You limited your search to:

  Partner: UNT Libraries
 Collection: UNT Theses and Dissertations
Exploring the Impacts of Fashion Blog Type and Message Type on Female Consumer Response Towards the Brand

Exploring the Impacts of Fashion Blog Type and Message Type on Female Consumer Response Towards the Brand

Date: December 2013
Creator: Melton, Rebecca
Description: The current study examines the influences of blog type and blog message type on consumers’ perceptions of brand credibility and brand similarity. Additionally, the study seeks to understand the interaction effects of blog type and message type on brand credibility and brand similarity and on consumer engagement with a blog. The findings reveal that message type, specifically product message, is an important consideration when marketers want to illustrate similarities between the brand and consumers. Additionally, it was found that product messages should be considered when encouraging consumer engagement with a blog. However, blog type did not have an effect on consumer perceptions of brand credibility and similarity or consumer engagement.
Contributing Partner: UNT Libraries
Exploring the Integration of Thai Traditional Music in Chakra by Narong Prangchareon, with a Conductor’s Guide

Exploring the Integration of Thai Traditional Music in Chakra by Narong Prangchareon, with a Conductor’s Guide

Date: August 2015
Creator: Kanchanahud, Nipat
Description: This dissertation explores the integration of Thai traditional music in Chakra, for wind band, by Narong Prangchareon. Nipat Kanchanahud explores how Narong, inspired by Eastern philosophy, integrates elements of Thai traditional music and the types, styles, scales, and dialects of Thai culture with the formal elements of Western music and the instrumentation of the Western wind band. Chakra uniquely spans Eastern and Western cultures, creating a new musical language for both worlds to appreciate and enjoy. Further, the composition richly demonstrates the viability of the wind band as an international medium. The orchestration of Chakra reveals Narong’s musical lineage from Edgard Varèse through Chen Yi. A conductor’s guide, included with this dissertation, is designed to aid and encourage performances of Chakra throughout the world.
Contributing Partner: UNT Libraries
Exploring the Private Music Studio: Problems Faced by Teachers in Attempting to Quantify the Success of Teaching Theory in Private Lessons through One Method as Opposed to Another

Exploring the Private Music Studio: Problems Faced by Teachers in Attempting to Quantify the Success of Teaching Theory in Private Lessons through One Method as Opposed to Another

Date: August 2006
Creator: McKnight, Michael
Description: I present strategies and methods for teaching fundamentals of music theory in the context of the private music studio through a variety of techniques and research. Beginning with a background in educational psychology, examples of behaviorist and cognitive teaching models are presented, and how each applies to teaching music is explained. Two detailed examples of actual lessons are presented, coupled with musical examples, to describe both the process and the concepts that can be presented. A qualitative experiment based upon the learning styles of three music students and the effect of different teaching styles when teaching the same concept is presented and discussed in detail.
Contributing Partner: UNT Libraries
Exploring the relationship between continuing professional education and job satisfaction for information technology professionals in higher education.

Exploring the relationship between continuing professional education and job satisfaction for information technology professionals in higher education.

Date: May 2006
Creator: Bennett, Sandra M.
Description: The study had four main hypotheses that examined the relationships between job satisfaction and the reasons for attending continuing professional education (CPE). The purpose of this study was to examine the relationships between training and job satisfaction with the objective of adding to the body of knowledge related to both job satisfaction and training and development. Participation Reasons Scale was used to measure the reasons for attending CPE activities, and the Job in General Scale and Job Descriptive Index was used to measure job satisfaction. The surveys were administered over the Internet to information technology professionals working in higher education. The participants were contacted by email with a message explaining the purpose of the research and a Web link that took the participants directly to the survey. After collecting the data, it was exported into SPSS and analyzed using Spearman Rho and Mann Whitney U statistics and a simple structure exploratory factor to determine any underlying structures between the job satisfaction and CPE.
Contributing Partner: UNT Libraries
Exploring the Relationships Between Faculty Beliefs and Technology Preferences

Exploring the Relationships Between Faculty Beliefs and Technology Preferences

Date: May 2015
Creator: Faulkner, Christopher G.
Description: All too often faculty are asked to implement technology into their teaching without the knowledge necessary to use the technology effectively. Due to the evolution of technology in everyday settings, students have come to expect to be engaged through technological means. This often creates undue stress on faculty members. The purpose of this study is to investigate technology integration by exploring the relationships between a faculty member’s technology preferences and educational beliefs. Through a mixed method, this study attempts to address the question of why faculty use the types of technology they do. More importantly, this study investigates if a faculty member’s educational beliefs have any influence on the technology they choose to use. Thirty-two medical, clinical, and healthcare faculty members participated in the study. They responded to a Teaching Perspectives Inventory (TPI) survey and a Technology Preferences survey with open-ended questions. Data analysis revealed multiple statistically significant findings between different beliefs and different types of technology. The results indicated that personal epistemic beliefs influence the types of technology faculty use. The technology choices faculty make are largely related to tools they are comfortable with and ones they believe effectively fit their teaching materials. The study also found statistically significant ...
Contributing Partner: UNT Libraries
Exploring the Relationships Between Mindfulness, Self-compassion, and Ethnic Identity Development

