Barrett, The Honors College at Arizona State University proudly showcases the work of undergraduate honors students by sharing this collection exclusively with the ASU community.

Barrett accepts high performing, academically engaged undergraduate students and works with them in collaboration with all of the other academic units at Arizona State University. All Barrett students complete a thesis or creative project which is an opportunity to explore an intellectual interest and produce an original piece of scholarly research. The thesis or creative project is supervised and defended in front of a faculty committee. Students are able to engage with professors who are nationally recognized in their fields and committed to working with honors students. Completing a Barrett thesis or creative project is an opportunity for undergraduate honors students to contribute to the ASU academic community in a meaningful way.

Displaying 1 - 10 of 13
Filtering by

Clear all filters

134325-Thumbnail Image.png
Description
This thesis project examines the likely factors that cause students to drop out of Barrett, the Honors College. Honors literature regarding retention and attrition suggests four areas encompassing individual student attributes and honors program characteristics which may impact a student's decision to stay or leave an Honors College. The primary

This thesis project examines the likely factors that cause students to drop out of Barrett, the Honors College. Honors literature regarding retention and attrition suggests four areas encompassing individual student attributes and honors program characteristics which may impact a student's decision to stay or leave an Honors College. The primary question in focus is, "Why do students leave the Honors College?" followed by the tertiary questions of, "what can be done to mitigate this occurrence?" and, "how does this affect the quality of an honors education?" Assessing attrition can be broken down into biographical, cognitive-behavioral, socio-environmental, and institutional-instrumental components. Students who graduated with honors and those who did not graduate with honors were assessed on these four components through survey methods and qualitative interviews to investigate specific reasons why students leave the honors program. The results indicated a wide array of reasons impacting student attrition, the most significant being negative perceptions towards (1) honors courses and contracts, (2) difficulty completing a thesis project, and (3) finding little to no value in "graduating with honors." Each of these reasons reflect the institutional-instrumental component of student attrition, making it the most salient group of reasons why students leave the Honors College. The socio-environmental component also influences student attrition through peer influence and academic advisor support, though this was found to be within the context of institutional-instrumental means. This project offers solutions to ameliorate each of the four components of attrition by offering standardized honors contracts and more mandatory honors classes, mandatory thesis preparatory courses instead of workshops, and emphasizing the benefit Barrett gives to students as a whole. These solutions aim at increasing graduation rates for future honors students at Barrett as well as improving the overall quality of an honors education.
ContributorsSanchez, Gilbert Xavier (Author) / Parker, John (Thesis director) / O'Flaherty, Katherine (Committee member) / School of Criminology and Criminal Justice (Contributor) / Department of Psychology (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
134610-Thumbnail Image.png
Description
Undergraduate on-campus residential education is a topic of significant inquiry within the field of higher education, and specifically student affairs. It has become commonplace for institutions of higher education in the United States to leverage the intersections between academics and residence life in order to promote student success by offering

Undergraduate on-campus residential education is a topic of significant inquiry within the field of higher education, and specifically student affairs. It has become commonplace for institutions of higher education in the United States to leverage the intersections between academics and residence life in order to promote student success by offering on-campus housing options that strategically place students in residential communities that provide additional connection to the students' academic experience, often by major, college, department, or other focus areas. Such models vary by institution, but are often referred to as living-learning communities or residential colleges, depending upon their structure and goals. For example, Barrett, the Honors College on the Tempe campus of Arizona State University implements a residential college model within its student housing; honors students live and study together, with the addition of three "special communities" designed for students majoring in Engineering, Business, or the Arts. This honors thesis case study describes and investigates the impact the visual and performing arts Barrett residential community has upon its residents in their first-year college experience. Through the lens of student development theory, this research focuses upon examining this specific residential community in detail in order to gain an understanding of its effect upon residents' academic and personal well being.
ContributorsBieschke, Sara Danielle (Author) / O'Flaherty, Katherine (Thesis director) / Rendell, Dawn (Committee member) / School of Art (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
134395-Thumbnail Image.png
Description"Writing the Races" is a documentary exploring how two writers talk about race in their comedy television shows. http://www.writingtheraces.com/
ContributorsTyau, Nicole Jenice (Author) / Rodriguez, Rick (Thesis director) / O'Flaherty, Katherine (Committee member) / Walter Cronkite School of Journalism and Mass Communication (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
134762-Thumbnail Image.png
Description
IoT Media broadcast devices, such as the Roku stick, Amazon Fire, and Chromecast have been emerging onto the market recently as a portable and inexpensive alternative to cable and disk players, allowing easy integration between home and business Wi-Fi networks and television systems capable of supporting HDMI inputs without the

