This collection includes both ASU Theses and Dissertations, submitted by graduate students, and the Barrett, Honors College theses submitted by undergraduate students. 

Displaying 1 - 10 of 139
151824-Thumbnail Image.png
Description
There is a lack of music therapy services for college students who have problems with depression and/or anxiety. Even among universities and colleges that offer music therapy degrees, there are no known programs offering music therapy to the institution's students. Female college students are particularly vulnerable to depression and anxiety

There is a lack of music therapy services for college students who have problems with depression and/or anxiety. Even among universities and colleges that offer music therapy degrees, there are no known programs offering music therapy to the institution's students. Female college students are particularly vulnerable to depression and anxiety symptoms compared to their male counterparts. Many students who experience mental health problems do not receive treatment, because of lack of knowledge, lack of services, or refusal of treatment. Music therapy is proposed as a reliable and valid complement or even an alternative to traditional counseling and pharmacotherapy because of the appeal of music to young women and the potential for a music therapy group to help isolated students form supportive networks. The present study recruited 14 female university students to participate in a randomized controlled trial of short-term group music therapy to address symptoms of depression and anxiety. The students were randomly divided into either the treatment group or the control group. Over 4 weeks, each group completed surveys related to depression and anxiety. Results indicate that the treatment group's depression and anxiety scores gradually decreased over the span of the treatment protocol. The control group showed either maintenance or slight worsening of depression and anxiety scores. Although none of the results were statistically significant, the general trend indicates that group music therapy was beneficial for the students. A qualitative analysis was also conducted for the treatment group. Common themes were financial concerns, relationship problems, loneliness, and time management/academic stress. All participants indicated that they benefited from the sessions. The group progressed in its cohesion and the participants bonded to the extent that they formed a supportive network which lasted beyond the end of the protocol. The results of this study are by no means conclusive, but do indicate that colleges with music therapy degree programs should consider adding music therapy services for their general student bodies.
ContributorsAshton, Barbara (Author) / Crowe, Barbara J. (Thesis advisor) / Rio, Robin (Committee member) / Davis, Mary (Committee member) / Arizona State University (Publisher)
Created2013
152332-Thumbnail Image.png
Description
Using data from an eight-year longitudinal study of 214 children's social and emotional development, I conducted three studies to (1) examine patterns of agreement for internalizing (INT) and externalizing (EXT) symptomatology among different informants (mothers, fathers, teachers, and adolescents) using a recently developed structural equation modeling approach for multi-trait, multi-method

Using data from an eight-year longitudinal study of 214 children's social and emotional development, I conducted three studies to (1) examine patterns of agreement for internalizing (INT) and externalizing (EXT) symptomatology among different informants (mothers, fathers, teachers, and adolescents) using a recently developed structural equation modeling approach for multi-trait, multi-method data; (2) examine the developmental trajectories for INT and EXT and predict individual differences in symptom development using temperament and parenting variables; and (3) describe patterns of INT and EXT co-occurrence and predict these patterns from temperament and parenting. In Study 1, longitudinal invariance was established for mothers', fathers' and teachers' reports over a six-year period. Sex, age, and SES did not substantially moderate agreement among informants, although both sex and age were differentially related to symptomatology depending on the informant. Agreement among teachers and mothers, but not among mothers and fathers, differed by domain of symptomatology, and was greater for EXT than for INT. In Study 2, latent profile analysis, a person-centered analytic approach, did not provide easily interpretable patterns of symptom development, a failure that is likely the result of the relatively modest sample size. Latent growth curve models, an alternative analytic approach, did provide good fit to the data. Temperament and parenting variables were examined as predictors of the latent growth parameters in these models. Although there was little prediction of the slope, effortful control was negatively related to overall levels of EXT, whereas impulsivity and anger were positively related. Mutually responsive orientation, a measure of the parent-child relationship, was a more consistent predictor of EXT than was parental warmth. Furthermore, the relation between mutually responsive orientation and EXT was partially mediated by inhibitory control. Across informants, there were few consistent predictors of INT. In Study 3, latent profile analysis was used to classify individuals into different patterns of INT and EXT co-occurrence. In these models, a similar class structure was identified for mothers and for teachers. When temperament and parenting were examined as predictors of co-occurring symptomatology, few significant interactions were found and results largely replicated prior findings from this data set using arbitrary symptom groups.
ContributorsSulik, Michael John (Author) / Eisenberg, Nancy (Thesis advisor) / Spinrad, Tracy L (Thesis advisor) / Lemery-Chalfant, Kathryn (Committee member) / Wolchik, Sharlene A (Committee member) / Arizona State University (Publisher)
Created2013
152639-Thumbnail Image.png
Description
Sometimes difficult life events challenge our existing resources in such a way that routinized responses are inadequate to handle the challenge. Some individuals will persist in habitual, automatic behavior, regardless of environmental cues that indicate a mismatch between coping strategy and the demands of the stressor. Other individuals will marshal