Exploring the Relationships Between Mindfulness, Self-compassion, and Ethnic Identity Development

Date: May 2012
Creator: Sinha, Aditi
Description: Ethnic identity development is a process that occurs for all individuals, and weakness in ethnic identity is associated with numerous psychosocial difficulties. Security in ethnic identity can be difficult for those exposed to varying attitudes and behaviors in a multicultural society. As such, the current study examined the influence of mindfulness and self-compassion on ethnic identity development. a sample of 479 undergraduate students completed online self-report questionnaires measuring demographic information, mindfulness, self-compassion, ethnic identity status, and self-esteem. Results suggested that mindfulness and self-compassion are significant negative predictors of ethnic identity, and that self-compassion was a better predictor of ethnic identity status than was mindfulness. Self-compassion did not moderate the relationship between mindfulness and ethnic identity status, as was hypothesized. the sample included primarily Caucasian (n = 278) individuals born in the United States, which likely limited generalizability of findings. Implications of the current findings and suggestions for future research are discussed.
Contributing Partner: UNT Libraries
Exploring the role of secondary attachment relationships in the development of attachment security.

Exploring the role of secondary attachment relationships in the development of attachment security.

Date: August 2005
Creator: Cohen, Diane L.
Description: The process by which earned-secures achieve attachment security in adulthood, despite having insecure parent-child relationships in childhood, was the focus of the current study. As internal working models are thought to be formed within relationships, specifically primary attachment bonds (Bowlby, 1969), it was postulated that secondary attachment relationships, specifically those that were positive, had the capacity to revise insecure models of self and other. In the current study, the secondary attachment histories of undergraduates who were earned-secure and continuously-insecure, or insecurely attached since childhood, were compared. A new measure of secondary attachment quality was developed (Questionnaire About Secondary Attachment Figures (Q-SAF)), which was used to measure undergraduates' perceptions of their past and current secondary attachment figures. Findings indicated that in comparison to continuous-insecures, earned-secures perceived their negative secondary attachment figures in adolescence as less mean. Earned-secures also reported being less dependent upon these figures' approval of them for their self-worth and more secure within these relationships. In adulthood, earned-secures reported more trust and intimacy with their positive secondary attachment figures. Compared to continuous-insecures, earned-secures described their peers as being more empathic and altruistic during childhood and more warm during adolescence; earned-secures also reported less dependency and greater closeness with their ...
Contributing Partner: UNT Libraries
Exploring Trusted Platform Module Capabilities: A Theoretical and Experimental Study

Exploring Trusted Platform Module Capabilities: A Theoretical and Experimental Study

Date: May 2008
Creator: Gunupudi, Vandana
Description: Trusted platform modules (TPMs) are hardware modules that are bound to a computer's motherboard, that are being included in many desktops and laptops. Augmenting computers with these hardware modules adds powerful functionality in distributed settings, allowing us to reason about the security of these systems in new ways. In this dissertation, I study the functionality of TPMs from a theoretical as well as an experimental perspective. On the theoretical front, I leverage various features of TPMs to construct applications like random oracles that are impossible to implement in a standard model of computation. Apart from random oracles, I construct a new cryptographic primitive which is basically a non-interactive form of the standard cryptographic primitive of oblivious transfer. I apply this new primitive to secure mobile agent computations, where interaction between various entities is typically required to ensure security. I prove these constructions are secure using standard cryptographic techniques and assumptions. To test the practicability of these constructions and their applications, I performed an experimental study, both on an actual TPM and a software TPM simulator which has been enhanced to make it reflect timings from a real TPM. This allowed me to benchmark the performance of the applications and test ...
Contributing Partner: UNT Libraries
The Exponential Functions

The Exponential Functions

Date: 1947
Creator: Sloan, Robert S.
Description: The purpose of this paper is to clarify the problems of exponents by introducing notation not customarily used and by demonstrating certain theorems in regard to the properties of the exponential functions.
Contributing Partner: UNT Libraries
Exposing Deep-rooted Anger: A Metaphor Pattern Analysis of Mixed Anger Metaphors

Exposing Deep-rooted Anger: A Metaphor Pattern Analysis of Mixed Anger Metaphors

Date: August 2011
Creator: Barron, Andrew T.
Description: This project seeks to serve two purposes: first, to investigate various semantic and grammatical aspects of mixed conceptual metaphors in reference to anger; and secondly, to explore the potential of a corpus-based, TARGET DOMAIN-oriented method termed metaphor pattern analysis to the study of mixed metaphor. This research shows that mixed metaphors do not pattern in a manner consistent with statements made within conceptual metaphor theory. These metaphors prove highly dynamic in their combinability and resist resonance between SOURCE DOMAINS used. Also shown is the viability of metaphor pattern analysis as a methodology to approach mixed metaphor research.
Contributing Partner: UNT Libraries