Degree Level

States

Relationships of Benthic Macroinvertebrate Community Structure with Land-use, Habitat, In-stream Water Chemistry, Depositional Sediment Biofilm Fatty Acids, and Surfactants in the Effluent Dominated Texas Trinity River (open access)

Relationships of Benthic Macroinvertebrate Community Structure with Land-use, Habitat, In-stream Water Chemistry, Depositional Sediment Biofilm Fatty Acids, and Surfactants in the Effluent Dominated Texas Trinity River

The Trinity River is an urbanized, effluent-dominated river, and is heavily relied upon for drinking water. The benthic macroinvertebrate community has been monitored for over 20 years, with the focus of this dissertation on three studies (1987-88, 2005, and 2011). Water quality improvement following dechlorination resulted in increased benthic metrics. Overall habitat quality, in-stream cover, surface water total organic carbon, sediment total organic carbon, near-field urban land-use, near-field forested land-use, surface water surfactant toxic units, and depositional sediment biofilm fatty acids all have statistically significant relationships with benthic macroinvertebrate metrics. These relationships are better defined with increased taxonomic resolution at the genus/species level for all benthic taxa, including Chironomidae and Oligochaeta. It is recommend that benthic identifications for state and city water quality assessments be done at the genus/species level. A novel method for quantifying depositional sediment biofilm fatty acids has been produced and tested in this dissertation. Benthic metrics are directly related to fatty acid profiles, with several essential fatty acids found only at upstream sites.
Date: December 2013
Creator: Slye, Jaime L.
System: The UNT Digital Library
Selling Humans: the Political Economy of Contemporary Global Slavery (open access)

Selling Humans: the Political Economy of Contemporary Global Slavery

Human trafficking is a growing illegal crime, both in terms of numbers and profits. Thus, important to consider, as it is a human rights, political, criminal justice, national security, and economic issue. Previous studies have these examined these human trafficking factors independently, yet none have really taken into account how they work simultaneously. This study examines why human trafficker continues to occur, particularly at the domestic and transnational level, and also why some countries are better able to effectively deal with this problem in terms of criminalizing human traffickers. It is argued that at the domestic level, traffickers first must take into account the operating costs, illegal risks, bribery, and profits of the business. After considering these basic elements, they then need to consider the world, including economic, political, geographic, and cultural factors that may help facilitate human trafficking. However, human trafficking can occur across large geographic distances, though rare. This is more likely to happen based on the type of human trafficking group, available expatriate or immigrant networks, the origin-transit-destination country connection, or strength of the bilateral economic relationship between origin and destination countries. Finally, looking at why some countries are better able to criminalize traffickers helps us to …
Date: December 2013
Creator: Balarezo, Christine A.
System: The UNT Digital Library
Shakespeare and Modeling Political Subjectivity (open access)

Shakespeare and Modeling Political Subjectivity

This dissertation examines the role of aesthetic activity in the pursuit of political agency in readings of several of Shakespeare’s plays, including Hamlet (1600), A Midsummer Night’s Dream (1595), The Tempest (1610), the history plays of the second tetralogy (1595-9), Julius Caesar (1599), and Coriolanus (1605). I demonstrate how Shakespeare models political subjectivity—the capacity for individuals to participate meaningfully in the political realm—as necessitating active aesthetic agency. This aesthetic agency entails the fashioning of artistically conceived public personae that potential political subjects enact in the public sphere and the critical engagement of the aesthetic and political discourses of the subjects’ culture in a self-reflective and appropriative manner. Furthermore, these subjects should be wary auditors of the texts and personae they encounter within the public sphere in order to avoid internalizing constraining ideologies that reify their identities into forms less conducive to the pursuit of liberty and social mobility. Early modern audiences could discover several models for doing so in Shakespeare’s works. For example, Hamlet posits a model of Machiavellian theatricality that masks the Prince's interiority as he resists the biopolitical force and disciplinary discourses of Claudius's Denmark. Julius Caesar and Coriolanus advance a model of citizenship through the plays’ nameless …
Date: December 2013
Creator: Worlow, Christian D.
System: The UNT Digital Library
Ye Si Ye Jong: a Martial Arts Approach to Business Ethics (open access)

