Matching Items (620)
152579-Thumbnail Image.png
Description
This qualitative study examines the major changes in relationship closeness of married couples when one spouse acquires a vision disability. Turning Points analysis and Retrospective Interview Technique (RIT) were utilized which required participants to plot their relational journey on a graph after the onset of the disability. A sample of

This qualitative study examines the major changes in relationship closeness of married couples when one spouse acquires a vision disability. Turning Points analysis and Retrospective Interview Technique (RIT) were utilized which required participants to plot their relational journey on a graph after the onset of the disability. A sample of 32 participants generating 100 unique turning points and 32 RIT graphs lent in-depth insight into the less explored area of the impact of a visual disability on marital relationships. A constant comparison method employed for the analysis of these turning points revealed six major categories, which include Change in Relational Dynamics, Realization of the Disability, Regaining Normality in Life, Resilience, Reactions to Assistance, and Dealing with the Disability. These turning points differ in terms of their positive or negative impact on the relational closeness between partners. In addition, the 32 individual RIT graphs were also analyzed and were grouped into four categories based on visual similarity, which include Erratic Relational Restoration, Erratic Relational Increase, Consistent Closeness and Gradual Relational Increase. Results provide theoretical contributions to disability and marriage literature. Implications for the application of turning points to the study of post-disability marital relationships are also discussed, and research directions identified.
ContributorsBhagchandani, Bhoomika (Author) / Kassing, Jeffrey W. (Thesis advisor) / Kelley, Douglas L. (Committee member) / Fisher, Carla L. (Committee member) / Li, Baoxin (Committee member) / Arizona State University (Publisher)
Created2014
153435-Thumbnail Image.png
Description
ABSTRACT

This study examines the ways in which employees experience moral emotions that violate employee treatment and how employees co-construct moral emotions and subsequent expressions of dissent. This qualitative study consisted of 123 full-time employees and utilized open-coding, content analysis, constant comparison analysis, and concept mapping. The analysis revealed that

ABSTRACT

This study examines the ways in which employees experience moral emotions that violate employee treatment and how employees co-construct moral emotions and subsequent expressions of dissent. This qualitative study consisted of 123 full-time employees and utilized open-coding, content analysis, constant comparison analysis, and concept mapping. The analysis revealed that employees expressed dissent laterally as a series of sensemaking processes, such as validation of feelings, moral assessments, and assessing the fear of moral transgressions. Employees also expressed dissent as a series of risk assessments that overlapped with the ways in which employees made sense of the perceived infraction. Employees' lateral dissent expression manifested as a form of social support which occasionally led to co-rumination. Employees expressed dissent upwardly when seeking a desired action or change. Circumvention was utilized as a direct reflection to the type and degree of moral transgression related to the person responsible for the mistreatment. Results indicated that experiencing moral emotions that led to expressing dissent with a designated audience was determined by where employees were situated in the cyclical model of communicating moral emotions and in relation to the co-construction of both the infraction related to employee mistreatment and the experience of moral emotions. Results contribute to the existing body of literature on dissent and emotions. A discussion synthesizing the findings and analysis is presented, in addition to the implications for future research.

KEYWORDS: Emotion, Dissent, Moral Emotions, Sensemaking, Risk-Assessment, Social Support, Co-Rumination
ContributorsKamrath, Jessica K (Author) / Kassing, Jeffrey W. (Thesis advisor) / Waldron, Vincent R. (Committee member) / Meân, Lindsey J. (Committee member) / Arizona State University (Publisher)
Created2015
150562-Thumbnail Image.png
Description
Sports communication is a vibrant, blossoming research area within the communication discipline. One of the more fruitful directions in sports communication research pertains to social media. Social media has embedded itself in the sports world in a very short period of time. As a result, there is a need for

Sports communication is a vibrant, blossoming research area within the communication discipline. One of the more fruitful directions in sports communication research pertains to social media. Social media has embedded itself in the sports world in a very short period of time. As a result, there is a need for instructional resources that prepare students to understand the nuances and power that social media possess. This research provides the foundation for a case study textbook centered on social media and sports communication. Specifically, four cases dealing with: (a) athletes using social media to encourage input from fans; (b) sports organizations using social media as an agenda-setting tool; (c) negative parasocial interaction expressed to athletes via social media; and (d) athletes using social media to enact image repair are presented. These cases demonstrate that social media is a valuable conduit between athletes and fans that enables athletes and sports organizations to cultivate fan identity and maintain control over public information. The cases also demonstrate that fan behavior via social media can quickly turn problematic, requiring that athletes and sports organizations respond appropriately, yet strategically. The research concludes by offering implications for future social media and sports communication research.
ContributorsSanderson, Jimmy (Author) / Kassing, Jeffrey W. (Thesis advisor) / Ramirez Jr, Artemio (Committee member) / Meân, Lindsey J. (Committee member) / Arizona State University (Publisher)
Created2012
149760-Thumbnail Image.png
Description
The current study is the first qualitative investigation aimed solely at understanding what it means to communicate conditional forgiveness in serious romantic relationships. Conditional forgiveness is forgiveness that has been offered with the stipulation that the errant behavior cease. It is a provocative topic because some argue genuine forgiveness

