This collection collates faculty and staff collections alphabetically by surname.

Displaying 1 - 10 of 46
Filtering by

Clear all filters

Description

While PhD dissertations are typically accessible many other terminal degree projects remain invisible and inaccessible to a greater audience. Over the past year and a half, librarians at Arizona State University collaborated with faculty and departmental administrators across a variety of fields to develop and create institutional repository collections that

While PhD dissertations are typically accessible many other terminal degree projects remain invisible and inaccessible to a greater audience. Over the past year and a half, librarians at Arizona State University collaborated with faculty and departmental administrators across a variety of fields to develop and create institutional repository collections that highlight and authoritatively share this type of student scholarship with schools, researchers, and future employers. This poster will present the benefits, challenges, and considerations required to successfully implement and manage these collections of applied final projects or capstone projects. Specifically, issues/challenges related to metadata consistency, faculty buy-in, and developing an ingest process, as well as benefits related to increased visibility and improved educational and employment opportunities will be discussed. This interactive presentation will also discuss lessons learned from the presenter’s experiences in context of how they can easily apply to benefit their respective institutions.

ContributorsHarp, Matthew (Author) / Dyal, Samuel (Author) / Pardon, Kevin (Author) / Arizona State University. ASU Library (Contributor)
Created2017-05-02
Description

Digital technology has enabled us to record and share our memories and histories faster and in greater numbers than previously imagined. However digital files rely on hardware, software, and descriptive information to be used. As formats change and equipment to read them goes out of use we are all challenged

Digital technology has enabled us to record and share our memories and histories faster and in greater numbers than previously imagined. However digital files rely on hardware, software, and descriptive information to be used. As formats change and equipment to read them goes out of use we are all challenged to connect our present to our future. How long do you want your digital files to last? Decades or even a few years from now will you still be able to access and enjoy those pictures, documents and other digital items you create today?

Libraries, museums and archives spend countless hours and resources preserving physical items from the past and present, but may be forfeiting the longevity of our digital work and connecting to future generations through unintended neglect. Using practical examples and employing best practices of research institutions, participants will learn important first steps to digital preservation including the importance of metadata to personal history, recommended file formats, and approaches they can immediately use to ensure the work they create today will still be enjoyed tomorrow. Help yourself, your organization, and your patrons continue to connect their digital heritage to the generations yet to come.

ContributorsHarp, Matthew (Author) / Dyal, Samuel (Author) / Arizona State University. ASU Library (Contributor)
Created2015-11-20
130109-Thumbnail Image.png
ContributorsHarp, Matthew (Author) / Dyal, Samuel (Author) / Arizona State University. ASU Library (Contributor)
Created2012-06-25
130110-Thumbnail Image.png
ContributorsHarp, Matthew (Author) / Dyal, Samuel (Author) / Arizona State University. ASU Library (Contributor)
Created2012-06-25
130111-Thumbnail Image.jpg
ContributorsHarp, Matthew (Author) / Dyal, Samuel (Author) / Arizona State University. ASU Library (Contributor)
Created2012-06-25
129520-Thumbnail Image.png
Description

Current research on criminal case processing typically examines a single decision-making point, so drawing reliable conclusions about the impact that factors such as defendants’ race or ethnicity exert across successive stages of the justice system is difficult. Using data from the New York County District Attorney's Office that tracks 185,275

Current research on criminal case processing typically examines a single decision-making point, so drawing reliable conclusions about the impact that factors such as defendants’ race or ethnicity exert across successive stages of the justice system is difficult. Using data from the New York County District Attorney's Office that tracks 185,275 diverse criminal cases, this study assesses racial and ethnic disparity for multiple discretionary points of prosecution and sentencing. Findings from multivariate logistic regression analyses demonstrate that the effects of race and ethnicity vary by discretionary point and offense category. Black and Latino defendants were more likely than White defendants to be detained, to receive a custodial plea offer, and to be incarcerated—and they received especially punitive outcomes for person offenses—but were more likely to benefit from case dismissals. The findings for Asian defendants were less consistent but suggest they were the least likely to be detained, to receive custodial offers, and to be incarcerated. These findings are discussed in the context of contemporary theoretical perspectives on racial bias and cumulative disadvantage in the justice system.

Created2014-08-01
129373-Thumbnail Image.png
Description

Simons and Burt's (2011) social schematic theory (SST) of crime posits that adverse social factors are associated with offending because they promote a set of social schemas (i.e., a criminogenic knowledge structure) that elevates the probability of situational definitions favorable to crime. This study extends the SST model by incorporating

Simons and Burt's (2011) social schematic theory (SST) of crime posits that adverse social factors are associated with offending because they promote a set of social schemas (i.e., a criminogenic knowledge structure) that elevates the probability of situational definitions favorable to crime. This study extends the SST model by incorporating the role of contexts for action. Furthermore, the study advances tests of the SST by incorporating a measure of criminogenic situational definitions to assess whether such definitions mediate the effects of schemas and contexts on crime. Structural equation models using 10 years of panel data from 582 African American youth provided strong support for the expanded theory. The results suggest that childhood and adolescent social adversity fosters a criminogenic knowledge structure as well as selection into criminogenic activity spaces and risky activities, all of which increase the likelihood of offending largely through situational definitions. Additionally, evidence shows that the criminogenic knowledge structure interacts with settings to amplify the likelihood of situational definitions favorable to crime.

ContributorsSimons, Ronald (Author) / Burt, Callie (Author) / Barr, Ashley B. (Author) / Lei, Man-Kit (Author) / Stewart, Eric (Author) / College of Public Service and Community Solutions (Contributor)
Created2014-11-01
129380-Thumbnail Image.png
Description

Cyberstalking is a relatively understudied area in criminology, with no consensus among scholars as to whether it represents a modified form of stalking or whether it is an entirely new and emerging criminal phenomenon. Using data from the 2006 Supplemental Victimization Survey (SVS) to the National Crime Victimization Survey (NCVS),

Cyberstalking is a relatively understudied area in criminology, with no consensus among scholars as to whether it represents a modified form of stalking or whether it is an entirely new and emerging criminal phenomenon. Using data from the 2006 Supplemental Victimization Survey (SVS) to the National Crime Victimization Survey (NCVS), this study compares stalking and cyberstalking victims across several dimensions, including situational features of their experiences and self-protective behaviors. Results indicate that there are significant differences between stalking and cyberstalking victims, including their number of self-protective behaviors adopted, duration of contact with their stalker, financial costs of victimization, and perceived fear at onset. Perceived fear over time, the occurrence of a physical attack, and sex of the victim were all associated with a higher number of self-protective behaviors for cyberstalking victims compared to stalking victims, net of the effect of the control variables. Implications for stalking theory, research, and criminal justice policy are discussed.

ContributorsNobles, Matt R. (Author) / Reyns, Bradford W. (Author) / Fox, Kate (Author) / Fisher, Bonnie S. (Author) / College of Public Service and Community Solutions (Contributor)
Created2013-11-30