Ye Si Ye Jong: a Martial Arts Approach to Business Ethics

The purpose of this dissertation is to offer a new approach to business ethics grounded in the martial arts. This dissertation argues that traditional rules and regulations approaches to business ethics, though important, are inadequate. Such “top down” approaches must be complimented with corporate reform that comes “from the inside out.” The dissertation consults the martial arts to develop a core, multifaceted virtue – Ye Si Ye Jong – that ought to form the foundation for creating a corporate culture (or an ethos for business) that embraces a new approach to decision-making at every level of the organization – from the boards of directors, to individual employees. This dissertation frames the problem as a matter of corporate culture or ethos. This framing is a distinctive approach to corporate or business ethics in two respects: its emphasis on virtue and its integration of core concepts from the martial arts. This dissertation utilizes an uncommon example of business decision-making as its source for a case-study – a prominent university. While many may not think of colleges or universities as exemplars of common business activities, they do, in fact, provide a source of many ethical business dilemmas, both common and unique. Universities have …
Date: December 2013
Creator: House, Shaun D.
System: The UNT Digital Library
Simulating the Spread of Infectious Diseases in Heterogeneous Populations with Diverse Interactions Characteristics (open access)

Simulating the Spread of Infectious Diseases in Heterogeneous Populations with Diverse Interactions Characteristics

The spread of infectious diseases has been a public concern throughout human history. Historic recorded data has reported the severity of infectious disease epidemics in different ages. Ancient Greek physician Hippocrates was the first to analyze the correlation between diseases and their environment. Nowadays, health authorities are in charge of planning strategies that guarantee the welfare of citizens. The simulation of contagion scenarios contributes to the understanding of the epidemic behavior of diseases. Computational models facilitate the study of epidemics by integrating disease and population data to the simulation. The use of detailed demographic and geographic characteristics allows researchers to construct complex models that better resemble reality and the integration of these attributes permits us to understand the rules of interaction. The interaction of individuals with similar characteristics forms synthetic structures that depict clusters of interaction. The synthetic environments facilitate the study of the spread of infectious diseases in diverse scenarios. The characteristics of the population and the disease concurrently affect the local and global epidemic progression. Every cluster’ epidemic behavior constitutes the global epidemic for a clustered population. By understanding the correlation between structured populations and the spread of a disease, current dissertation research makes possible to identify risk …
Date: December 2013
Creator: Gomez-Lopez, Iris Nelly
System: The UNT Digital Library
Social Innovation in Venture Capital Firms: Strategy, Structure, and Performance (open access)

Social Innovation in Venture Capital Firms: Strategy, Structure, and Performance

Social innovations are solutions related to humanistic needs and the betterment of mankind with the intent of creating social value and eventual societal level changes. Social innovation therefore broadens traditional views of innovation to include processes of societal transformations and human behaviors. These social innovations are becoming more commonplace across all sectors, including capital markets. Private equity and venture capital firms in the capital markets sector engage in social innovation by investing capital with the goal of delivering both economic and social value. Despite the critical importance of venture capital (VC) in the success of social innovations through socially responsible investing, there is a paucity of research in understanding the factors that affect the performance of these social VC firms. This research gap is addressed by asking the following primary research question: What is the role of strategic and structural factors in the performance of socially innovative venture capital firms? The firm level research is theoretically based on the well-established design school. This framework highlights the overarching importance of strategy and structure in the accomplishment of firm goals. In the context of the venture capital industry, it was hypothesized that certain unique strategic and structural factors (i.e., stage of investment, …
Date: December 2013
Creator: Jones, Raymond J., III
System: The UNT Digital Library
Statistical Strategies for Efficient Signal Detection and Parameter Estimation in Wireless Sensor Networks (open access)

Statistical Strategies for Efficient Signal Detection and Parameter Estimation in Wireless Sensor Networks

