Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2013

Discipline
Institution
Keyword
Publication
File Type

Articles 31 - 60 of 309

Full-Text Articles in Entire DC Network

Factors Affecting Student Satisfaction In Different Learning Deliveries, Kuang-Yu Chang Nov 2013

Factors Affecting Student Satisfaction In Different Learning Deliveries, Kuang-Yu Chang

Theses and Dissertations

This study addressed the relationship between student satisfaction and four interaction variables--student-content, student-instructor, student-student, and student-technology--in online, blended, and traditional learning settings. Demographics, previous experience with the Internet, and discussion-board applications were also investigated.

There were 916 respondents, including 185 in online settings, 90 in blended settings, and 641 in traditional settings, to Strachota's (2002) Online Satisfaction Survey. Participants took the survey either in an on-site classroom (traditional learning) or through e-mail, website link, or the Blackboard course management system (online setting). Participants in the blended setting could choose between completing the survey on-site or online, but were asked to …


A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi Nov 2013

A Novel Defense Mechanism Against Web Crawler Intrusion, Alireza Aghamohammadi

Master's Theses and Doctoral Dissertations

Web robots also known as crawlers or spiders are used by search engines, hackers and spammers to gather information about web pages. Timely detection and prevention of unwanted crawlers increases privacy and security of websites. In this research, a novel method to identify web crawlers is proposed to prevent unwanted crawler to access websites. The proposed method suggests a five-factor identification process to detect unwanted crawlers. This study provides the pretest and posttest results along with a systematic evaluation of web pages with the proposed identification technique versus web pages without the proposed identification process. An experiment was performed with …


Social Movements Using Social Media In A Mined And Censored World: Examples In The United States And China, Michael Roeder Nov 2013

Social Movements Using Social Media In A Mined And Censored World: Examples In The United States And China, Michael Roeder

College of Liberal Arts & Social Sciences Theses and Dissertations

This purpose of this thesis is to examine data mining and data censorship in the United States and China through the Occupy Wall Street social movement and labor protest activity at the Foxconn, Foshan, and Lock factories. The question posed relates to the level of investment the U.S. and Chinese governments have made in data mining and data censorship to create either a predictable situation with regard to social movement activity, or to impede communication between social movement organizers in the attempt to stop protest. For the U.S. example, I outline the legal history and interpretation of the 4th Amendment …


Analiza Forenzike E Regjistrit Të Windows-It, Avdush Jashari Nov 2013

Analiza Forenzike E Regjistrit Të Windows-It, Avdush Jashari

Theses and Dissertations

Kjo temë do të prezantoj data bazën e Windows Regjistrit dhe do të shpjegojë se sa është e rëndësishme në ekzaminimet forenzike kjo data bazë për ekzaminuesit e fushës së forenzikës digjitale. Në esencë tema do të diskutoj disa lloje të ndryshme të gjurmëve të regjistrit dhe do të hulumtojmë se çfarë informacione të rëndësishme mund të marrim duke bërë një ekzaminim forenzik.

Gjithashtu do të diskutohet edhe për shumë çelësa të regjistrit (Registry KEY) të cilët janë shumë të domosdoshëm në një ekzaminim. Forenzika Kompjuterike (Forenzika Digjitale) është aplikimi i teknikave të hetimit dhe analizimit për të mbledhur dhe …


Access Control In And For The Real World, Sara Sinclair Nov 2013

Access Control In And For The Real World, Sara Sinclair

Dartmouth College Ph.D Dissertations

Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly little attention has been paid to how well these models work in real socio-technical systems (i.e., real human organizations). This dissertation describes the results of two qualitative studies (involving 52 participants from four companies, drawn from the financial, software, and healthcare sectors) and observes that the current practice of access control is dysfunctional at best. It diagnoses the broken assumptions that are at the heart of this dysfunction, …


The Influence Of Mobile Website Quality On Consumer Satisfaction And Behavior, Xiuyuan Gao Nov 2013

The Influence Of Mobile Website Quality On Consumer Satisfaction And Behavior, Xiuyuan Gao

Department of Textiles, Merchandising, and Fashion Design: Dissertations, Theses, and Student Research

Mobile shopping has grown into a huge market and an increasing number of consumers have begun to use mobile websites to shop. Therefore, how mobile shopping websites provide good shopping to customers is significant. The object of this study is to relate factors of website quality to college students’ satisfaction with mobile shopping experiences, which in turn influence their intentions to return to the website and/or to purchase on the website. Five dimensions of website quality, which were information quality, navigation, visual appeal, response time and interactivity, were selected in this study. The model of self-regulatory process (Bagozzi, 1992) has …