Sometimes difficult life events challenge our existing resources in such a way that routinized responses are inadequate to handle the challenge. Some individuals will persist in habitual, automatic behavior, regardless of environmental cues that indicate a mismatch between coping strategy and the demands of the stressor. Other individuals will marshal adaptive resources to construct new courses of action and reconceptualize the problem, associated goals and/or values. A mixed methods approach was used to describe and operationalize cognitive shift, a relatively unexplored construct in existing literature. The study was conducted using secondary data from a parent multi-year cross-sectional study of resilience with eight hundred mid-aged adults from the Phoenix metro area. Semi-structured telephone interviews were analyzed using a purposive sample (n=136) chosen by type of life event. Participants' beliefs, assumptions, and experiences were examined to understand how they shaped adaptation to adversity. An adaptive mechanism, "cognitive shift," was theorized as the transition from automatic coping to effortful cognitive processes aimed at novel resolution of issues. Aims included understanding when and how cognitive shift emerges and manifests. Cognitive shift was scored as a binary variable and triangulated through correlational and logistic regression analyses. Interaction effects revealed that positive personality attributes influence cognitive shift most when people suffered early adversity. This finding indicates that a certain complexity, self-awareness and flexibility of mind may lead to a greater capacity to find meaning in adversity. This work bridges an acknowledged gap in literature and provides new insights into resilience.
ContributorsRivers, Crystal T (Author) / Zautra, Alex (Thesis advisor) / Davis, Mary (Committee member) / Kurpius, Sharon (Committee member) / Arizona State University (Publisher)
Created2014
153335-Thumbnail Image.png
Description
With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands.

With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands. However, with the introduction and rising use of wear- able technology and evolving uses of smart-phones, the concept of Internet of Things (IoT) has become a prevailing notion in the currently growing technology industry. Cisco Inc. has projected a data creation of approximately 403 Zetabytes (ZB) by 2018. The combination of bringing benign devices and connecting them to the web has resulted in exploding service and data aggregation requirements, thus requiring a new and innovative computing platform. This platform should have the capability to provide robust real-time data analytics and resource provisioning to clients, such as IoT users, on-demand. Such a computation model would need to function at the edge-of-the-network, forming a bridge between the large cloud data centers and the distributed connected devices.

This research expands on the notion of bringing computational power to the edge- of-the-network, and then integrating it with the cloud computing paradigm whilst providing services to diverse IoT-based applications. This expansion is achieved through the establishment of a new computing model that serves as a platform for IoT-based devices to communicate with services in real-time. We name this paradigm as Gateway-Oriented Reconfigurable Ecosystem (GORE) computing. Finally, this thesis proposes and discusses the development of a policy management framework for accommodating our proposed computational paradigm. The policy framework is designed to serve both the hosted applications and the GORE paradigm by enabling them to function more efficiently. The goal of the framework is to ensure uninterrupted communication and service delivery between users and their applications.
ContributorsDsouza, Clinton (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2015
153523-Thumbnail Image.png
Description
Low-income Mexican American women face significant risk for poor health during the postpartum period. Chronic stressors are theorized to negatively impact mental and physical health outcomes. However, physiological factors associated with increased self-regulatory capacity, such as resting heart rate variability, may buffer the impact of stress. In a sample of

