Matching Items (21)
Filtering by

Clear all filters

135190-Thumbnail Image.png
Description
In a world where tweets, texts, posts, likes and favorites are a part of our daily lives, it's hard not to believe everything we see. Every little detail of one's personal life is easily shared with the world with the click of a button. And because of this, the beauty

In a world where tweets, texts, posts, likes and favorites are a part of our daily lives, it's hard not to believe everything we see. Every little detail of one's personal life is easily shared with the world with the click of a button. And because of this, the beauty standards that society has created is jumping from the pages of magazines and TV shows to apps such as Instagram and Facebook. The majority of social media users are young teens and adults, but the popularity of these apps is rising among kids as young as five years old as well. These are some of the most impressionable years of one's life. So, by seeing these standards that qualify someone as "beautiful," individuals are likely to strive toward these standards. And while some may seem impossible to attain, individuals are willing to go to extreme lengths to get there. Qualities like the "thigh gap" are slowly becoming more popular, and are putting individuals at risk. In a country where the ideal woman is skinny, and most of the celebrities and models showcase these nearly impossible standards, it's hard not to fall into the trap. With the addition of editing software and filters to already existing social media applications, the ability to edit and enhance photos is in the hands of the user. Photos can be edited so dramatically different from the original that what we're seeing doesn't even exist. This project explores the false reality that social media is creating and the negative effects it has on young girls and women. It also offers a solution to the problem.
ContributorsHenry, Lauren Nicole (Author) / Sanft, Alfred (Thesis director) / Heywood, William (Committee member) / School of International Letters and Cultures (Contributor) / The Design School (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
132476-Thumbnail Image.png
Description
Although previous research has explored the relationship between social media use and well-being, many studies are contradictory of each other and conclude varying findings relating to social media use and outspokenness. This study explores the relationship between active and passive social media use, perceived social media expertise, and outspokenness using

Although previous research has explored the relationship between social media use and well-being, many studies are contradictory of each other and conclude varying findings relating to social media use and outspokenness. This study explores the relationship between active and passive social media use, perceived social media expertise, and outspokenness using the potentially mediating variable of perceived social acceptance. 162 participants, recruited through Amazon Mechanical Turk (MTurk) and ASU’s SONA systems, completed a survey relating to their own use of social media, perceived social acceptance, and outspokenness. Contradictory to my first hypotheses, no significant correlations were found between social media use and social media expertise. However, correlation analyses revealed that active social media use is related to an increased amount of perceived social media expertise (r = 0.23, p < .004). Perceived social media expertise was significantly positively correlated with outspokenness (r = 0.19, p < 0.015); however, it was not correlated with perceived social acceptance. When examining these relationships separately by gender, a strong association was found for males between active social media use and outspokenness, whereas passive social media use and outspokenness were negatively correlated for females. The results of this study add to previous research in the field of social media and outspokenness and lend new ideas for future research on these topics, such as exploring the gender differences that are associated with these variables. Further research in the area is needed for a more complete understanding of how one’s social media use affects his/her outspokenness and how gender modifies these effects.
ContributorsRubino, Kelli Erika (Co-author) / Rubino, Kelli (Co-author) / Mickelson, Kristin (Thesis director) / Halavais, Alexander (Committee member) / Department of Psychology (Contributor) / School of International Letters and Cultures (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
133805-Thumbnail Image.png
Description
This study looked at the Women's March's use of social media to communicate their organization's mission. Data was collected from their official Twitter, Instagram and Facebook accounts. Facebook posts were collected manually, Twitter data was collected with a Google Sheets add-on and Instagram was collected by Picodash. All the posts

This study looked at the Women's March's use of social media to communicate their organization's mission. Data was collected from their official Twitter, Instagram and Facebook accounts. Facebook posts were collected manually, Twitter data was collected with a Google Sheets add-on and Instagram was collected by Picodash. All the posts were shifted through multiple times to identify the key narratives of the Women's March. These narratives were then compared to the stated "Unity Principles" of the organization to see if they aligned with what the Women's March attempted to fight for. The five narratives were "everyone should have access to affordable health care," "women should have access to positions of power and be respected," "immigrants should be welcomed within the United States," "society will be stronger if it addresses issues intersectionally," and "everyone should be safe in the world and treated as equals." Analysis showed that each of these narratives reflected the "Unity Principles" in some form. While certain narratives were related to more principles than others, it does not diminish the importance of each message.
Created2018-05
137414-Thumbnail Image.png
Description
The purpose of this project was to create a modular embedded systems platform that would provide a hands-on lab experience for students learning about embedded systems protocols. The system would be designed to be modular, expandable, and productizable. Its modularity would eliminate errors in the design and make the entire