Design And Analysis Of Digital True Random Number Generator, Avantika Yadav Oct 2013

Design And Analysis Of Digital True Random Number Generator, Avantika Yadav

Theses and Dissertations

Random number generator is a key component for strengthening and securing the confidentiality of electronic communications. Random number generators can be divided as either pseudo random number generators or true random number generators. A pseudo random number generator produces a stream of numbers that appears to be random but actually follow predefined sequence. A true random number generator produces a stream of unpredictable numbers that have no defined pattern. There has been growing interest to design true random number generator in past few years. Several Field Programmable Gate Array (FPGA) and Application Specific Integrated Circuit (ASIC) based approaches have been …


Talking The Talk: An Exploration Of Parent-Child Communication About Cyberbullying, Veronica Anne Droser Oct 2013

Talking The Talk: An Exploration Of Parent-Child Communication About Cyberbullying, Veronica Anne Droser

Dissertations and Theses

Technology has, without a doubt, altered the social fabric of society. Mediated forms of communication have paved the way for more efficient production, and the vast amount of information available online has given people the opportunity to be more informed than ever. However, the rise of mediated communication has also presented a number of new threats. The current study focused on one of these threats, cyberbullying, and was interested in looking at how parents talk about and understand their child's cyberbullying behavior.

This study had the goal of uncovering if parents talk to their child about cyberbullying, and how they …


The Lifetime Experiences Of Being Labeled “Gifted”: Case Studies Of Adults Who Participated In A 1959 Public School Gifted Program, John R. Beckerle Oct 2013

The Lifetime Experiences Of Being Labeled “Gifted”: Case Studies Of Adults Who Participated In A 1959 Public School Gifted Program, John R. Beckerle

Dissertations

The purpose of the study was to explore the current perceptions of adults who were enrolled in the gifted program of the St. Louis Public Schools in the fall of 1959 or spring of 1960. At this time in history the Cold War was a reality and the U.S. enacted the National Defense Education Act (NDEA) to find talented young people and give them the opportunity to excel academically. The program in this research was already in place when the NDEA was put into effect. A pool of 62 potential subjects was identified and 33 accepted the invitation to participate. …


Use Of Immersive Visualization For The Control Of Dental Anxiety During Dental Hygiene Treatment, Carmelo Padrino-Barrios Oct 2013

Use Of Immersive Visualization For The Control Of Dental Anxiety During Dental Hygiene Treatment, Carmelo Padrino-Barrios

Dental Hygiene Theses & Dissertations

Purpose: The purpose of this study was to determine the effectiveness of immersive visualization (IV) therapy, a technique that provides visual and stereoscopic display through the use of eyewear, in anxious patients during an oral prophylaxis. Methods: A convenience sample of thirty adults was enrolled. A split mouth design was utilized. Subjects were randomly divided into two groups: group A (use of IV for the right side of the mouth), and group B (use of IV for the left side of the mouth). Subjects received a full mouth oral prophylaxis (removal of supra and subgingival calculus and selective polishing), always …


Metamorphic Detection Using Singular Value Decomposition, Ranjith Kumar Jidigam Oct 2013

Metamorphic Detection Using Singular Value Decomposition, Ranjith Kumar Jidigam

Master's Projects

Metamorphic malware changes its internal structure with each infection, while maintaining its original functionality. Such malware can be difficult to detect using static techniques, since there may be no common signature across infections. In this research we apply a score based on Singular Value Decomposition (SVD) to the problem of metamorphic detection. SVD is a linear algebraic technique which is applicable to a wide range of problems, including facial recognition. Previous research has shown that a similar facial recognition technique yields good results when applied to metamorphic malware detection. We present experimental results and we analyze the effectiveness and efficiency …


The Hope Of An Open Hand: Civility As An Invitation To Incarnational Ministry, Kevin Dwight Glenn Oct 2013

The Hope Of An Open Hand: Civility As An Invitation To Incarnational Ministry, Kevin Dwight Glenn

Doctor of Ministry

No abstract provided.


