Matching Items (382)
151833-Thumbnail Image.png
Description
The end of the nineteenth century was an exhilarating and revolutionary era for the flute. This period is the Second Golden Age of the flute, when players and teachers associated with the Paris Conservatory developed what would be considered the birth of the modern flute school. In addition, the founding

The end of the nineteenth century was an exhilarating and revolutionary era for the flute. This period is the Second Golden Age of the flute, when players and teachers associated with the Paris Conservatory developed what would be considered the birth of the modern flute school. In addition, the founding in 1871 of the Société Nationale de Musique by Camille Saint-Saëns (1835-1921) and Romain Bussine (1830-1899) made possible the promotion of contemporary French composers. The founding of the Société des Instruments à Vent by Paul Taffanel (1844-1908) in 1879 also invigorated a new era of chamber music for wind instruments. Within this groundbreaking environment, Mélanie Hélène Bonis (pen name Mel Bonis) entered the Paris Conservatory in 1876, under the tutelage of César Franck (1822-1890). Many flutists are dismayed by the scarcity of repertoire for the instrument in the Romantic and post-Romantic traditions; they make up for this absence by borrowing the violin sonatas of Gabriel Fauré (1845-1924) and Franck. The flute and piano works of Mel Bonis help to fill this void with music composed originally for flute. Bonis was a prolific composer with over 300 works to her credit, but her works for flute and piano have not been researched or professionally recorded in the United States before the present study. Although virtually unknown today in the American flute community, Bonis's music received much acclaim from her contemporaries and deserves a prominent place in the flutist's repertoire. After a brief biographical introduction, this document examines Mel Bonis's musical style and describes in detail her six works for flute and piano while also offering performance suggestions.
ContributorsDaum, Jenna Elyse (Author) / Buck, Elizabeth (Thesis advisor) / Holbrook, Amy (Committee member) / Micklich, Albie (Committee member) / Schuring, Martin (Committee member) / Norton, Kay (Committee member) / Arizona State University (Publisher)
Created2013
ContributorsMatthews, Eyona (Performer) / Yoo, Katie Jihye (Performer) / Roubison, Ryan (Performer) / ASU Library. Music Library (Publisher)
Created2018-03-25
ContributorsHoeckley, Stephanie (Performer) / Lee, Juhyun (Performer) / ASU Library. Music Library (Publisher)
Created2018-03-24
149982-Thumbnail Image.png
Description
Following the implementation of federal immigration control measures in the 1990s, Arizona became the main point of entry for undocumented immigrants along the US border with Mexico in the early 2000s. Since then, reports have blamed human smuggling facilitators for the increase of undocumented immigration into the state and the

Following the implementation of federal immigration control measures in the 1990s, Arizona became the main point of entry for undocumented immigrants along the US border with Mexico in the early 2000s. Since then, reports have blamed human smuggling facilitators for the increase of undocumented immigration into the state and the apparent development of violent practices targeting the undocumented. However, little is known about the organization of the groups who work at facilitating the transit of undocumented immigrants along the US Mexico Border. Based on interviews and narratives present in legal files of smuggling cases prosecuted in Phoenix, Arizona, the present study provides an analysis of local human smuggling operations. It argues that far from being under the control of organized crime, smuggling is an income generating strategy of the poor that generates financial opportunities for community members in financial distress. The study, raises questions over smuggling's perceptions as violent and instead identifies smuggling-related violence as a reflection of the structural violence carried out by the state against immigrant communities through policing, surveillance and the consistent and systematic exercise of race-based policies.
ContributorsSanchez, Gabriella (Author) / Romero, Mary L (Thesis advisor) / Fonow, Mary Margaret (Committee member) / Tsuda, Takeyuki (Committee member) / Arizona State University (Publisher)
Created2011
ContributorsMcClain, Katelyn (Performer) / Buringrud, Deanna (Contributor) / Lee, Juhyun (Performer) / ASU Library. Music Library (Publisher)
Created2018-03-31
ContributorsHur, Jiyoun (Performer) / Lee, Juhyun (Performer) / ASU Library. Music Library (Publisher)
Created2018-03-01
136836-Thumbnail Image.png
Description
Edward Snowden's publishing classified information about the existence of the Section 215 bulk collection metadata program set in motion the largest debate about potential abuse in by spying agencies since the Watergate Scandal in the 1970's. This paper will examine the metadata program by: First, the relevant background which includes

Edward Snowden's publishing classified information about the existence of the Section 215 bulk collection metadata program set in motion the largest debate about potential abuse in by spying agencies since the Watergate Scandal in the 1970's. This paper will examine the metadata program by: First, the relevant background which includes the establishment of the 20th century intelligence community, intelligence reforms in the wake of the Watergate scandal, and the changes stemming from the 9/11 attacks. Second, the Section 215 metadata program itself will be discussed, including its lawfulness. Third and finally, an analysis of potential reforms will be discussed, including ones advanced by government commissions. Ultimately, the Section 215 program has demonstrated compelling legal authority, positive benefits to national security, and a minimal need for reform. This conclusion is based on the program being consistent with the legal spirit of the Watergate Reforms, the language of the post-9/11 laws, the nature of the program, and the robust oversight protocols imposed upon the program.
ContributorsRicci, Anthony James (Author) / Gartner, David (Thesis director) / Longley, Kyle (Committee member) / Barrett, The Honors College (Contributor) / W. P. Carey School of Business (Contributor) / School of Politics and Global Studies (Contributor)
Created2014-05
ContributorsZaleski, Kimberly (Contributor) / Kazarian, Trevor (Performer) / Ryan, Russell (Performer) / IN2ATIVE (Performer) / ASU Library. Music Library (Publisher)
Created2018-09-28
134352-Thumbnail Image.png
Description
Though information warfare has been around for centuries, the advent of the Information Age has made this type of warfare increasingly utilized by both state and non-state actors to varying effects in conflicts across the world. Technological advances have ignited increases in computing power, information computerization, the proliferation of powerful

Though information warfare has been around for centuries, the advent of the Information Age has made this type of warfare increasingly utilized by both state and non-state actors to varying effects in conflicts across the world. Technological advances have ignited increases in computing power, information computerization, the proliferation of powerful information technology, and communication speeds. This study investigates Russian information warfare doctrine- specifically, the tactics employed in information warfare campaigns and the effects of such campaigns. The Russian hybrid warfare campaigns in Ukraine and Syria will serve as the focal case studies. I argue that Russian information warfare doctrine is inelastic, in that the core tactics used do not change in different conflicts. This study will dissect Russian information warfare principles, provide an overview of the Russian political objectives in both battlespaces, analyze the effectiveness of information warfare tactics when applied in two different engagement spheres, and will explore the reasons why the same tactics had different effects. The study finds that doctrinally identical information warfare tactics were used in both Ukraine and Syria. To provide further significance, the study discusses the policy implications that static Russian information warfare doctrine has regarding the future of information warfare in conflict.
ContributorsTran, Justin Namchuong (Author) / Rothenberg, Daniel (Thesis director) / Pagel, Bruce (Committee member) / School of Politics and Global Studies (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
ContributorsDelaney, Erin (Performer) / Novak, Gail (Pianist) (Performer) / ASU Library. Music Library (Publisher)
Created2018-03-18