This collection includes both ASU Theses and Dissertations, submitted by graduate students, and the Barrett, Honors College theses submitted by undergraduate students. 

Displaying 1 - 10 of 102
151861-Thumbnail Image.png
Description
In October, 2009, participants of the Arizona Special Supplemental Nutrition Program for Women, Infants and Children (WIC) began receiving monthly Cash Value Vouchers (CVV) worth between six and 10 dollars towards the purchase of fresh fruits and vegetables. Data from the Arizona Department of Health Services (ADHS) showed CVV redemption

In October, 2009, participants of the Arizona Special Supplemental Nutrition Program for Women, Infants and Children (WIC) began receiving monthly Cash Value Vouchers (CVV) worth between six and 10 dollars towards the purchase of fresh fruits and vegetables. Data from the Arizona Department of Health Services (ADHS) showed CVV redemption rates in the first two years of the program were lower than the national average of 77% redemption. In response, the ADHS WIC Food List was expanded to also include canned and frozen fruits and vegetables. More recent data from ADHS suggest that redemption rates are improving, but variably exist among different WIC sub-populations. The purpose of this project was to identify themes related to the ease or difficulty of WIC CVV use amongst different categories of low-redeeming WIC participants. A total of 8 focus groups were conducted, four at a clinic in each of two Valley cities: Surprise and Mesa. Each of the four focus groups comprised one of four targeted WIC participant categories: pregnant, postpartum, breastfeeding, and children with participation ranging from 3-9 participants per group. Using the general inductive approach, recordings of the focus groups were transcribed, hand-coded and uploaded into qualitative analysis software resulting in four emergent themes including: interactions and shopping strategies, maximizing WIC value, redemption issues, and effect of rule change. Researchers identified twelve different subthemes related to the emergent theme of interactions and strategies to improve their experience, including economic considerations during redemption. Barriers related to interactions existed that made their purchase difficult, most notably anger from the cashier and other shoppers. However, participants made use of a number of strategies to facilitate WIC purchases or extract more value out of WIC benefits, such as pooling their CVV. Finally, it appears that the fruit and vegetable rule change was well received by those who were aware of the change. These data suggest a number of important avenues for future research, including verifying these themes are important within a larger, representative sample of Arizona WIC participants, and exploring strategies to minimize barriers identified by participants, such as use of electronic benefits transfer-style cards (EBT).
ContributorsBertmann, Farryl M. W (Author) / Wharton, Christopher (Christopher Mack), 1977- (Thesis advisor) / Ohri-Vachaspati, Punam (Committee member) / Johnston, Carol (Committee member) / Hampl, Jeffrey (Committee member) / Dixit-Joshi, Sujata (Committee member) / Barroso, Cristina (Committee member) / Arizona State University (Publisher)
Created2013
151655-Thumbnail Image.png
Description
There are several visual dimensions of food that can affect food intake, example portion size, color, and variety. This dissertation elucidates the effect of number of pieces of food on preference and amount of food consumed in humans and motivation for food in animals. Chapter 2 Experiment 1 showed that

There are several visual dimensions of food that can affect food intake, example portion size, color, and variety. This dissertation elucidates the effect of number of pieces of food on preference and amount of food consumed in humans and motivation for food in animals. Chapter 2 Experiment 1 showed that rats preferred and also ran faster for multiple pieces (30, 10 mg pellets) than an equicaloric, single piece of food (300 mg) showing that multiple pieces of food are more rewarding than a single piece. Chapter 2 Experiment 2 showed that rats preferred a 30-pellet food portion clustered together rather than scattered. Preference and motivation for clustered food pieces may be interpreted based on the optimal foraging theory that animals prefer foods that can maximize energy gain and minimize the risk of predation. Chapter 3 Experiment 1 showed that college students preferred and ate less of a multiple-piece than a single-piece portion and also ate less in a test meal following the multiple-piece than single-piece portion. Chapter 3 Experiment 2 replicated the results in Experiment 1 and used a bagel instead of chicken. Chapter 4 showed that college students given a five-piece chicken portion scattered on a plate ate less in a meal and in a subsequent test meal than those given the same portion clustered together. This is consistent with the hypothesis that multiple pieces of food may appear like more food because they take up a larger surface area than a single-piece portion. All together, these studies show that number and surface area occupied by food pieces are important visual cues determining food choice in animals and both food choice and intake in humans.
ContributorsBajaj, Devina (Author) / Phillips, Elizabeth D. (Thesis advisor) / Cohen, Adam (Committee member) / Johnston, Carol (Committee member) / Bimonte-Nelson, Heather A. (Committee member) / Arizona State University (Publisher)
Created2013
151522-Thumbnail Image.png
Description
Health knowledge alone does not appear to lead to sustained healthy behavior, suggesting the need for alternative methods for improving diet. Recent research shows a possible role of moral contexts of food production on diet related behaviors; however no studies have been conducted to specifically explore the relationship between moral