A Guide To Event Promotion: Internet Marketing For A Live Musical Event In Las Vegas, Kelly C. Quinnan Oct 2013

A Guide To Event Promotion: Internet Marketing For A Live Musical Event In Las Vegas, Kelly C. Quinnan

UNLV Theses, Dissertations, Professional Papers, and Capstones

A global industry of festivals and musical events has evolved and developed rapidly especially since the late 1960’s starting with Woodstock. The industry continues today with large-scale multiple stage events that bring in over hundreds of thousands of people. Las Vegas is known by many as the city of entertainment, with world-renowned Cirque Du Soleil shows, poolside concerts at the Cosmopolitan, and the thriving Electric Daisy Carnival. The phenomenal growth of this industry coupled with increased consumer awareness and choice requires sustained development and expansion in the future. Concerts and festivals are unique events that attract audiences. Music-based events are …


Anonymous: Polemics And Non-Identity, Samuel Chiang Sep 2013

Anonymous: Polemics And Non-Identity, Samuel Chiang

Electronic Thesis and Dissertation Repository

The hacktivist collective Anonymous has been known to follow nonhierarchical, amorphous and sometimes contradictory strategies for online activism. This may weaken their potential to become a populist movement, as out-group members may find Anonymous’s politics obscure and out of reach. Anonymous’s communiqués compensate for this by enabling direct communication with the public. But as a critical discourse analysis finds, the communicative strategies employed deviate from logics of difference and non-identity. They express rigid beliefs, even at times under the banner of universal truth.

However, these findings do not suggest Anonymous inevitably embraces identity. By adopting a Deleuzian concept of minor …


Bullying Among Middle School Students, Paige Pfeiffer Sep 2013

Bullying Among Middle School Students, Paige Pfeiffer

Theses and Dissertations

The purpose of this study was to examine the differences in opinions between students and the staff (teachers, non-certified support staff and certified support staff) in a suburban middle school with regard to bullying. The researcher summarized data from a survey administered to 671 participants within the school setting. The researcher analyzed which questions were relevant to the hypothesis, twelve questions were scored and the scores of students were then compared using a t-test to those of teachers, non-certified support staff and certified support staff. Overall, significant differences were noted between student and staff perceptions of bullying, and scores of …


Shifting Identities In A Globalising Metro Manila, Patrick Belin Sep 2013

Shifting Identities In A Globalising Metro Manila, Patrick Belin

University Honors Theses

This paper investigates the Philippine capital of Metro Manila, how it has been redeveloping as a "global city" over the past decade, and how the urban population has been negotiating the remarkable changes to their spatial, economic and sociocultural environment. The investigation assumes that a shift is occurring in the way that Filipinos identify with their country, moving from a national to a more international focus. Examined here are Metro Manila's premier global city site, Bonifacio Global City (BGC), public symbols of a Filipino nationalism, and the significant impact of the Philippine business process outsourcing (BPO) industry within the country's …


Expressive Writing As An Adjunct To Talk Therapy : Considerations For A Creative Intervention For Depressive Disorders, Anna C. Hogeland Sep 2013

Expressive Writing As An Adjunct To Talk Therapy : Considerations For A Creative Intervention For Depressive Disorders, Anna C. Hogeland

Theses, Dissertations, and Projects

This theoretical thesis offers considerations for expressive writing as an adjunct to talk therapy, particularly for adults with depressive disorders and ruminative thoughts. This thesis asks: how do theories and empirical studies inform the use of expressive writing as an adjunct to talk therapy in adults with depressive disorders to decrease ruminations, and how can clinicians integrate this treatment intervention into practice? The primary aims of this thesis are to expand upon the limited knowledge about the therapeutic effects of expressive writing, to offer direction for further research, and to propose a model for the implementation of expressive writing into …


The Ecology Of Bullying : How Might Counselors' Reflections On Bullying Improve School-Based Interventions?, Mary K. GutiéRrez Sep 2013

The Ecology Of Bullying : How Might Counselors' Reflections On Bullying Improve School-Based Interventions?, Mary K. GutiéRrez

Theses, Dissertations, and Projects

Schools are struggling to find intervention and prevention plans that will be effective in preventing and intervening in bullying. Phone interviews and online surveys were conducted with 16 respondents - a cross-section of child and school counselors - to find what they have found most and least helpful. Overall, participants agreed that they continue to struggle to find effective ways of preventing, managing and responding to bullying incidents and the overall culture that induces bullying. The majority of respondents felt their schools' policies and/or actions were not effective or not effective enough, however, those who worked in schools that used …


Facebook And Relationships: A Study Of How Social Media Use Is Affecting Long-Term Relationships, Rianne C. Farrugia Sep 2013

Facebook And Relationships: A Study Of How Social Media Use Is Affecting Long-Term Relationships, Rianne C. Farrugia