The purpose of this project was to create a modular embedded systems platform that would provide a hands-on lab experience for students learning about embedded systems protocols. The system would be designed to be modular, expandable, and productizable. Its modularity would eliminate errors in the design and make the entire system more robust. It would also be expandable, which means additional project boards could be created in the future without requiring a complete redesign of the system. And finally, productizing the entire system would allow it to be sold to other universities who may have a similar program that would benefit from a system such as the OCTOPUS.
ContributorsDavis, Mareike (Author) / Burger, Kevin (Thesis director) / Vannoni, Greg (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor) / School of International Letters and Cultures (Contributor)
Created2013-12
134367-Thumbnail Image.png
Description
This creative project aimed to combine knowledge, qualifications, and experience in networking and marketing to host a live music event. As a social media industry employee, an avid concertgoer, and a digital marketer, I felt sufficiently able to complete this task. The process included working within the Barrett budget to

This creative project aimed to combine knowledge, qualifications, and experience in networking and marketing to host a live music event. As a social media industry employee, an avid concertgoer, and a digital marketer, I felt sufficiently able to complete this task. The process included working within the Barrett budget to secure a venue and acts with the option of paid marketing for the event. Once I secured The Graduate Hotel and three acts— bands Study Habit and Moose Titans and DJ/emcee Malcolm Alexndr—it was time to publicize the event. I found a photographer and organized a photo shoot then created social media profiles and a website with these photos. In total, the attendance was roughly 100 people, and the night was a smash success.

Keywords: event planning, social media, music
ContributorsGilliam, Taylor Mikel (Author) / Shockley, Gordon (Thesis director) / Hultsman, Wendy (Committee member) / College of Integrative Sciences and Arts (Contributor) / School of International Letters and Cultures (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
135078-Thumbnail Image.png
Description
The Internet of Things has spread Wi-Fi connectivity to household and business devices everywhere. It is important that we understand IoT's risks and capabilities as its popularity continues to grow, and that we recognize new and exciting uses for it. In this project, the ESP8266 Wi-Fi controller, powered by a

The Internet of Things has spread Wi-Fi connectivity to household and business devices everywhere. It is important that we understand IoT's risks and capabilities as its popularity continues to grow, and that we recognize new and exciting uses for it. In this project, the ESP8266 Wi-Fi controller, powered by a lithium battery, is used to transmit messages from a user's browser or mobile phone to an OLED display. The ESP8266 is a system on a chip (SOC) which boasts impressive features such as full TCP/IP stack, 1 MB of flash memory, and a 32-bit CPU. A web server is started on the ESP8266 which listens at a specific port and relays any strings from the client back to the display, acting as a simple notification system for a busy individual such as a professor. The difficulties with this project stemmed from the security protocol of Arizona State University's Wi-Fi network and from the limitations of the Wi-Fi chip itself. Several solutions are suggested, such as utilizing a personal cellular broadband router and polling a database for stored strings through a service such as Data.Sparkfun.com.
ContributorsKovatcheva, Simona Kamenova (Author) / Burger, Kevin (Thesis director) / Meuth, Ryan (Committee member) / Computer Science and Engineering Program (Contributor) / School of International Letters and Cultures (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
134879-Thumbnail Image.png
Description
The purpose of this project was to implement and analyze a new proposed rootkit that claims a greater level of stealth by hiding in cache. Today, the vast majority of embedded devices are powered by ARM processors. To protect their processors from attacks, ARM introduced a hardware security extension known

The purpose of this project was to implement and analyze a new proposed rootkit that claims a greater level of stealth by hiding in cache. Today, the vast majority of embedded devices are powered by ARM processors. To protect their processors from attacks, ARM introduced a hardware security extension known as TrustZone. It provides an isolated execution environment within the embedded device that enables us to run various memory integrity and malware detection tools to identify possible breaches in security to the normal world. Although TrustZone provides this additional layer of security, it also adds another layer of complexity, and thus comes with its own set of vulnerabilities. This new rootkit identifies and exploits a cache incoherence in the ARM device as a result of TrustZone. The newly proposed rootkit, called CacheKit, takes advantage of this cache incoherence to avoid memory introspection from tools in secure world. We implement CacheKit on the i.MX53 development board, which features a single ARM Cortex A8 processor, to analyze the limitations and vulnerabilities described in the original paper. We set up the Linux environment on the computer to be able to cross-compile for the development board which will be running the FreeScale android 2.3.4 platform with a 2.6.33 Linux kernel. The project is implemented as a kernel module that once installed on the board can manipulate cache as desired to conceal the rootkit. The module exploits the fact that in TrustZone, the secure world does not have access to the normal world cache. First, a technique known as Cache-asRAM is used to ensure that the rootkit is loaded only into cache of the normal world where it can avoid detection from the secure world. Then, we employ the cache maintenance instructions and resisters provided in the cp15 coprocessor to keep the code persistent in cache. Furthermore, the cache lines are mapped to unused I/O address space so that if cache content is flushed to RAM for inspection, the data is simply lost. This ensures that even if the rootkit were to be flushed into memory, any trace of the malicious code would be lost. CacheKit prevents defenders from analyzing the code and destroys any forensic evidence. This provides attackers with a new and powerful tool that is excellent for certain scenarios that were previously thought to be secure. Finally, we determine the limitations of the prototype to determine possible areas for future growth and research into the security of networked embedded devices.
ContributorsGutierrez Barnett, Mauricio Antonio (Author) / Zhao, Ziming (Thesis director) / Doupe, Adam (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
Description
A combined examination of the Charlie Hebdo attacks on January 7, 2015 and the November 13, 2015 attacks in Paris yields a social media movement that evolved within the 10 months between the attacks, a comparison between these terrorist attacks and those of September 11, 2001 and parallels between American