Health knowledge alone does not appear to lead to sustained healthy behavior, suggesting the need for alternative methods for improving diet. Recent research shows a possible role of moral contexts of food production on diet related behaviors; however no studies have been conducted to specifically explore the relationship between moral constructs and food consumption. This study examined the relationship between fast food consumption and two measures of morality, Moral Foundations Questionnaire (MFQ), specifically harm/care and purity/sanctity foundations, and the Ethical Concern in food choice (EC) questionnaire, which includes animal welfare, environment protection, political values, and religion subscales. The study also examined the association between the measures of morality. 739 participants, primarily female (71.4%) and non-Hispanic Whites (76.5%), completed an online survey that included the MFQ, the EC questionnaire, and a brief fast food screener. Participant's morality scores in relation to their fast food consumption were examined first using bivariate ANOVA analysis and then using logistic regression to control for covariates. The MFQ foundations were compared with the EC subscales using Pearson correlation coefficient. Significant bivariate relationships were seen between fast food consumption and the MFQ's purity/sanctity foundation and EC's religion subscales (p<0.05). However these significant bivariate relationships did not hold after controlling for gender, race, university education, and religion in the logistic regression analysis. The foundations of the MFQ were positively correlated with the subscales for the EC questionnaire (r values ranging from .233-.613 (p<0.01). MFQ's purity/sanctity foundation and EC's religion subscale were the two most highly correlated (r=.613, p<0.01) showing that moral intuitions may be associated with eating decision making. The study did not find significant associations between MFQ or EC scores and fast food consumption.
ContributorsMartinelli, Sarah (Author) / Ohri-Vachaspati, Punam (Thesis advisor) / Hekler, Eric B. (Committee member) / Wharton, Christopher (Christopher Mack), 1977- (Committee member) / Johnston, Carol (Committee member) / Arizona State University (Publisher)
Created2013
151536-Thumbnail Image.png
Description
Background: Previous research suggests a healthy eater schema (i.e., identifying yourself as a healthy eater) may be a useful concept to target in interventions. A "stealth" intervention that discussed the moral issues related to food worked better at promoting healthful eating than an intervention focused on the health benefits. No

Background: Previous research suggests a healthy eater schema (i.e., identifying yourself as a healthy eater) may be a useful concept to target in interventions. A "stealth" intervention that discussed the moral issues related to food worked better at promoting healthful eating than an intervention focused on the health benefits. No research has explored the relationship between moral foundations, a theoretical model focused on delineating core "foundations" for making a moral decision, and healthy eater self-identity or self-efficacy. Purpose: We explored the relationship between moral foundations (i.e., harm/care, fairness/reciprocity, in-group/loyalty, authority/respect, & purity/sanctity) and health eater self-identity and fruit and vegetable self-efficacy (FVSE). Methods: 542 participants completed an online cross-sectional survey, which included moral foundations (i.e., MFQ), political views, healthy eater self-identity (i.e., HESS), and FVSE measures. Logistic regression was used to assess the relationship between moral foundations between healthy eater self-identity after controlling for age, gender, major, BMI, and political beliefs. OLS regression was used to explore the relationship between self-efficacy and the moral foundations after controlling for the covariates. Results: 75.6% of the sample were college students, with a mean age of 25.27 (SD=8.61). 25.1% of students were nutrition majors. Harm/care, authority/respect, and ingroup/loyalty were significantly associated with healthy eater schema, (i.e., OR=1.7, p<.001, OR=1.5, p=.009, and OR=1.4, p=.027, respectively). Ingroup/loyalty, authority/respect, and purity/sanctity were related to FVSE (p=.006, p=.002, p=.04, respectively). Conclusion: Among college students, harm/care and authority/respect were associated with a healthy eater schema. Future research should explore possible uses of these moral foundations in interventions (e.g., a plant-based diet based on reduced harm to animals or eating fewer processed views based on "traditional" values).
ContributorsKiser, Sarah (Author) / Hekler, Eric B. (Thesis advisor) / Ohri-Vachaspati, Punam (Committee member) / Wharton, Christopher (Christopher Mack), 1977- (Committee member) / Johnston, Carol (Committee member) / Arizona State University (Publisher)
Created2013
152747-Thumbnail Image.png
Description
ABSTRACT The hormone leptin is an important regulator of body weight and energy balance, while nitric oxide (NO) produced in the blood vessels is beneficial for preventing disease-induced impaired vasodilation and hypertension. Elevations in the free radical superoxide can result in impaired vasodilation through scavenging of NO. Omega 3 is