Theses

An online survey was conducted where 255 respondents provided information about their significant other. Respondents answered questions dealing with elements of relationship satisfaction, Facebook usage, surveillance, and jealousy. Results indicate a correlation between Facebook usage and relationship satisfaction. Individuals with varying levels of Facebook usage were shown to have a positive correlation with jealousy levels in their relationship, meaning as Facebook use increased, jealousy also increased. Altman and Taylor's theory of social penetration (1973) was used to describe the stages in a relationship from orientation into a relationship of stable exchange. This developmental theory illustrated the growth in relationship phases. …


Modeling And Control Of A Dynamic Information Flow Tracking System, Maria Khater Sep 2013

Modeling And Control Of A Dynamic Information Flow Tracking System, Maria Khater

Electrical and Computer Engineering ETDs

This thesis introduces and details the effort of modeling and control design of an information tracking system for computer security purposes. It is called Dynamic Information Flow Tracking (DIFT) system. The DIFT system is developed at the Computer Science Department at the University of New Mexico, works by tagging data and tracking it to measure the information flow throughout the system. DIFT can be used for several security applications such as securing sensor networks and honeypot - which is a trap set to detect, deflect, or counteract attempts at unauthorized use of information systems. Existing DIFT systems cannot track address …


Music And Conflict Resolution: Can A Music And Story Centered Workshop Enhance Empathy?, Parfait Adegboyé Bassalé Sep 2013

Music And Conflict Resolution: Can A Music And Story Centered Workshop Enhance Empathy?, Parfait Adegboyé Bassalé

Dissertations and Theses

The Story and Song Centered Pedagogy (SSCP) is a workshop that uses songs, stories and reflective questioning to increase empathy. This preliminary study tested the prediction that being exposed to the SSCP would increase empathy using, the Emotional Concern (EC) and Perspective Taking (PT) subscales of the renowned Interpersonal Reactivity Index (IRI) (Davis, 1990). Subjects self-reported their answers to the IRI before and after undergoing the SSCP intervention. Comparing their pre and post intervention results, no statistically significant changes were noticed for the EC and PT scales (p-value = 0.7093 for EC; p-value = 0.6328 for PT). These results stand …


Distributed Agent Cloud-Sourced Malware Reporting Framework, Kellie Elizabeth Kercher Sep 2013

Distributed Agent Cloud-Sourced Malware Reporting Framework, Kellie Elizabeth Kercher

Theses and Dissertations

Malware is a fast growing threat that consists of a malicious script or piece of software that is used to disrupt the integrity of a user's experience. Antivirus software can help protect a user against these threats and there are numerous vendors users can choose from for their antivirus protection. However, each vendor has their own set of virus definitions varying in resources and capabilities in recognizing new threats. Currently, a persistent system is not in place that measures and displays data on the performance of antivirus vendors in responding to new malware over a continuous period of time. There …


Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone Sep 2013

Radio Frequency Based Programmable Logic Controller Anomaly Detection, Samuel J. Stone

Theses and Dissertations

The research goal involved developing improved methods for securing Programmable Logic Controller (PLC) devices against unauthorized entry and mitigating the risk of Supervisory Control and Data Acquisition (SCADA) attack by detecting malicious software and/or trojan hardware. A Correlation Based Anomaly Detection (CBAD) process was developed to enable 1) software anomaly detection discriminating between various operating conditions to detect malfunctioning or malicious software, firmware, etc., and 2) hardware component discrimination discriminating between various hardware components to detect malfunctioning or counterfeit, trojan, etc., components.


Time Orientation, Rational Choice And Deterrence: An Information Systems Perspective, Michael Brian Pope Aug 2013

Time Orientation, Rational Choice And Deterrence: An Information Systems Perspective, Michael Brian Pope

Theses and Dissertations

The present study examines General Deterrence Theory (GDT) and its "parent," Rational Choice Theory (RCT), in an information security setting, assessing the behavioral intent to violate organizational policy under varying levels of certainty, severity and celerity of negative sanction. Also assessed is the individual computer user's time orientation, as measured by the Consideration of Future Consequences (CFC) instrument (Strathman et. al, 1994). How does rational consideration of violation rewards influence the impact of sanctions on individuals? How does time orientation impact intent to violate security policy? How do these operate in an IS context? These questions are examined by assessing …


Minimal Trusted Computing Base For Critical Infrastructure Protection, Arun Velagapalli Aug 2013

Minimal Trusted Computing Base For Critical Infrastructure Protection, Arun Velagapalli