This dissertation investigates data reduction strategies from a signal processing perspective in centralized detection and estimation applications. First, it considers a deterministic source observed by a network of sensors and develops an analytical strategy for ranking sensor transmissions based on the magnitude of their test statistics. The benefit of the proposed strategy is that the decision to transmit or not to transmit observations to the fusion center can be made at the sensor level resulting in significant savings in transmission costs. A sensor network based on target tracking application is simulated to demonstrate the benefits of the proposed strategy over the unconstrained energy approach. Second, it considers the detection of random signals in noisy measurements and evaluates the performance of eigenvalue-based signal detectors. Due to their computational simplicity, robustness and performance, these detectors have recently received a lot of attention. When the observed random signal is correlated, several researchers claim that the performance of eigenvalue-based detectors exceeds that of the classical energy detector. However, such claims fail to consider the fact that when the signal is correlated, the optimal detector is the estimator-correlator and not the energy detector. In this dissertation, through theoretical analyses and Monte Carlo simulations, eigenvalue-based detectors …
Date: December 2013
Creator: Ayeh, Eric
System: The UNT Digital Library
“Sunken Monadnock”: a Composition for Flute, Clarinet, Bassoon, Violin, Violoncello, Electric Guitar, Piano, Percussion, Three Female Vocalists, and Computer (open access)

“Sunken Monadnock”: a Composition for Flute, Clarinet, Bassoon, Violin, Violoncello, Electric Guitar, Piano, Percussion, Three Female Vocalists, and Computer

Sunken Monadnock is a scripted combination of three modular musical surfaces. The word “surface” is borrowed from Morton Feldman, who compared the aural surface of music to the canvases of the action painters of the American Abstract Expressionists, and contrasted it with the work’s subject, or organizational structure. Composers’ transition toward a focus on surface through indeterminate compositional techniques, according to Feldman, parallels the development of modernist abstract art. “Sunken Monadnock: Composing with Visual Metaphors” is a companion critical essay that takes the surface/subject metaphor as a starting point for analyzing Sunken Monadnock.Other visual metaphors that inspired Sunken Monadnock, and are discussed in the essay, include Shakir Hassan Al Said’s mystical semiotics, Jasper Johns’s crosshatch prints, and Wassily Kandinsky’s theory of abstraction. The circle and spiral, especially, play influential roles in Sunken Monadnock as reflected by musical applications of repetition, rotation, compression/rarefaction, and endlessness. The void in the circle’s center also comes into play. The nature of the work’s formal counterpoint requires an innovative approach to the score, which consists of five sections, each of which reflects a different approach to the aural surface (i.e., to the traversal of time). The two outer sections are traditionally scored, but the three …
Date: December 2013
Creator: Harris, Joshua Kimball
System: The UNT Digital Library
Teacher Communication in Title I Elementary Music Classrooms: Perceptions of Elementary Music Classroom Teachers (open access)

Teacher Communication in Title I Elementary Music Classrooms: Perceptions of Elementary Music Classroom Teachers

The increasing cultural diversity in the United States has brought not only richness, but also complex challenges, to various segments of American society, particularly with regard to public schools. As the student population continues to diversify while teacher population remains predominately White, female, and middle class, teacher awareness in the classroom might be an integral piece to assist students marginalized by stereotypes in feeling more empowered in the school community. Through qualitative data collection and analysis, and framed by Basil Bernstein’s language code theory, this study explored teachers’ perceptions of how classroom interactions, in light of differences in communication, might impact students of different socio-economic backgrounds from the teacher. The findings of this study indicated that the participants expressed a desire to connect with all of their students, regardless of their background. They also discussed challenges that made relationships difficult, such as feelings of disconnect from their Title I students and their families based on differences in home life and background. This dissonance was often difficult for the participants to reconcile due to pressures and difficulties in their teaching situations, such as the large number of students and the scheduling of classes, curricular pressures, and other district expectations such as …
Date: December 2013
Creator: Mason, Lindsey Lea
System: The UNT Digital Library
Titanium Boride Formation and Its Subsequent Influence on Morphology and Crystallography of Alpha Precipitates in Titanium Alloys (open access)

Titanium Boride Formation and Its Subsequent Influence on Morphology and Crystallography of Alpha Precipitates in Titanium Alloys

Over the last two decades there has been an increased interest in understanding the influence of trace boron additions in Ti alloys. These additions refine the prior β grain size in as-cast Ti alloys along with increasing their modulus and yield strength due to the precipitation of TiB. TiB also acts as a heterogeneous nucleation site for α precipitation and has been shown to influence the α phase morphology. B is completely soluble in liquid Ti but has a negligible solubility in both body centered cubic β and hexagonal close packed α phases of Ti. Thus, during solidification of hypoeutectic B containing alloys, B is rejected from β into the liquid where it reacts with Ti to form pristine single crystal whiskers of TiB. Despite a substantial amount of reported experimental work on the characterization of TiB precipitates, its formation mechanism and influence on α phase precipitation are still not clear. The current work is divided into two parts – (i) understanding the mechanism of TiB formation using first principles based density functional theory (DFT) calculations and (ii) elucidating how TiB influences the α phase morphology and crystallography in titanium alloys using electron microscopy techniques. TiB exhibits anisotropic growth morphology …
Date: December 2013
Creator: Nandwana, Peeyush
System: The UNT Digital Library
Transfer Capital and Academic Planning: Facilitating Successful Two- to Four-year Transfer in North Texas (open access)

