Matching Items (31)
Filtering by

Clear all filters

148196-Thumbnail Image.png
Description

The use of discourse markers (DMs) is present in speech to both structure and organize the discourse (Fung & Carter, 2007). However, despite the different studies about the use of DMs, less attention has been paid to specific Spanish DMs such as pues, ‘so, well’ luego, ‘then, therefore’ and entonces

The use of discourse markers (DMs) is present in speech to both structure and organize the discourse (Fung & Carter, 2007). However, despite the different studies about the use of DMs, less attention has been paid to specific Spanish DMs such as pues, ‘so, well’ luego, ‘then, therefore’ and entonces ‘so, then’ about their reduction. The focus of this study is on the phonetic variation of these DMs from a corpus of speakers of Mexican Spanish from Salinas, California (Brown & Alba, 2017). This paper analyzed dependent and independent variables to show their influence on the reduction of DMs. Also, chunking phenomena and special reduction were part of the study as they can reflect patterns of change in the language.

ContributorsQuimbaya, Yazmin (Author) / Gradoville, Michael (Thesis director) / Fernández, Sofía (Committee member) / Brown, Earl Kjar (Committee member) / School of International Letters and Cultures (Contributor) / Department of English (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
135686-Thumbnail Image.png
Description
In this thesis, I conduct a preliminary analysis of the Islamic State of Iraq and Al-Sham's travel manual-cum-propaganda ebook Hijrah to the Islamic State, which has been used by people from various parts of the world attempting to enter Syria and join the terrorist organization. Using techniques from discourse and

In this thesis, I conduct a preliminary analysis of the Islamic State of Iraq and Al-Sham's travel manual-cum-propaganda ebook Hijrah to the Islamic State, which has been used by people from various parts of the world attempting to enter Syria and join the terrorist organization. Using techniques from discourse and propaganda analysis I examine how the author of the text uses discursive resources to construct the reader of the text, the author's expectations for the reader, and the act of traveling to Syria. I then use news articles from varying organizations as well as the Islamic State-produced periodical magazine Dabiq to locate the document within the context of Islamic State affairs and propaganda. Subsequently, I show that the use of discursive resources is consistent with the ethos espoused in Dabiq, and in addition to serving as a guide to entering Syria Hijrah to the Islamic State is also a soft introduction into the radical belief systems of the terrorist group itself.
ContributorsDelmonico, Edward Peter (Author) / Prior, Matthew (Thesis director) / Adams, Karen (Committee member) / Department of English (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
136592-Thumbnail Image.png
Description
The rise of Italian in Sicily contrasts with a fierce regional pride that makes it difficult to determine the possible fate of Sicilian. This project focuses on a sociolinguistic analysis of the dialect of Sicilian spoken in and around Catania, Sicily. While there are programs in place to protect the

The rise of Italian in Sicily contrasts with a fierce regional pride that makes it difficult to determine the possible fate of Sicilian. This project focuses on a sociolinguistic analysis of the dialect of Sicilian spoken in and around Catania, Sicily. While there are programs in place to protect the language, the institutionalization of Italian in Sicily may be encroaching on Sicilian's use, especially with younger generations. The lure of the more industrialized North creates a culture of immigration in Sicily, which increasingly rewards the use of Italian. Using information from background research, a survey analyzing sociolinguistic factors and the individual's fluency in and use of Sicilian was created. The data from the survey showed that while understanding of Sicilian was fairly universal among participants, an individual's use and proficiency in Sicilian were most influenced by age and current place of residence (inside or outside Sicily). Younger people tended to know and use Sicilian less, and older participants tended to be more confident in their abilities and to use Sicilian more often. This is slightly complicated by an additional trend among participants currently living outside of Sicily towards a lower level of use and knowledge of Sicilian. All participants placed a significant emphasis on maintaining the ability to speak Sicilian, and on Sicilian language as an integral part of Sicilian culture.
ContributorsScaduto, Leah Christine (Author) / Dal Martello, Chiara (Thesis director) / Adams, Karen (Committee member) / Barrett, The Honors College (Contributor) / School of International Letters and Cultures (Contributor) / School of Politics and Global Studies (Contributor) / Sandra Day O'Connor College of Law (Contributor) / Department of English (Contributor)
Created2015-05
137152-Thumbnail Image.png
Description
Radio Frequency Identification (RFID) technology allows objects to be identified electronically by way of a small electronic tag. RFID is quickly becoming quite popular, and there are many security hurdles for this technology to overcome. The iCLASS line of RFID, produced by HID Global, is one such technology that is

