Open Access. Powered by Scholars. Published by Universities.®

Communication Technology and New Media Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Communication Technology and New Media

The Future Is Full Of Monsters: Queer Survival One Click At A Twine, 'Aolani N. Robinson Dec 2021

The Future Is Full Of Monsters: Queer Survival One Click At A Twine, 'Aolani N. Robinson

All HCAS Student Capstones, Theses, and Dissertations

Spurred by a desire to explore queer rhetoric through interactive forms of media, this project analyzed the game-making program Twine to uncover how independent queer creators use the tool to explore queer survival against time, capitalism, and constrained identities. A more accessible platform than other game-making tools, Twine’s unique interactivity puts the ability to make interactive games and stories into the hands of indie marginalized creators who are often overlooked in both mainstream gaming and queer rhetorics (Anthropy, 2012). Thus, this thesis contributes to queer rhetoric, game studies, and trans rhetorics by exploring the strategies indie Twine creators use in …


Navigating Conversations Of Environmentalism On Social Media: From The Apocalyptic To The Aesthetic, Megan Provenzale Apr 2021

Navigating Conversations Of Environmentalism On Social Media: From The Apocalyptic To The Aesthetic, Megan Provenzale

All HCAS Student Capstones, Theses, and Dissertations

This project examines environmental discourse and rhetorical appeals used on Instagram by environmental influencers and addresses the lack of scholarship about social mobile commerce, Instagram, and the popularity of “eco-influencers.” My research applies post-composition studies, circulation, and visual rhetoric to two eco-influencers, Greta Thunberg (@gretathunbeerg) and Jessica Clifton (@impactforgood). I argue that Thunberg and Clifton employ aesthetic and apocalyptic rhetoric to educate and communicate with their following about reducing their carbon footprint and reversing climate change. By collecting three months of Instagram posts employed by each influencer, I identify patterns related to environmentalism, stylistic choices in captions, and presentation of …


Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle Jan 2021

Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle

CCE Theses and Dissertations

Decreasing hours dedicated to teaching anatomy courses and declining use of human cadavers have spurred the need for innovative solutions in teaching anatomy in medical schools. Advancements in virtual reality (VR), 3D visualizations, computer graphics, and medical graphic images have enabled the development of highly interactive 3D virtual applications. Over recent years, variations of interactive systems on computer-mediated environments have been used as supplementary resource for learners. However, despite the growing sophistication of these resources for learning anatomy, studies show that students predominantly prefer traditional methods of learning and hands-on cadaver-based learning over computer-mediated platforms.

There is limited research on …


An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung Jan 2021

An Empirical Examination Of The Computer Security Behaviors Of Telecommuters Working With Confidential Data Through Leveraging The Factors From Fear Appeals Model (Fam), Titus Dohnfon Fofung

CCE Theses and Dissertations

Computer users’ security compliance behaviors can be better understood by devising an experimental study to examine how fear appeals might impact users’ security behavior. Telecommuter security behavior has become very relevant in information systems (IS) research with the growing number of individuals working from home. The increasing dependence on telecommuting to enhance the viability and convenience has created an urgency with the advent of the COVID-19 pandemic to examine the behavior of users working at home across a corporate network. The home networks are usually not as secure as those in corporate settings. There is seldom a firewall setting and …