Low-income Mexican American women face significant risk for poor health during the postpartum period. Chronic stressors are theorized to negatively impact mental and physical health outcomes. However, physiological factors associated with increased self-regulatory capacity, such as resting heart rate variability, may buffer the impact of stress. In a sample of 322 low-income Mexican American women (mother age 18-42; 84% Spanish-speaking; modal family income $10,000-$15,000), the interactive influence of resting heart rate variability and three chronic prenatal stressors (daily hassles, negative life events, economic stress) on maternal cortisol output, depressive symptoms, and self-rated health at 12 weeks postpartum was assessed. The hypothesized interactive effects between resting heart rate variability and the chronic prenatal stressors on the health outcomes were not supported by the data. However, results showed that a higher number of prenatal daily hassles was associated with increased postpartum depressive symptoms, and a higher number of prenatal negative life events was associated with lower postpartum cortisol output. These results suggest that elevated chronic stress during the prenatal period may increase risk for poor health during the postpartum period.
ContributorsJewell, Shannon Linda (Author) / Luecken, Linda J. (Thesis advisor) / Lemery-Chalfant, Kathryn (Committee member) / Perez, Marisol (Committee member) / Arizona State University (Publisher)
Created2015
152989-Thumbnail Image.png
Description
The current study delineated the developmental trajectories of early childhood externalizing and internalizing symptoms reported by mothers and fathers, and examined the role of the 18-month observed parenting quality × Respiratory Sinus Arrhythmia

(RSA) interaction in predicting these trajectories. Child sex was tested as a covariate and moderator. It was

The current study delineated the developmental trajectories of early childhood externalizing and internalizing symptoms reported by mothers and fathers, and examined the role of the 18-month observed parenting quality × Respiratory Sinus Arrhythmia

(RSA) interaction in predicting these trajectories. Child sex was tested as a covariate and moderator. It was found that children's low baseline RSA or high RSA reactivity , in comparison to high baseline RSA or low RSA reactivity , was more reactive as a function

of early parenting quality when predicting the development of early childhood problem symptoms. Differential patterns of the interaction between parenting quality and RSA were detected for mothers' and fathers' reports. Mother-reported models showed a diathesis-stress pattern, whereas the father-reported model showed a vantage-sensitivity pattern, especially for internalizing symptoms. This may imply the potential benefit of fathers' active engagement in children's early development. In addition, the effect of the parenting quality × RSA interaction in predicting the mother-reported models was found

to be further moderated by child sex. Specifically, the parenting quality × baseline RSA interaction was significantly predictive of girls' 54-month internalizing, and the parenting quality × RSA reactivity interaction significantly predicted boys' internalizing slope. Girls with low baseline RSA or boys with high RSA reactivity were vulnerable to the less positive parenting, exhibiting high levels of 54-month internalizing symptoms or slow decline in internalizing over time, respectively. Future research directions were discussed in terms of integrating the measures of SNS and PNS in psychopathology study,

exploring the mechanisms underlying the sex difference in parenting quality × RSA interaction, and comparing the findings of children's typical and atypical development.
ContributorsLi, Yi (Author) / Eisenberg, Nancy (Thesis advisor) / Spinrad, Tracy (Thesis advisor) / Lemery-Chalfant, Kathryn (Committee member) / Wilkens, Natalie (Committee member) / Arizona State University (Publisher)
Created2014
153094-Thumbnail Image.png
Description
Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and

Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and performing forensics on application behavior. This research sheds light on several security aspects, including the use of inter-process communications (IPC) to perform permission re-delegation attacks.

Android permission system is more of app-driven rather than user controlled, which means it is the applications that specify their permission requirement and the only thing which the user can do is choose not to install a particular application based on the requirements. Given the all or nothing choice, users succumb to pressures and needs to accept permissions requested. This thesis proposes a couple of ways for providing the users finer grained control of application privileges. The same methods can be used to evade the Permission Re-delegation attack.

