Open Access. Powered by Scholars. Published by Universities.®

Arts and Humanities Commons

Open Access. Powered by Scholars. Published by Universities.®

Nova Southeastern University

CEC Theses and Dissertations

Discipline
Keyword
Publication Year

Articles 1 - 4 of 4

Full-Text Articles in Arts and Humanities

Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra Jan 2016

Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra

CEC Theses and Dissertations

The use of video podcasts in education has emerged as a phenomenon that has gained a considerable amount of attention over the last few years. Although video podcasting is becoming a well-established technology in higher education, new multimedia instructional strategies such as student-created video podcasts in grades K-12 are under-researched.

The study investigated the effects of video podcasts created by students to promote foreign language grammar acquisition at the middle school level and find how students described such experience. The current investigation was conducted by using the explanatory sequential design, which is a mixed methods research design that occurs in ...


Leveling The Playing Field: Gender Inclusive Design For Single And Multiplayer Computer Role-Playing Games, Sandra N. Armstrong Jan 2016

Leveling The Playing Field: Gender Inclusive Design For Single And Multiplayer Computer Role-Playing Games, Sandra N. Armstrong

CEC Theses and Dissertations

Women represent 45% of the entire workforce in the United States, but only comprise 26% of the high-tech industry. Early introduction and interest in video games, contributes to computer literacy and self-confidence in terms of computing skills. Socially pervasive gender stereotypes, found in ubiquitous software, specifically games, factor in the alienation of young girls from active participation in computing. Currently marketed gaming software perpetuate this societal bias in the guise of overly-sexualized game avatars, and fail to adequately address documented female gaming preferences.

Gender inclusive design is more a pragmatic approach to ameliorating gender bias, than creating a pink box ...


Characterization Of Prose By Rhetorical Structure For Machine Learning Classification, James Java Jan 2015

Characterization Of Prose By Rhetorical Structure For Machine Learning Classification, James Java

CEC Theses and Dissertations

Measures of classical rhetorical structure in text can improve accuracy in certain types of stylistic classification tasks such as authorship attribution. This research augments the relatively scarce work in the automated identification of rhetorical figures and uses the resulting statistics to characterize an author's rhetorical style. These characterizations of style can then become part of the feature set of various classification models.

Our Rhetorica software identifies 14 classical rhetorical figures in free English text, with generally good precision and recall, and provides summary measures to use in descriptive or classification tasks. Classification models trained on Rhetorica's rhetorical measures ...


Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray Jan 2015

Virtue Ethics: Examining Influences On The Ethical Commitment Of Information System Workers In Trusted Positions, John Max Gray

CEC Theses and Dissertations

Despite an abundance of research on the problem of insider threats, only limited success has been achieved in preventing trusted insiders from committing security violations. Virtue ethics may be an approach that can be utilized to address this issue. Human factors such as moral considerations impact Information System (IS) design, use, and security; consequently they affect the security posture and culture of an organization. Virtue ethics based concepts have the potential to influence and align the moral values and behavior of information systems workers with those of an organization in order to provide increased protection of IS assets. An individual ...