Transfer Capital and Academic Planning: Facilitating Successful Two- to Four-year Transfer in North Texas

The study of transfer has been historically important and now approaches critical proportions. Current and historical patterns of enrollment and attainment in American higher education combined with the economic, demographic, political, and social realities of the 21st century drive the need for increased research and more effective practice for successful transfer of students from two- to four-year higher education institutions. An emerging theory for framing transfer success is transfer capital, which recommends academic planning, financial aid, and admissions advising as primary interventions to increase the rate and success of transfer. This mixed-methods study examined the academic planning portion of transfer capital to assess the effect of academic planning on the number of hours transferred, number of leveling courses needed, excess hours, and grade point average (GPA). Quantitative assessment measured differences among new transfer students enrolling between Spring 2012 and Fall 2013. Qualitative assessment was conducted with advisors and leadership that were part of the transfer advising program examined in this study. ANOVA indicated significant findings at the .05 level for each variable except GPA. Qualitative findings provided context and primary themes of institutional context, academic planning, financial aid knowledge, and institutional partnerships. Findings provide direction for practice as well as …
Date: December 2013
Creator: O’Keefe, Lynette M.
System: The UNT Digital Library
The Use of a Stimulus Control Transfer Procedure to Teach Spontaneous Manding to Children with Autism (open access)

The Use of a Stimulus Control Transfer Procedure to Teach Spontaneous Manding to Children with Autism

Current research indicates that the inability to spontaneously communicate needs or wants may result in the acquisition of unconventional forms of requesting such as aggression and tantrums. This in turn limits the amount of access that students with autism have to neurotypical peers and social environments. The purpose of this study was to investigate the effect of using a stimulus control transfer procedure on the acquisition of spontaneous mands. Four school-aged children with autism, two boys and two girls, participated in the study. A multiple baseline design across participants was utilized to demonstrate a functional relation between the stimulus control transfer procedures and the rate of spontaneous mands. Measurement variables included the frequency of spontaneous versus multiply-controlled mands during discrete trial training on a variety of verbal operants. Effectiveness of the intervention was analyzed through visual analysis and the magnitude of effect was assessed through effect size. Visual analysis indicated that three of the four participants learned to spontaneously mand for items out of view and demonstrated generalization across targets, staff and environments. The effect size for three participants were large (d = 1.94; d = 2.2; and d = 1.4), whereas the outcome of intervention for one participant (d …
Date: December 2013
Creator: Ward, Karen D.
System: The UNT Digital Library
The Validation of a Short-cycle Formative Assessment Observation Protocol for Science and Mathematics Instruction (open access)

The Validation of a Short-cycle Formative Assessment Observation Protocol for Science and Mathematics Instruction

Over the years, teachers, administrators, and policy makers have been concerned with optimizing learning for all students. The No Child Left Behind Act put an emphasis on summative assessments, which measure what students have learned. In contrast, formative assessment has been shown in many studies to improve student achievement and motivation because it is applied while students are learning. The purpose of this study was to investigate, for middle and high school mathematics and science instruction, the validity and reliability of a newly developed observation instrument called AssessToday, which is used in a single class period to assess a teacher’s use of short-cycle formative assessment. The content validity of the instrument was supported through an extensive literature review, feedback from experts in the field of formative assessment, and an examination of 98 classroom observations. For assessing reliability of the instrument, inter-rater reliability coefficients were calculated using data collected by trained observers who independently rated teachers during the same class period using three measures: percentage of agreement between raters, Cohen’s kappa, and Fleiss kappa. Cohen’s kappa (N = 36 pairs) ranged from .62 to 1.00 for all observer pairs with an average kappa of .75 for mathematics (n = 16 pairs) …
Date: December 2013
Creator: Heitz, Layne
System: The UNT Digital Library
Web Information Behaviors of Users Interacting with a Metadata Navigator (open access)