This thesis also proposes and implements a novel methodology in Android that can be used to control the access privileges of an Android application, taking into consideration the context of the running application. This application-context based permission usage is further used to analyze a set of sample applications. We found the evidence of applications spoofing or divulging user sensitive information such as location information, contact information, phone id and numbers, in the background. Such activities can be used to track users for a variety of privacy-intrusive purposes. We have developed implementations that minimize several forms of privacy leaks that are routinely done by stock applications.
ContributorsGollapudi, Narasimha Aditya (Author) / Dasgupta, Partha (Thesis advisor) / Xue, Guoliang (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014
153126-Thumbnail Image.png
Description
The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The

The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The information provided is vastly more up to date than that of a census and allows civil authorities to be more agile and preemptive with planning. Privately, advertisers take advantage of a persons stated opinions, demographics, and contextual (where and when) information in order to formulate and present pertinent offers.

Regardless of its use this information can be sensitive in nature and should therefore be under the control of the user. Currently, a user has little say in the manner that their information is processed once it has been released. An ad-hoc approach is currently in use, where the location based service providers each maintain their own policy over personal information usage.

In order to allow more user control over their personal information while still providing for targeted advertising, a systematic approach to the release of the information is needed. It is for that reason we propose a User-Centric Context Aware Spatiotemporal Anonymization framework. At its core the framework will unify the current spatiotemporal anonymization with that of traditional anonymization so that user specified anonymization requirement is met or exceeded while allowing for more demographic information to be released.
ContributorsSanchez, Michael Andrew (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014
153147-Thumbnail Image.png
Description
The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from

The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from these attacks. The large number of new malware samples received daily by computer security companies require Security Analysts to quickly determine the type, threat, and countermeasure for newly identied samples. Our approach provides for a visualization tool to assist the Security Analyst in these tasks that allows the Analyst to visually identify relationships between malware samples.

This approach consists of three steps. First, the received samples are processed by a sandbox environment to perform a dynamic behavior analysis. Second, the reports of the dynamic behavior analysis are parsed to extract identifying features which are matched against other known and analyzed samples. Lastly, those matches that are determined to express a relationship are visualized as an edge connected pair of nodes in an undirected graph.
ContributorsHolmes, James Edward (Author) / Ahn, Gail-Joon (Thesis advisor) / Dasgupta, Partha (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014
150207-Thumbnail Image.png
Description
Fibromyalgia (FM) is a chronic musculoskeletal disorder characterized by widespread pain, fatigue, and a variety of other comorbid physiological and psychological characteristics, including a deficit of positive affect. Recently, the focus of research on the pathophysiology of FM has considered the role of a number of genomic variants. In the

Fibromyalgia (FM) is a chronic musculoskeletal disorder characterized by widespread pain, fatigue, and a variety of other comorbid physiological and psychological characteristics, including a deficit of positive affect. Recently, the focus of research on the pathophysiology of FM has considered the role of a number of genomic variants. In the current manuscript, case-control analyses did not support the hypothesis that FM patients would differ from other chronic pain groups in catechol-O-methyltransferase (COMT) and mu-opioid receptor (OPRM1) genotype. However, evidence is provided in support of the hypothesis that functional single nucleotide polymorphisms on the COMT and OPRM1 genes would be associated with risk and resilience, respectively, in a dual processing model of pain-related positive affective regulation in FM. Forty-six female patients with a physician-confirmed diagnosis of FM completed an electronic diary that included once-daily assessments of positive affect and soft tissue pain. Multilevel modeling yielded a significant gene X environment interaction, such that individuals with met/met genotype on COMT experienced a greater decline in positive affect as daily pain increased than did either val/met or val/val individuals. A gene X environment interaction for OPRM1 also emerged, indicating that individuals with at least one asp allele were more resilient to elevations in daily pain than those homozygous for the asn allele. In sum, the findings offer researchers ample reason to further investigate the contribution of the catecholamine and opioid systems, and their associated genomic variants, to the still poorly understood experience of FM.
ContributorsFinan, Patrick Hamilton (Author) / Zautra, Alex (Thesis advisor) / Davis, Mary (Committee member) / Lemery-Chalfant, Kathryn (Committee member) / Presson, Clark (Committee member) / Arizona State University (Publisher)
Created2011