IoT Media broadcast devices, such as the Roku stick, Amazon Fire, and Chromecast have been emerging onto the market recently as a portable and inexpensive alternative to cable and disk players, allowing easy integration between home and business Wi-Fi networks and television systems capable of supporting HDMI inputs without the additional overhead of setting up a heavy or complicated player or computer. The rapid expansion of these products as a mechanism to provide for TV Everywhere services for entertainment as well as cheap office appliances brings yet another node in the rapidly expanding network of IoT that surrounds us today. However, the security implications of these devices are nearly unexplored, despite their prevalence. In this thesis, I will go over the structure and mechanisms of Chromecast, and explore some of the potential exploits and consequences of the device. The thesis contains an overview of the inner workings of Chromecast, goes over the segregation and limited control and fundamental design choices of the Android based OS. It then identifies the objectives of security, four different potential methods of exploit to compromise those objectives on a Chromecast and/or its attached network, including rogue applications, traffic sniffing, evil access points and the most effective one: deauthentication attack. Tests or relevant analysis were carried out for each of these methods, and conclusions were drawn on their effectiveness. There is then a conclusion revolving around the consequences, mitigation and the future implications of security issues on Chromecast and the larger IoT landscape.
ContributorsHuang, Kaiyi (Author) / Zhao, Ziming (Thesis director) / Ahn, Gail-Joon (Committee member) / W. P. Carey School of Business (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
134439-Thumbnail Image.png
Description
In the area of hardware, reverse engineering was traditionally focused on developing clones—duplicated components that performed the same functionality of the original component. While reverse engineering techniques have been applied to software, these techniques have instead focused on understanding high-level software designs to ease the software maintenance burden. This approach

In the area of hardware, reverse engineering was traditionally focused on developing clones—duplicated components that performed the same functionality of the original component. While reverse engineering techniques have been applied to software, these techniques have instead focused on understanding high-level software designs to ease the software maintenance burden. This approach works well for traditional applications that contain source code, however, there are circumstances, particularly regarding web applications, where it would be very beneficial to clone a web application and no source code is present, e.g., for security testing of the application or for offline mock testing of a third-party web service. We call this the web application cloning problem.
This thesis presents a possible solution to the problem of web application cloning. Our approach is a novel application of inductive programming, which we call inductive reverse engineering. The goal of inductive reverse engineering is to automatically reverse engineer an abstraction of the web application’s code in a completely black-box manner. We build this approach using recent advances in inductive programming, and we solve several technical challenges to scale the inductive programming techniques to realistic-sized web applications. We target the initial version of our inductive reverse engineering tool to a subset of web applications, i.e., those that do not store state and those that do not have loops. We introduce an evaluation methodology for web application cloning techniques and evaluate our approach on several real-world web applications. The results indicate that inductive reverse engineering can effectively reverse engineer specific types of web applications. In the future, we hope to extend the power of inductive reverse engineering to web applications with state and to learn loops, while still maintaining tractability.
ContributorsLiao, Kevin (Author) / Doupe, Adam (Thesis director) / Ahn, Gail-Joon (Committee member) / Zhao, Ziming (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / W. P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
134721-Thumbnail Image.png
Description
Every year, millions of people find themselves displaced from their homes because of fear or threats of violence. Some of these people will become refugees, who will then be resettled in the United States. In order to help with the resettlement process, refugees are given cultural orientations through their resettlement

Every year, millions of people find themselves displaced from their homes because of fear or threats of violence. Some of these people will become refugees, who will then be resettled in the United States. In order to help with the resettlement process, refugees are given cultural orientations through their resettlement organizations. The Phoenix Police Department teaches one of these cultural orientations for local resettlement agencies in order to dispel some of the fears refugees have about law enforcement and build a stronger relationship with the refugee community. Past research on this topic has been limited within the United States, but communities are still trying to figure out how to interact with refugees despite not knowing how to do it. There are various possible complications inherent in the integration process and many potential methods of trust building available to the refugee community and public services like law enforcement. This project seeks to understand the refugee resettlement process through field observation of the cultural orientation taught by the Phoenix Police Department and interviews with detectives familiar with the process in Phoenix. Cultural and language differences as well as lack of education and research on the topic of refugee resettlement are all key points in comprehending what the police, refugees, and resettlement organizations are doing during the integration process. Once these issues are addressed to alleviate gaps in knowledge about refugees, it may be possible to adjust the process to be easier for stakeholders involved in refugee resettlement.
ContributorsBaumgartner, Rachel Paige (Author) / Telep, Cody (Thesis director) / O'Flaherty, Katherine (Committee member) / Department of Psychology (Contributor) / School of Criminology and Criminal Justice (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
134548-Thumbnail Image.png
Description
This creative project is a collection of profiles focused on Arizona nonprofits and refugees. The profiles share stories of refugees, volunteers, employees and others involved in the community serving refugees. Nonprofits are a vital resource for refugee resettlement. These organizations offer services to support refugees as they transition into new

This creative project is a collection of profiles focused on Arizona nonprofits and refugees. The profiles share stories of refugees, volunteers, employees and others involved in the community serving refugees. Nonprofits are a vital resource for refugee resettlement. These organizations offer services to support refugees as they transition into new communities. Some services include: housing, English language learning, cultural orientation, job placement, medical treatment, education, and farming. Each of these programs support resiliency for refugees and for the communities in which they live. We Are Resilient was created first, to show the important role nonprofits have in serving refugees. Second, to connect people to a few of the stories and experiences within the Arizona refugee community. And third, to build understanding of the strength refugees bring to communities of Arizona and by extension the country. Visit weareresilientaz.com to learn more.
ContributorsGray, Elizabeth (Co-author) / Johnson, Kelcie (Co-author) / Shockley, Gordon (Thesis director) / O'Flaherty, Katherine (Committee member) / School of Community Resources and Development (Contributor) / School of Sustainability (Contributor) / Walter Cronkite School of Journalism and Mass Communication (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
134648-Thumbnail Image.png
Description
Postmodernism has been one of the dominant modes of thought in literature and philosophy since the 1960s, but its roots go back much further. This thesis is an examination of Brechtian frameworks in an assortment of popular postmodern works. Both literary texts, such as novels, films, and music, and philosophical