Web Information Behaviors of Users Interacting with a Metadata Navigator

The web information behaviors of users as they interacted with a metadata navigator, the Personal Information (PI) Agent, and reflected upon their interaction experiences were studied. The process included studying the complete iterative (repeated) cycle of information needs, information seeking, and information use of users interacting with an internet-based prototype metadata PI Agent tool. Detlor’s theory of web information behaviors of organizational users was utilized as a theoretical foundation for studying human-information interactions via the PI Agent tool. The qualitative research design allowed for the use of triangulation within the context of a one-group pretest-posttest design. Triangulation occurred in three phases: (a) observe, (b) collect, and (c) reflect. Observations were made as participants solved three problem situations. Participants’ computer log and print screen data were collected, and follow-up interviews were conducted once all posttest sessions ended to enable users to reflect on their experiences. The three triangulation phases ensured saturation of data and greater depth regarding the participants’ information behaviors. Content analysis occurred via exploratory pattern analysis using the posttest Problem Steps Recorder (PSR) log data and on the six interviewees’ follow-up interview data. Users engaged in iterative cycles of information needs, information seeking, and information use to resolve the …
Date: December 2013
Creator: McMillan, Tyson DeShaun
System: The UNT Digital Library
Witchcraft: a Targeted Societal Discrimination Against Women in Northern Ghana (open access)

Witchcraft: a Targeted Societal Discrimination Against Women in Northern Ghana

A combination of aging and poverty is becoming dominant in African society today, at a time when African countries are expected to be recovering from poverty, and are projected to house the economic growth of the next century. The emergence of aging in African context and the aging of the world population will expose the weakness of the current mechanisms used for older people around the world. As economies grow around the world, the distribution gap between the affluent and the poor widens, and the constant struggles for wealth, power, and social status, amidst scarce resources, continue to be sustained. To remain in charge of economic resources, the powerful few devise means to disenfranchise the weak, and witchcraft accusation is one of such tools used in Northern Ghana today. A new wave of witchcraft accusation has caught the attention of many in Northern Ghana. These victims with certain socioeconomic characteristics appear helpless and without defense against such accusations. As a result, they suffer untold hardships and are often compelled to leave their homes and to reside in camps reserved for witches. This study was undertaken to identify those sociodemographic characteristics, which are commonly shared by witchcraft accusation victims. These sociodemographic …
Date: December 2013
Creator: Atumah, Oscar Nwagbo
System: The UNT Digital Library
Accessing the Power of Aesthetics in Human-computer Interaction (open access)

Accessing the Power of Aesthetics in Human-computer Interaction

In information systems design there are two schools of thought about what factors are necessary to create a successful information system. The first, conventional view holds that system performance is a key, so that efficiency characteristics such as system usability and task completion time are primary concerns of system designers. The second, emerging view holds that the visual design is also the key, so that visual interface characteristics such as visual appeal, in addition to efficiency characteristics, are critical concerns of designers. This view contends that visual design enhances system use. Thus, this work examines the effects of visual design on computer systems. Visual design exerts its influence on systems through two mechanisms: it evokes affective responses from IT users, such as arousal and pleasure and it influences individuals’ cognitive assessments of systems. Given that both affective and cognitive reactions are significant antecedents of user behaviors in the IT realm, it is no surprise that visual design plays a critical role in information system success. Human-computer-interaction literature indicates that visual aesthetics positively influences such information success factors as usability, online trust, user satisfaction, flow experience, and so on. Although academic research has introduced visual design into the Information Systems (IS) …
Date: August 2013
Creator: Chenyan, Xu
System: The UNT Digital Library
Accountability in Schools:  a Study of High School Accountability Ratings and College Success (open access)

Accountability in Schools: a Study of High School Accountability Ratings and College Success

