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

The NCAA is changing the current rules and regulations around a student-athlete’s name, image, and likeness. Previously, student-athletes were not allowed to participate in business activities or noninstitutional promotional activities. With the new rule changes, student-athletes will be able to engage in business activities related to their own name, image,

The NCAA is changing the current rules and regulations around a student-athlete’s name, image, and likeness. Previously, student-athletes were not allowed to participate in business activities or noninstitutional promotional activities. With the new rule changes, student-athletes will be able to engage in business activities related to their own name, image, and likeness. The goal of the team was to help “prepare athletes to understand and properly navigate the evolving restrictions and guidelines around athlete name, image, and likeness”. In order to accomplish this, the team had to understand the problems student-athletes face with these changing rules and regulations. The team conducted basic market research to identify the problem. The problem discovered was the lack of communication between student-athletes and businesses. In order to verify this problem, the team conducted several interviews with Arizona State University Athletic Department personnel. From the interviews, the team identified that the user is the student-athletes and the buyer is the brands and businesses. Once the problem was verified and the user and buyer were identified, a solution that would best fit the customers was formulated. The solution is a platform that assists student-athletes navigate the changing rules of the NCAA by providing access to a marketplace optimized to working with student-athletes and offering an ease of maintaining relationships between student-athletes and businesses. The solution was validated through meetings with interested brands. The team used the business model and market potential to pitch the business idea to the brands. Finally, the team gained traction by initiating company partnerships.

ContributorsSchulte, Brooke (Co-author) / Recato, Bella (Co-author) / Winston, Blake (Co-author) / Byrne, Jared (Thesis director) / Lee, Christopher (Committee member) / Kunowski, Jeffrey (Committee member) / Computer Science and Engineering Program (Contributor) / Dean, W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

Digital learning tools have become ubiquitous in virtual and in person classrooms as teachers found creative ways to engage students during the COVID 19 pandemic. Even before the pandemic and widespread remote learning, however, digital learning tools were increasingly common and a typical part of many classrooms. While all digital

Digital learning tools have become ubiquitous in virtual and in person classrooms as teachers found creative ways to engage students during the COVID 19 pandemic. Even before the pandemic and widespread remote learning, however, digital learning tools were increasingly common and a typical part of many classrooms. While all digital learning tools are worthy of study, math digital learning tools (MDLTs) designed for K - 8th grade in particular raise questions of efficacy and usefulness for classrooms. This paper shows that MDLTs are an effective tool to raise students’ math achievement across K - 8th grade, and that time spent on MDLTs can lead to better understanding of a topic than traditional, teacher led instruction. However, if the MDLT is being delivered in a language the student is not familiar with, that student will not be able to benefit from MDLTs in the way other students do. This is also true of students who receive Special Education services. Additionally, higher quality MDLTs that provide feedback that attaches meaning to students’ work creates a better learning environment for students than one with simpler feedback. Based on my experiences with student teaching this year and using the popular MDLT IXL frequently, I recommend that MDLTs not just be used for independent practice time, but for whole class, problem solving sessions where students have to use mathematical thinking in new content areas. This will build deeper conceptual learning and a greater sense of achievement in students.

ContributorsBai, Stephanie Yi-Lan (Author) / Boyce-Jacino, Katherine (Thesis director) / Davis, Kelly (Committee member) / School of Social Transformation (Contributor) / Division of Teacher Preparation (Contributor) / School of Music, Dance and Theatre (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

A project about developing software for learning turned into a project for learning about software development. The submission here only includes the journal. However, the journal has a link to the public GitHub repository containing the source code for the thesis. The source code implements a program to facilitate self-study

A project about developing software for learning turned into a project for learning about software development. The submission here only includes the journal. However, the journal has a link to the public GitHub repository containing the source code for the thesis. The source code implements a program to facilitate self-study by allowing the user to create quizzes. The journal contains my experience working on the project (both successes and failures).

ContributorsRoper, Branden Gerald (Author) / Miller, Phillip (Thesis director) / Zazkis, Dov (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

Media witnessing and storytelling for environmental justice (EJ) provide an avenue to understand the relationships between “multiple realities of environmental injury” and to analyze “fleeting phenomena with lasting form; thereby transforming phenomena that are experienced in a plurality of lives into publicly recognized history” (Houston, 2012, 419, 422). This creates

Media witnessing and storytelling for environmental justice (EJ) provide an avenue to understand the relationships between “multiple realities of environmental injury” and to analyze “fleeting phenomena with lasting form; thereby transforming phenomena that are experienced in a plurality of lives into publicly recognized history” (Houston, 2012, 419, 422). This creates opportunities to challenge and eradicate the oppressive structures that deem certain individuals and groups disposable and ultimately protect the possessive investment in whiteness. Therefore, for the purposes of EJ, media witnessing creates space for dynamic, citizen-based storytelling which can undermine narratives that promote the life versus economy framework that has perpetuated oppression, injustice, and state sanctioned violence. Media witnessing in an EJ context demonstrates the potential for collective understanding and action, political opportunities, and healing.<br/>This paper is an analysis of the process of media witnessing in regards to the Flint Water Crisis and the construction of the Dakota Access Pipeline (DAPL) and will apply an EJ lens to this phenomenon. It will discuss how media witnessing in response to these two crises can be used as a precedent for understanding and utilizing this framework and digital storytelling to address the crises of 2020, primarily the COVID-19 pandemic and racial injustice. It will then examine how the intersectionality of race, gender, and age has implications for future media witnessing and storytelling in the context of EJ movements. Finally, it will explain how media witnessing can motivate holistic policymaking in the favor of EJ initiatives and the health and wellbeing of all Americans, as well as how such policymaking and initiatives must acknowledge the double-edged sword that is social media.

ContributorsOConnell, Julia (Author) / Richter, Jennifer (Thesis director) / Adamson, Joni (Committee member) / School of Social Transformation (Contributor) / School of Human Evolution & Social Change (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05