ABSTRACT The hormone leptin is an important regulator of body weight and energy balance, while nitric oxide (NO) produced in the blood vessels is beneficial for preventing disease-induced impaired vasodilation and hypertension. Elevations in the free radical superoxide can result in impaired vasodilation through scavenging of NO. Omega 3 is a polyunsaturated fatty acid that is beneficial at reducing body weight and in lowering many cardiovascular risk factors like atherosclerosis. The present study was designed to examine the change in plasma concentrations of leptin, nitric oxide, and the antioxidant superoxide dismutase in addition to examining the association between leptin and NO in healthy normal weight adult female subjects before and following omega 3 intakes. Participants were randomly assigned to either a fish oil group (600 mg per day) or a control group (1000 mg of coconut oil per day) for 8 weeks. Results showed no significant difference in the percent change of leptin over the 8 week supplementation period for either group (15.3±31.9 for fish oil group, 7.83±27 for control group; p=0.763). The percent change in NO was similarly not significantly altered in either group (-1.97±22 decline in fish oil group, 11.8±53.9 in control group; p=0.960). Likewise, the percent change in superoxide dismutase for each group was not significant following 8 weeks of supplementation (fish oil group: 11.94±20.94; control group: 11.8±53.9; p=0.362). The Pearson correlation co-efficient comparing the percent change of both leptin and NO was r2= -0.251 demonstrating a mildly negative, albeit insignificant, relationship between these factors. Together, these findings suggest that daily supplementation with 600 mg omega 3 in healthy females is not beneficial for improving these cardiovascular risk markers. Future studies in this area should include male subjects as well as overweight subjects with larger doses of fish oil that are equivalent to three or more servings per week. The importance of gender cannot be underestimated since estrogen has protective effects in the vasculature of females that may have masked any further protective effects of the fish oil. In addition, overweight individuals are often leptin-resistant and develop impaired vasodilation resulting from superoxide-mediated scavenging of nitric oxide. Therefore, the reported antioxidant and weight loss properties of omega 3 supplementation may greatly benefit overweight individuals.
ContributorsAlanbagy, Samer (Author) / Sweazea, Karen (Thesis advisor) / Johnston, Carol (Committee member) / Shepard, Christina (Committee member) / Lespron, Christy (Committee member) / Arizona State University (Publisher)
Created2014
152889-Thumbnail Image.png
Description
The unpleasant bitter taste found in many nutritious vegetables may deter their consumption. While bitterness suppression by prototypical tastants is well-studied in the chemical and pharmacological fields, mechanisms to reduce the bitterness of foods such as vegetables remain to be elucidated. Here tastants representing the taste primaries of

The unpleasant bitter taste found in many nutritious vegetables may deter their consumption. While bitterness suppression by prototypical tastants is well-studied in the chemical and pharmacological fields, mechanisms to reduce the bitterness of foods such as vegetables remain to be elucidated. Here tastants representing the taste primaries of salty and sweet were investigated as potential bitterness suppressors of three types of Brassicaceae vegetables. The secondary aim of these studies was to determine whether the bitter masking agents were differentially effective for bitter-sensitive and bitter-insensitive individuals. In all experiments, participants rated vegetables plain and with the addition of tastants. In Experiments 1-3, sucrose and NNS suppressed the bitterness of broccoli, Brussels sprouts, and cauliflower, whereas NaCl did not. Varying concentrations of NaCl and sucrose were introduced in Experiment 4 to assess the dose-dependency of the effects. While sucrose was a robust bitterness suppressor, NaCl suppressed bitterness only for participants who perceived the plain Brussels sprouts as highly bitter. Experiment 5, through the implementation of a rigorous control condition, determined that some but not all of this effect can be accounted for by regression to the mean. Individual variability in taste perception as determined by sampling of aqueous bitter, salty, and sweet solutions did not influence the degree of suppression by NaCl or sucrose. Consumption of vegetables is deterred by their bitter taste. Utilizing tastants to mask bitterness, a technique that preserves endogenous nutrients, can circumvent this issue. Sucrose is a robust bitter suppressor whereas the efficacy of NaCl is dependent upon bitterness perception of the plain vegetables.
ContributorsWilkie, Lynn Melissa (Author) / Capaldi Phillips, Elizabeth D (Thesis advisor) / Cohen, Adam (Committee member) / Johnston, Carol (Committee member) / Sanabria, Federico (Committee member) / Arizona State University (Publisher)
Created2014
153335-Thumbnail Image.png
Description
With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands.