The purpose of this study was to determine the relationship between high school campus accountability ratings, college readiness indicators, and the percent of students who achieved first year college success. Correlation and multiple regression analyses were used to analyze the relationship between the variables. Data was analyzed for two-year and four-year postsecondary educational institutions which were divided by eight school district types. Regression analysis of the relationship between high school campus accountability ratings and the percent of students who achieved first year college success for four- year post secondary educational institutions revealed statistically significant results ranging from R2 =.179 to R2 = .220. Similar results were found for two-year post secondary educational institutions with statistically significant results ranging from R2 = .049 to R2 = .218. The results indicated negligible to small relationships between the variables. Regression results of the analysis for the relationship between college readiness indicators and the percent of students who achieved first year college success revealed statistically significant results for 2 - year post secondary educational institutions ranging from R2 = .077 to R2 = .596 and for 4 -year post secondary educational institutions ranging from R2 = .048 to R2 = .304. These results indicated …
Date: August 2013
Creator: Orsborn, Shannon
System: The UNT Digital Library
Accuracy and Interpretability Testing of Text Mining Methods (open access)

Accuracy and Interpretability Testing of Text Mining Methods

Extracting meaningful information from large collections of text data is problematic because of the sheer size of the database. However, automated analytic methods capable of processing such data have emerged. These methods, collectively called text mining first began to appear in 1988. A number of additional text mining methods quickly developed in independent research silos with each based on unique mathematical algorithms. How good each of these methods are at analyzing text is unclear. Method development typically evolves from some research silo centric requirement with the success of the method measured by a custom requirement-based metric. Results of the new method are then compared to another method that was similarly developed. The proposed research introduces an experimentally designed testing method to text mining that eliminates research silo bias and simultaneously evaluates methods from all of the major context-region text mining method families. The proposed research method follows a random block factorial design with two treatments consisting of three and five levels (RBF-35) with repeated measures. Contribution of the research is threefold. First, the users perceived a difference in the effectiveness of the various methods. Second, while still not clear, there are characteristics with in the text collection that affect the …
Date: August 2013
Creator: Ashton, Triss A.
System: The UNT Digital Library
Accurate and Reliable Prediction of Energetic and Spectroscopic Properties Via Electronic Structure Methods (open access)

Accurate and Reliable Prediction of Energetic and Spectroscopic Properties Via Electronic Structure Methods

Computational chemistry has led to the greater understanding of the molecular world, from the interaction of molecules, to the composition of molecular species and materials. Of the families of computational chemistry approaches available, the main families of electronic structure methods that are capable of accurate and/or reliable predictions of energetic, structural, and spectroscopic properties are ab initio methods and density functional theory (DFT). The focus of this dissertation is to improve the accuracy of predictions and computational efficiency (with respect to memory, disk space, and computer processing time) of some computational chemistry methods, which, in turn, can extend the size of molecule that can be addressed, and, for other methods, DFT, in particular, gain greater insight into which DFT methods are more reliable than others. Much, though not all, of the focus of this dissertation is upon transition metal species – species for which much less method development has been targeted or insight about method performance has been well established. The ab initio approach that has been targeted in this work is the correlation consistent composite approach (ccCA), which has proven to be a robust, ab initio computational method for main group and first row transition metal-containing molecules yielding, on …
Date: August 2013
Creator: Laury, Marie L.
System: The UNT Digital Library
Adolescent Task Management: Multitasking and Social Media in the Student Search Process (open access)

Adolescent Task Management: Multitasking and Social Media in the Student Search Process

This study examines adolescent students at an American international school and observes student use of social networking programs as well as physical actions in the search process. The study specifically observed multitasking behavior and organizational skills among students, as well as linkages made through social networking sites. Student observations, student interviews, analysis of Facebook entries, and a survey on multitasking yielded rich data. Students appear to be far more organized than previously suggested in the literature, and in this study, the organization proved to be largely self-taught. Students used their social networks to build a kind of group expertise that compensated for their youthful naivety. Students exhibited self-control within the search to the degree that they could focus on what they wanted to find, and they used heuristics—mental shortcuts—to achieve what they needed. Searches also suggest creativity in that students were flexible in their search methods and used a number of tools to gather information. Students could balance the needs of the academic or imposed search with their own online lives, meaning that they made compensations for social media and media multitasking when it was deemed necessary.
Date: August 2013
Creator: Kurtenbach, John
System: The UNT Digital Library
Adventure Based Counseling: Exploring the Impact of Abc on Adaptive Functioning in High School Males (open access)

Adventure Based Counseling: Exploring the Impact of Abc on Adaptive Functioning in High School Males