Radio Frequency Identification (RFID) technology allows objects to be identified electronically by way of a small electronic tag. RFID is quickly becoming quite popular, and there are many security hurdles for this technology to overcome. The iCLASS line of RFID, produced by HID Global, is one such technology that is widely used for secure access control and applications where a contactless authentication element is desirable. Unfortunately, iCLASS has been shown to have security issues. Nevertheless customers continue to use it because of the great cost that would be required to completely replace it. This Honors Thesis will address attacks against iCLASS and means for countering them that do not require such an overhaul.
ContributorsMellott, Matthew John (Author) / Ahn, Gail-Joon (Thesis director) / Thorstenson, Tina (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2014-05
137718-Thumbnail Image.png
Description
This thesis concerns the adoption of health information technology in the medical sector, specifically electronic health records (EHRs). EHRs have been seen as a great benefit to the healthcare system and will improve the quality of patient care. The federal government, has seen the benefit EHRs can offer, has been

This thesis concerns the adoption of health information technology in the medical sector, specifically electronic health records (EHRs). EHRs have been seen as a great benefit to the healthcare system and will improve the quality of patient care. The federal government, has seen the benefit EHRs can offer, has been advocating the use and adoption of EHR for nearly a decade now. They have created policies that guide medical providers on how to implement EHRs. However, this thesis concerns the attitudes medical providers in Phoenix have towards government implementation. By interviewing these individuals and cross-referencing their answers with the literature this thesis wants to discover the pitfalls of federal government policy toward EHR implementation and EHR implementation in general. What this thesis found was that there are pitfalls that the federal government has failed to address including loss of provider productivity, lack of interoperability, and workflow improvement. However, the providers do say there is still a place for government to be involved in the implementation of EHR.
ContributorsKaldawi, Nicholas Emad (Author) / Lewis, Paul (Thesis director) / Cortese, Denis (Committee member) / Jones, Ruth (Committee member) / Barrett, The Honors College (Contributor) / School of Politics and Global Studies (Contributor) / School of Human Evolution and Social Change (Contributor)
Created2013-05
137309-Thumbnail Image.png
Description
Modern computer processors contain an embedded firmware known as microcode that controls decode and execution of x86 instructions. Although proprietary and relatively obscure, this microcode can be modified using updates released by hardware manufacturers to correct processor logic flaws (errata). At the same time, a malicious microcode update could compromise

Modern computer processors contain an embedded firmware known as microcode that controls decode and execution of x86 instructions. Although proprietary and relatively obscure, this microcode can be modified using updates released by hardware manufacturers to correct processor logic flaws (errata). At the same time, a malicious microcode update could compromise a processor by implementing new malicious instructions or altering the functionality of existing instructions, including processor-accelerated virtualization or cryptographic primitives. Not only is this attack vector capable of subverting all software-enforced security policies and access controls, but it also leaves behind no postmortem forensic evidence since the write-only patch memory is cleared upon system reset. Although supervisor privileges (ring zero) are required to update processor microcode, this attack cannot be easily mitigated due to the implementation of microcode update functionality within processor silicon. In this paper, we reveal the microarchitecture and mechanism of microcode updates, present a security analysis of this attack vector, and provide some mitigation suggestions.
Created2014-05
137178-Thumbnail Image.png
Description
Contributing to the small but growing body of research on linguistic discrimination in legal settings, this thesis conducts a sociolinguistic investigation of the impact of an individual's accent on juror perceptions of defendant favorability and innocence. The study used an online questionnaire in which sixty mock jurors were each asked