Postmodernism has been one of the dominant modes of thought in literature and philosophy since the 1960s, but its roots go back much further. This thesis is an examination of Brechtian frameworks in an assortment of popular postmodern works. Both literary texts, such as novels, films, and music, and philosophical texts are used to form a general understanding of the postmodern project, and these concepts are then placed in conversation with ideas from the works of the 20th century German playwright Bertolt Brecht. I found that despite certain differences, the central ideas of postmodernism can be seen as the extension of Brecht’s philosophy, especially his concept of the Verfremdungseffekt. First, multiplicity—in perspectives and understandings—can be seen as an attempt to achieve this Verfremdungseffekt in the reader, and second, transgression in these texts can be used to evoke the same feeling. Many of the identifying techniques of postmodernism, e.g. juxtaposition, unreliable narrator, self-reference, and so on, can be interpreted as the extension of ideas pioneered by Brecht in the 1920s and 1930s. My thesis illustrates these connections.
Keywords: Postmodernism, Bertolt Brecht, Verfremdungseffekt
ContributorsTeipen, Jakob Corry (Author) / Gilfillan, Daniel (Thesis director) / O'Flaherty, Katherine (Committee member) / School of International Letters and Cultures (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
134346-Thumbnail Image.png
Description
Malware forensics is a time-consuming process that involves a significant amount of data collection. To ease the load on security analysts, many attempts have been made to automate the intelligence gathering process and provide a centralized search interface. Certain of these solutions map existing relations between threats and can discover

Malware forensics is a time-consuming process that involves a significant amount of data collection. To ease the load on security analysts, many attempts have been made to automate the intelligence gathering process and provide a centralized search interface. Certain of these solutions map existing relations between threats and can discover new intelligence by identifying correlations in the data. However, such systems generally treat each unique malware sample as its own distinct threat. This fails to model the real malware landscape, in which so many ``new" samples are actually variants of samples that have already been discovered. Were there some way to reliably determine whether two malware samples belong to the same family, intelligence for one sample could be applied to any sample in the family, greatly reducing the complexity of intelligence synthesis. Clustering is a common big data approach for grouping data samples which have common features, and has been applied in several recent papers for identifying related malware. It therefore has the potential to be used as described to simplify the intelligence synthesis process. However, existing threat intelligence systems do not use malware clustering. In this paper, we attempt to design a highly accurate malware clustering system, with the ultimate goal of integrating it into a threat intelligence platform. Toward this end, we explore the many considerations of designing such a system: how to extract features to compare malware, and how to use these features for accurate clustering. We then create an experimental clustering system, and evaluate its effectiveness using two different clustering algorithms.
ContributorsSmith, Joshua Michael (Author) / Ahn, Gail-Joon (Thesis director) / Zhao, Ziming (Committee member) / School of Mathematical and Statistical Sciences (Contributor) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
134266-Thumbnail Image.png
Description
Node.js is an extremely popular development framework for web applications. The appeal of its event-driven, asynchronous flow and the convenience of JavaScript as its programming language have driven its rapid growth, and it is currently deployed by leading companies in retail, finance, and other important sectors. However, the tools currently

Node.js is an extremely popular development framework for web applications. The appeal of its event-driven, asynchronous flow and the convenience of JavaScript as its programming language have driven its rapid growth, and it is currently deployed by leading companies in retail, finance, and other important sectors. However, the tools currently available for Node.js developers to secure their applications against malicious attackers are notably scarce. While there has been a substantial amount of security tools created for web applications in many other languages such as PHP and Java, very little exists for Node.js applications. This could compromise private information belonging to companies such as PayPal and WalMart. We propose a tool to statically analyze Node.js web applications for five popular vulnerabilites: cross-site scripting, SQL injection, server-side request forgery, command injection, and code injection. We base our tool off of JSAI, a platform created to parse client-side JavaScript for security risks. JSAI is novel because of its configuration capabilities, which allow a user to choose between various analysis options at runtime in order to select the most thorough analysis with the least amount of processing time. We contribute to the development of our tool by rigorously analyzing and documenting vulnerable functions and objects in Node.js that are relevant to the vulnerabilities we have selected. We intend to use this documentation to build a robust Node.js static analysis tool and we hope that other developers will also incorporate this analysis into their Node.js security projects.
ContributorsWasserman, Jonathan Kanter (Author) / Doupe, Adam (Thesis director) / Ahn, Gail-Joon (Committee member) / Zhao, Ziming (Committee member) / School of Historical, Philosophical and Religious Studies (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05