The current study is the first qualitative investigation aimed solely at understanding what it means to communicate conditional forgiveness in serious romantic relationships. Conditional forgiveness is forgiveness that has been offered with the stipulation that the errant behavior cease. It is a provocative topic because some argue genuine forgiveness is not conditional, but recent discoveries that have associated its use with severe transgressions and relational deterioration suggest it is a critical site for investigation. This inductive analysis of open-ended data from 201 anonymous surveys identified both distinctions between and intersections of conditional forgiveness, forgiveness, and reconciliation. A relational dialectics analysis also revealed that reconcilable-irreconcilable was the overarching tension for conditional forgivers and six additional tensions also were also discovered: individual identity-couple identity, safety-risk, certainty-uncertainty, mercy-justice, heart-mind, and expression-suppression. Of particular intrigue, the current analysis supports the previous discovery of implicit conditional forgiveness--suppressing conditions, sometimes in response to physical and substance abuse. Ultimately, the current analysis contributes to the enduring conversation aimed at understanding the communication and pursuit of forgiveness and reconciliation. It addresses one of the basic instincts and paradoxes of existing with others--the balance between vulnerability and protection.
ContributorsKloeber, Dayna Noel (Author) / Waldron, Vincent R. (Thesis advisor) / Kelley, Douglas L. (Committee member) / Kassing, Jeffrey W. (Committee member) / Fisher, Carla L. (Committee member) / Arizona State University (Publisher)
Created2011
156334-Thumbnail Image.png
Description
The challenges that face student-athletes when they retire from formal sport participation coincides with their loss of their athletic identity (how much they identify with their athlete role), often geographic upheaval, uncertainty of the future regarding alternate roles, and change in social support systems, which make this period more difficult

The challenges that face student-athletes when they retire from formal sport participation coincides with their loss of their athletic identity (how much they identify with their athlete role), often geographic upheaval, uncertainty of the future regarding alternate roles, and change in social support systems, which make this period more difficult to adjust to. This study explored the experiences of the retirement transition of graduating student-athletes. The current study aims to examine this unique experience through qualitative investigation into the collective experiences of student-athletes to identify overarching relevant themes common throughout this experience. The participants were 13 student-athletes who graduated in the Spring Semester of 2017 (May- June 2017), played their sport at a National Collegiate Athletics Association (NCAA) Institution at the Varsity level, and were not continuing to play their sport at the elite level. Semi-structured interviews were conducted with participants between five and eight months post-graduation. Thematic analysis was used to categorize participants’ responses and allow for an in-depth investigation of different factors affecting personal adjustment throughout this period. The five overarching themes identified were: the need for social connection, the impact of a goal-oriented mindset, preparedness for the transition, translatable skills from being a student-athlete, and the perspective of their own identity and purpose. The ability to shift perspective to retrospectively appreciate the student-athlete experience, while incorporating it as one part of their overall life journey, is discussed as a protective factor for positive transition outcomes. As the large majority of collegiate athletes do not continue to play their sport professionally, this population is in high need of continued guidance. The present work can inform interventions to aid student-athletes in this difficult transitional period. Mentorship from previously graduated student-athletes, coaches, or administrative programs are suggested as a tangible positive intervention strategy based off of the results.
ContributorsKnizek, Olivia Alison (Author) / Meân, Lindsey J. (Thesis advisor) / Roberts, Nicole A. (Thesis advisor) / Mickelson, Kristin (Committee member) / Arizona State University (Publisher)
Created2018
133359-Thumbnail Image.png
Description
The current trend of interconnected devices, or the internet of things (IOT) has led to the popularization of single board computers (SBC). This is primarily due to their form-factor and low price. This has led to unique networks of devices that can have unstable network connections and minimal processing power.

The current trend of interconnected devices, or the internet of things (IOT) has led to the popularization of single board computers (SBC). This is primarily due to their form-factor and low price. This has led to unique networks of devices that can have unstable network connections and minimal processing power. Many parallel program- ming libraries are intended for use in high performance computing (HPC) clusters. Unlike the IOT environment described, HPC clusters will in general look to obtain very consistent network speeds and topologies. There are a significant number of software choices that make up what is referred to as the HPC stack or parallel processing stack. My thesis focused on building an HPC stack that would run on the SCB computer name the Raspberry Pi. The intention in making this Raspberry Pi cluster is to research performance of MPI implementations in an IOT environment, which had an impact on the design choices of the cluster. This thesis is a compilation of my research efforts in creating this cluster as well as an evaluation of the software that was chosen to create the parallel processing stack.
ContributorsO'Meara, Braedon Richard (Author) / Meuth, Ryan (Thesis director) / Dasgupta, Partha (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133381-Thumbnail Image.png
Description
This thesis discusses three recent optimization problems that seek to reduce disease spread on arbitrary graphs by deleting edges, and it discusses three approximation algorithms developed for these problems. Important definitions are presented including the Linear Threshold and Triggering Set models and the set function properties of submodularity and monotonicity.