Contributing to the small but growing body of research on linguistic discrimination in legal settings, this thesis conducts a sociolinguistic investigation of the impact of an individual's accent on juror perceptions of defendant favorability and innocence. The study used an online questionnaire in which sixty mock jurors were each asked to evaluate the audio testimony of a defendant representing one of three English ethnolects: African American, British South African, or Caucasian American. In addition to rating the defendant's persuasiveness, honesty, credibility, trustworthiness, and guilt, participants were also asked to determine an appropriate punishment (if any) for the defendant. Results indicate a preference of participants to issue an unsure or caveat opinion for the African American speaker but not to the British South African or Caucasian American speaker. The implications of these findings, as well as the correlations between each variable are discussed. The paper concludes with a recommendation for legal training and a revision of courtroom practices.
ContributorsMaerowitz, Max Robert (Author) / Prior, Matthew (Thesis director) / Adams, Karen (Committee member) / Barrett, The Honors College (Contributor) / School of Historical, Philosophical and Religious Studies (Contributor) / Department of English (Contributor)
Created2014-05
137481-Thumbnail Image.png
Description
We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI

We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI methods. We discuss how to correct these flaws once they are discovered. Finally, we discuss the Usable Security Development Model for developing usable secure systems.
ContributorsJorgensen, Jan Drake (Author) / Ahn, Gail-Joon (Thesis director) / VanLehn, Kurt (Committee member) / Wilkerson, Kelly (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2013-05
136372-Thumbnail Image.png
Description
The goal of this thesis research was to figure out if there were tangible differences between the way men and women speak on Twitter, a micro blogging social media site, and to see if there ways to apply it to strategizing marketing campaigns. AntConc, a free concordance software by Lawrence

The goal of this thesis research was to figure out if there were tangible differences between the way men and women speak on Twitter, a micro blogging social media site, and to see if there ways to apply it to strategizing marketing campaigns. AntConc, a free concordance software by Lawrence Anthony, was used to help organize and analyze a corpus created from the Tweets that were collected form the public accounts of twelve different popular public figures. These individuals were chosen based on their profession or the industry that they are associated with, as well as their general popularity. The research focused on three main industries or professions that can be viewed as ‘gendered;’ which were ‘Modeling,’ ‘Fashion Publications,’ and ‘Sports.’ The data was then analyzed across five different main categories which included, ‘Additional Media,’ ‘Adjective Usage,’ ‘How are they talking?,’ ‘Who are they talking about?, and ‘What are they talking about?’ The primary data, along with secondary research was used to see if they words and language use of men and women aligned with stereotypical patterns or if there were patterns that were unique and overlooked.

What was found was that although gender did play a large part in the way men and women spoke, there were more similarities when comparing individuals of the same industry or profession, than there were if they were simply analyzed just based on gender. Additionally, there were many factors that made it difficult to say whether these were qualified patterns or simply tendencies. More research into this would be able to help marketing companies and individuals, better target the audience they want for social media campaigns, by taking into account the importance in contemporary differences in language use by men and women. However, this research would have to be done on data from sites like Twitter to provide an accurate depiction of the way men and women, on these very unique mediums, speak.
ContributorsChan, Kayla Rose (Author) / Adams, Karen (Thesis director) / Shinabarger, Amy D. (Committee member) / Barrett, The Honors College (Contributor) / Department of Marketing (Contributor) / Department of English (Contributor)
Created2015-05
147724-Thumbnail Image.png
Description

A study on the power inequity between men and women in inter-gender conversations, how it manifests linguistically, and the social ramifications thereafter. Conversations from the game show Cash Cab are used to this point.

ContributorsPirotte, Adeline Rose (Author) / Adams, Karen (Thesis director) / Bryant, Jason (Committee member) / Department of English (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05