Theses and Dissertations

Critical infrastructures like oil & gas, power grids, water treatment facilities, domain name system (DNS) etc., are attractive targets for attackers — both due to the potential impact of attacks on such systems, and due to the enormous attack surface exposed by such systems. Unwarranted functionality in the form of accidental bugs or maliciously inserted hidden functionality in any component of a system could potentially be exploited by attackers to launch attacks on the system. As it is far from practical to root out undesired functionality in every component of a complex system, it is essential to develop security measures …


Comparison Of Student Achievement Among Two Science Laboratory Types: Traditional And Virtual, Mary Celeste Reese Aug 2013

Comparison Of Student Achievement Among Two Science Laboratory Types: Traditional And Virtual, Mary Celeste Reese

Theses and Dissertations

Technology has changed almost every aspect of our daily lives. It is not surprising then that technology has made its way into the classroom. More and more educators are utilizing technological resources in creative ways with the intent to enhance learning, including using virtual laboratories in the sciences in place of the “traditional” science laboratories. This has generated much discussion as to the influence on student achievement when online learning replaces the face-toace contact between instructor and student. The purpose of this study was to discern differences in achievement of two laboratory instruction types: virtual laboratory and a traditional laboratory. …


Reliability Assessment Of Smart Grid Considering Cyber-Power Interdependencies, Bamdad Falahati Aug 2013

Reliability Assessment Of Smart Grid Considering Cyber-Power Interdependencies, Bamdad Falahati

Theses and Dissertations

Smart grid initiatives are becoming more and more achievable through the use of information infrastructures that feature peer-to-peer communication, monitoring, protection and automated control. The analysis of smart grid operation requires considering the reliability of the cyber network as it is neither invulnerable nor failure free. The objective of this dissertation is to categorize interdependencies between cyber and power networks and propose mathematical evaluation models to calculate the reliability of the power network when considering failures of the cyber network. This study categorizes interdependencies between cyber and power networks into direct and indirect. In this research direct interdependencies among cyber-power …


Persuasion In Political Discourse: Tunisian President Ben Ali's Last Speech As A Case Stud, Soufien Jarraya Aug 2013

Persuasion In Political Discourse: Tunisian President Ben Ali's Last Speech As A Case Stud, Soufien Jarraya

Theses - ALL

Within a discourse analysis framework, this research investigates persuasion in political discourse in the last speech of the former Tunisian president Zine El Abidine Ben Ali, delivered one day before he left the country in the middle of the Tunisian Revolution that sparked the so-called Arab Spring.

Sentences are analyzed to check their illocutionary force in light of Searle's typology of Speech Act Theory. Then, an analysis of agency is carried out to investigate the persuasive dimension of the use of deictic pronouns to construct the self-image as well as the image of the Other. The speech is also examined …


Development And Integration Of Informatic Tools For Qualitative And Quantitative Characterization Of Proteomic Datasets Generated By Tandem Mass Spectrometry, Rachel Michelle Adams Aug 2013

Development And Integration Of Informatic Tools For Qualitative And Quantitative Characterization Of Proteomic Datasets Generated By Tandem Mass Spectrometry, Rachel Michelle Adams

Doctoral Dissertations

Shotgun proteomic experiments provide qualitative and quantitative analytical information from biological samples ranging in complexity from simple bacterial isolates to higher eukaryotes such as plants and humans and even to communities of microbial organisms. Improvements to instrument performance, sample preparation, and informatic tools are increasing the scope and volume of data that can be analyzed by mass spectrometry (MS). To accommodate for these advances, it is becoming increasingly essential to choose and/or create tools that can not only scale well but also those that make more informed decisions using additional features within the data. Incorporating novel and existing tools into …


The Journey To Teaching Online: A Case Study Of Faculty Preparation And Experiences In Online Teaching, Angel Chi Aug 2013

The Journey To Teaching Online: A Case Study Of Faculty Preparation And Experiences In Online Teaching, Angel Chi

Electronic Theses and Dissertations

When Bill Gates published his book "The Road Ahead" (1995), he summarized the transformative implications of the personal computing revolution and described a future profoundly changed by the arrival of a global information super highway. Almost twenty years later, the tsunami of online programs and the MOOCs (massive online open courses) is impacting the structural integrity of postsecondary institutions and changing the competitive landscape of higher learning at an unprecedented pace. When Allen and Seaman (2013) asked the question of whether faculty acceptance of online education increased in their Sloan Consortium annual report, only 30.2% of chief academic …