The purpose of this study was to examine the impact of ABC on adaptive functioning in high school males. Specifically, a pretest/posttest, experimental design (N = 46; Caucasian = 26, Hispanic = 20) was used to examine the changes in adaptive and maladaptive functioning in ABC participants (n = 21) compared to those in a control/waitlist group (n = 25) as measured by the Behavior Assessment System for Children, second edition (BASC-2). Participants randomly assigned to the treatment group engaged in 10 ABC sessions. In order to better understand group process in ABC, I had experimental group participants complete the Group Climate Question Short form (GCQ-S) three times during the intervention. A mixed between/within subjects ANOVA of the BASC-2 scores revealed a statistically significant increase in adaptive functioning for both groups, F(1, 33) = 8.58, p < .01, with a partial eta squared of .21 indicating a large effect. There was no statistically significant difference between the experimental and control/waitlist groups, F(1, 33) = .064, p = .80, and a very small effect size (partial eta squared < .01). A repeated measures ANOVA of the GCQ-S scores revealed a statistically significant increase in engagement, F(2, 38) = 4.067, p = …
Date: August 2013
Creator: Christian, David D.
System: The UNT Digital Library
Altruism and Depression: Exploring This Relationship and the Mechanisms Behind It (open access)

Altruism and Depression: Exploring This Relationship and the Mechanisms Behind It

The impact of environmental influences on depression has been well established by research. In particular, it is known that receiving/perceiving adequate social support has a protective influence on depression. Less is known about the protective benefits of providing support to others, namely in the form of altruistic, empathetic, or prosocial behavior. While research has shown that having altruistic attitudes and engaging in altruistic behaviors has a positive impact on physical health and mental well-being, studies on the association between altruistic attitudes and/or behavior and depression are limited. The present study examined the relationship between altruism and depression, and hypotheses were tested that allow for explanation of why altruism may protect against depression. A sample of 303 participants was recruited from the University of North Texas and the surrounding community. Participants completed an online survey that examined their altruistic activities, details regarding these activities, their prosocial attitudes, and their current level of depression. Results did not support that level of involvement in altruistic activities is directly related to depression severity. However, outcomes from involvement in altruistic activities, including sense of overburden from participating in altruistic activities, level of social interaction with other helpers and those helped during altruistic activities, and sense …
Date: August 2013
Creator: Wright, Brittney, C.
System: The UNT Digital Library
Analyzing Patterns Within Academic and Legal Definitions: a Qualitative Content Analysis of the Term "Cyberbullying" (open access)

Analyzing Patterns Within Academic and Legal Definitions: a Qualitative Content Analysis of the Term "Cyberbullying"

Regardless of culture or nation, students today are experiencing bullying via technology. With the rise of technology, this abuse has the ability to become more far-reaching, and more pervasive than ever. These students face oppression, and in some cases severe imbalances of power. Current research is being conducted and laws created based on varying operational and conception definitions of the term "cyberbullying." This study aims to analyze and provide a coherent definition for the term "cyberbullying" as it is used in research and legislation, especially in the context of today's educational environments. The results help shed light on the large variances in the term and suggestions are made to clarify the definition as the field continues to move forward.
Date: August 2013
Creator: Winn, Matthew R.
System: The UNT Digital Library
Attention and Metacognition in the Elaborated Intrusion Theory of Desire (open access)

Attention and Metacognition in the Elaborated Intrusion Theory of Desire

The elaborated intrusion (EI) theory of desire is a cognitive model that describes the processes involved in craving as intrusive thoughts that are elaborated upon leading to dissonance when desires are not met. While the theory is based on a wide body of research, certain theoretical predictions have not been fully examined. Specifically, EI theory argues that mental imagery has a central role in craving, and predicts that attempts to suppress substance-related intrusive thoughts and mental imagery is related to increased craving. Further, EI theory suggests that elaboration of craving imagery is related to attention and working memory processes, however, there are questions about whether differential performance in these domains is related to craving. The current study examined the relationship between attention/working memory performance and alcohol craving in a sample of 119 young adult males. Additionally, metacognition was examined to clarify the phenomenological aspects of craving within EI theory. Attention and working memory performance did not significantly predict intrusive thought and mental imagery elaboration. Individuals with high craving reported significantly higher levels of anxiety, thought suppression, and greater strength and frequency of craving-related mental imagery. They were also more likely to try to control their own thoughts and make negative …
Date: August 2013
Creator: Yates, Robert D., III
System: The UNT Digital Library