This thesis discusses three recent optimization problems that seek to reduce disease spread on arbitrary graphs by deleting edges, and it discusses three approximation algorithms developed for these problems. Important definitions are presented including the Linear Threshold and Triggering Set models and the set function properties of submodularity and monotonicity. Also, important results regarding the Linear Threshold model and computation of the influence function are presented along with proof sketches. The three main problems are formally presented, and NP-hardness results along with proof sketches are presented where applicable. The first problem seeks to reduce spread of infection over the Linear Threshold process by making use of an efficient tree data structure. The second problem seeks to reduce the spread of infection over the Linear Threshold process while preserving the PageRank distribution of the input graph. The third problem seeks to minimize the spectral radius of the input graph. The algorithms designed for these problems are described in writing and with pseudocode, and their approximation bounds are stated along with time complexities. Discussion of these algorithms considers how these algorithms could see real-world use. Challenges and the ways in which these algorithms do or do not overcome them are noted. Two related works, one which presents an edge-deletion disease spread reduction problem over a deterministic threshold process and the other which considers a graph modification problem aimed at minimizing worst-case disease spread, are compared with the three main works to provide interesting perspectives. Furthermore, a new problem is proposed that could avoid some issues faced by the three main problems described, and directions for future work are suggested.
ContributorsStanton, Andrew Warren (Author) / Richa, Andrea (Thesis director) / Czygrinow, Andrzej (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
131504-Thumbnail Image.png
Description
In the last few years, billion-dollar companies like Yahoo and Equifax have had data breaches causing millions of people’s personal information to be leaked online. Other billion-dollar companies like Google and Facebook have gotten in trouble for abusing people’s personal information for financial gain as well. In this new age

In the last few years, billion-dollar companies like Yahoo and Equifax have had data breaches causing millions of people’s personal information to be leaked online. Other billion-dollar companies like Google and Facebook have gotten in trouble for abusing people’s personal information for financial gain as well. In this new age of technology where everything is being digitalized and stored online, people all over the world are concerned about what is happening to their personal information and how they can trust it is being kept safe. This paper describes, first, the importance of protecting user data, second, one easy tool that companies and developers can use to help ensure that their user’s information (credit card information specifically) is kept safe, how to implement that tool, and finally, future work and research that needs to be done. The solution I propose is a software tool that will keep credit card data secured. It is only a small step towards achieving a completely secure data anonymized system, but when implemented correctly, it can reduce the risk of credit card data from being exposed to the public. The software tool is a script that can scan every viable file in any given system, server, or other file-structured Linux system and detect if there any visible credit card numbers that should be hidden.
ContributorsPappas, Alexander (Author) / Zhao, Ming (Thesis director) / Kuznetsov, Eugene (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131514-Thumbnail Image.png
Description
Political polarization is the coalescence of political parties -- and the individuals of which parties are composed -- around opposing ends of the ideological spectrum. Political parties in the United States have always been divided, however, in recent years this division has only intensified. Recently, polarization has also wound its

Political polarization is the coalescence of political parties -- and the individuals of which parties are composed -- around opposing ends of the ideological spectrum. Political parties in the United States have always been divided, however, in recent years this division has only intensified. Recently, polarization has also wound its way to the Supreme Court and the nomination processes of justices to the Court. This paper examines how prevalent polarization in the Supreme Court nomination process has become by looking specifically at the failed nomination of Judge Merrick Garland and the confirmations of now-Justices Neil Gorsuch and Brett Kavanaugh. This is accomplished by comparing the ideologies and qualifications of the three most recent nominees to those of previous nominees, as well as analysing the ideological composition of the Senate at the times of the individual nominations.
ContributorsJoss, Jacob (Author) / Hoekstra, Valerie (Thesis director) / Critchlow, Donald (Committee member) / Computer Science and Engineering Program (Contributor) / School of Politics and Global Studies (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131525-Thumbnail Image.png
Description
The original version of Helix, the one I pitched when first deciding to make a video game
for my thesis, is an action-platformer, with the intent of metroidvania-style progression
and an interconnected world map.

The current version of Helix is a turn based role-playing game, with the intent of roguelike
gameplay and a dark

The original version of Helix, the one I pitched when first deciding to make a video game
for my thesis, is an action-platformer, with the intent of metroidvania-style progression
and an interconnected world map.

The current version of Helix is a turn based role-playing game, with the intent of roguelike
gameplay and a dark fantasy theme. We will first be exploring the challenges that came
with programming my own game - not quite from scratch, but also without a prebuilt
engine - then transition into game design and how Helix has evolved from its original form
to what we see today.
ContributorsDiscipulo, Isaiah K (Author) / Meuth, Ryan (Thesis director) / Kobayashi, Yoshihiro (Committee member) / School of Mathematical and Statistical Sciences (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05