With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands. However, with the introduction and rising use of wear- able technology and evolving uses of smart-phones, the concept of Internet of Things (IoT) has become a prevailing notion in the currently growing technology industry. Cisco Inc. has projected a data creation of approximately 403 Zetabytes (ZB) by 2018. The combination of bringing benign devices and connecting them to the web has resulted in exploding service and data aggregation requirements, thus requiring a new and innovative computing platform. This platform should have the capability to provide robust real-time data analytics and resource provisioning to clients, such as IoT users, on-demand. Such a computation model would need to function at the edge-of-the-network, forming a bridge between the large cloud data centers and the distributed connected devices.

This research expands on the notion of bringing computational power to the edge- of-the-network, and then integrating it with the cloud computing paradigm whilst providing services to diverse IoT-based applications. This expansion is achieved through the establishment of a new computing model that serves as a platform for IoT-based devices to communicate with services in real-time. We name this paradigm as Gateway-Oriented Reconfigurable Ecosystem (GORE) computing. Finally, this thesis proposes and discusses the development of a policy management framework for accommodating our proposed computational paradigm. The policy framework is designed to serve both the hosted applications and the GORE paradigm by enabling them to function more efficiently. The goal of the framework is to ensure uninterrupted communication and service delivery between users and their applications.
ContributorsDsouza, Clinton (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2015
153094-Thumbnail Image.png
Description
Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and

Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and performing forensics on application behavior. This research sheds light on several security aspects, including the use of inter-process communications (IPC) to perform permission re-delegation attacks.

Android permission system is more of app-driven rather than user controlled, which means it is the applications that specify their permission requirement and the only thing which the user can do is choose not to install a particular application based on the requirements. Given the all or nothing choice, users succumb to pressures and needs to accept permissions requested. This thesis proposes a couple of ways for providing the users finer grained control of application privileges. The same methods can be used to evade the Permission Re-delegation attack.

This thesis also proposes and implements a novel methodology in Android that can be used to control the access privileges of an Android application, taking into consideration the context of the running application. This application-context based permission usage is further used to analyze a set of sample applications. We found the evidence of applications spoofing or divulging user sensitive information such as location information, contact information, phone id and numbers, in the background. Such activities can be used to track users for a variety of privacy-intrusive purposes. We have developed implementations that minimize several forms of privacy leaks that are routinely done by stock applications.
ContributorsGollapudi, Narasimha Aditya (Author) / Dasgupta, Partha (Thesis advisor) / Xue, Guoliang (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014
153126-Thumbnail Image.png
Description
The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The

The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The information provided is vastly more up to date than that of a census and allows civil authorities to be more agile and preemptive with planning. Privately, advertisers take advantage of a persons stated opinions, demographics, and contextual (where and when) information in order to formulate and present pertinent offers.

Regardless of its use this information can be sensitive in nature and should therefore be under the control of the user. Currently, a user has little say in the manner that their information is processed once it has been released. An ad-hoc approach is currently in use, where the location based service providers each maintain their own policy over personal information usage.

In order to allow more user control over their personal information while still providing for targeted advertising, a systematic approach to the release of the information is needed. It is for that reason we propose a User-Centric Context Aware Spatiotemporal Anonymization framework. At its core the framework will unify the current spatiotemporal anonymization with that of traditional anonymization so that user specified anonymization requirement is met or exceeded while allowing for more demographic information to be released.
ContributorsSanchez, Michael Andrew (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014
153147-Thumbnail Image.png
Description
The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from

The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from these attacks. The large number of new malware samples received daily by computer security companies require Security Analysts to quickly determine the type, threat, and countermeasure for newly identied samples. Our approach provides for a visualization tool to assist the Security Analyst in these tasks that allows the Analyst to visually identify relationships between malware samples.

This approach consists of three steps. First, the received samples are processed by a sandbox environment to perform a dynamic behavior analysis. Second, the reports of the dynamic behavior analysis are parsed to extract identifying features which are matched against other known and analyzed samples. Lastly, those matches that are determined to express a relationship are visualized as an edge connected pair of nodes in an undirected graph.
ContributorsHolmes, James Edward (Author) / Ahn, Gail-Joon (Thesis advisor) / Dasgupta, Partha (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014