A combined examination of the Charlie Hebdo attacks on January 7, 2015 and the November 13, 2015 attacks in Paris yields a social media movement that evolved within the 10 months between the attacks, a comparison between these terrorist attacks and those of September 11, 2001 and parallels between American First Amendment principles and France’s free expression laws.

The Charlie Hebdo attacks fueled an online debate over freedom of expression and religion, whereas the purpose of social media evolved into a humanitarian one following the November 13 attacks in Paris. This research looks into the individual evolutions of the related hashtags that surfaced in 2015, including #JeSuisCharlie (and its opposites, such as #JeNeSuisPasCharlie), #DonDuSang, #PorteOuverte and #RechercheParis, among others. Another research point was with the September 11 attacks—with the 9/11 attacks against the United States, few to no channels were available for the kind of immediate discussions and support seen after the Paris attacks. After spending time in Paris during the spring 2015 semester and researching the aftermath of the Charlie Hebdo attacks and the history of the publication, the conclusion rests on the idea that the online discussions perpetuated by both supporters and dissenters of the magazine contribute to a more robust, open democracy supported by these social media platforms.

A portion of this thesis also delves into the parallels and differences between the American First Amendment and the French free speech laws—all of which pertain to the Charlie Hebdo content and the online responses to the 2015 Paris attacks.

The interviews conducted include a French art history professor at the Sorbonne University in Paris, two creators of the “Je Suis Charlie” Facebook page, an American journalist living in Paris who covered the Charlie Hebdo attack and who was present during the November attacks, and a Muslim-American doctor in Phoenix who founded the American Islamic Forum for Democracy. The ideas surrounding free speech, the value of art such as that found within the pages of Charlie Hebdo, the media’s treatment of religion, traditional democratic freedoms and ties to social media revolutions are all components of this research thesis.
Created2016-05
135979-Thumbnail Image.png
Description
This paper examines the relationship between feminism and social media and evaluates the ability of social media to function as an effective platform for the advancement of feminism's objectives. In the decades before social media became an integral part of culture, the popularity of feminism deteriorated and feminist voices were

This paper examines the relationship between feminism and social media and evaluates the ability of social media to function as an effective platform for the advancement of feminism's objectives. In the decades before social media became an integral part of culture, the popularity of feminism deteriorated and feminist voices were unsure that it could be revived or popularized again. However, in recent years, women have used social media as a mechanism to communicate and disseminate feminist ideas. The birth of what is called "hashtag feminism" has been a fundamental shift in the way feminism is done and advocated for in modern culture. In light of this dramatic shift in venue for feminist conversations, academic feminists are asking a series of pertinent questions: Is social media good for feminism and the achievement of feminist objectives? What, if anything, has feminism compromised in order to fit into 140 characters or fewer? This paper argues that social media has provided a platform for feminists to share their stories, which has aided in the building of feminist constituencies. This is the most important work of feminism, because it is making society more receptive to feminist principles and ideas, transforming our culture into one that can accept and fight for feminism's objectives. This paper will examine a series of case studies in which social media has hosted feminist conversations. It will analyze the impact of this social media as a venue for feminist narratives and evaluate the use of social media as a feminist platform in the movement to achieve feminism's objectives.
ContributorsGiel, Katelyn Anne (Author) / Woodall, Gina (Thesis director) / Lake, Milli (Committee member) / School of Politics and Global Studies (Contributor) / School of International Letters and Cultures (Contributor) / Barrett, The Honors College (Contributor)
Created2015-12
147789-Thumbnail Image.png
Description

Social media today is a major source of not only communication, but also news and entertainment. This year, people everywhere have had to embrace virtual environments as their main sources of communication. For students, especially, the move to virtual schoolwork in 2020 has increased the amount of time spent on

Social media today is a major source of not only communication, but also news and entertainment. This year, people everywhere have had to embrace virtual environments as their main sources of communication. For students, especially, the move to virtual schoolwork in 2020 has increased the amount of time spent on technology. This observational study examined, through an anonymous online survey, how college students spend their time on social media and how it affects their mental health. The 25-question survey was open to current ASU students as of 2021, and 2020 ASU graduates. Respondents’ results concluded that while students actively use social media for communication and entertainment, it can present a burden on their mental health and their productivity.

Created2021-05