Current Search: peers (x)
Pages
-
-
Title
-
Accuracy of the Peer Informant: What Characteristics Are Related to the Ability to Detect Behavior Problems in Peers?.
-
Creator
-
Lauer, Brea-anne, Renk, Kimberly, Beidel, Deborah, Sims, Valerie, University of Central Florida
-
Abstract / Description
-
Victimization and rejection by peers leads to and exacerbates behavior problems in children and adolescents. Given the implications of problematic peer relations for adolescents who experience behavior problems, the present study examined factors that may be related to how adolescents perceive peers who exhibit such problems. Specifically, the present study examined the relationship of adolescent peer informants' socioeconomic status, their prior exposure to psychopathology, their own social...
Show moreVictimization and rejection by peers leads to and exacerbates behavior problems in children and adolescents. Given the implications of problematic peer relations for adolescents who experience behavior problems, the present study examined factors that may be related to how adolescents perceive peers who exhibit such problems. Specifically, the present study examined the relationship of adolescent peer informants' socioeconomic status, their prior exposure to psychopathology, their own social competence, and their own behavior problems to their perceptions of peer internalizing and externalizing behavior problems, their liking of individuals who exhibit such problems, and their attributions for the etiology of such problems when portrayed by fictitious adolescents of the same age. In particular, adolescents were asked to rate a set of vignettes that portray internalizing and externalizing behavior problems that are seen commonly in peers and to complete a set of brief questionnaires. Results revealed that adolescents are able to accurately detect the presence of both internalizing and externalizing behavior problems in vignette characters. Additionally, vignette characters who display behavior problems received significantly lower liking ratings. Finally, although adolescents endorsed both internal and external etiological factors, ratings were related to the gender of the depicted vignette character and the nature of the portrayed behavior problems. Participants' own externalizing problems, social competence, and previous exposure to behavior problems in others related uniquely to adolescents' perceptions of the vignette characters. Overall, this study provided additional evidence that, although peers can serve as valuable informants, they also tended to reject adolescents who display behavior problems.
Show less
-
Date Issued
-
2012
-
Identifier
-
CFE0004185, ucf:49022
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004185
-
-
Title
-
THE NEXT GENERATION BOTNET ATTACKS AND DEFENSES.
-
Creator
-
Wang, Ping, Zou, Cliff, University of Central Florida
-
Abstract / Description
-
A "botnet" is a network of compromised computers (bots) that are controlled by an attacker (botmasters). Botnets are one of the most serious threats to today's Internet; they are the root cause of many current Internet attacks, such as email spam, distributed denial of service (DDoS) attacks, click fraud, etc. There have been many researches on how to detect, monitor, and defend against botnets that have appeared and their attack techniques. However, it is equally important for us to...
Show moreA "botnet" is a network of compromised computers (bots) that are controlled by an attacker (botmasters). Botnets are one of the most serious threats to today's Internet; they are the root cause of many current Internet attacks, such as email spam, distributed denial of service (DDoS) attacks, click fraud, etc. There have been many researches on how to detect, monitor, and defend against botnets that have appeared and their attack techniques. However, it is equally important for us to investigate possible attack techniques that could be used by the next generation botnets, and develop effective defense techniques accordingly in order to be well prepared for future botnet attacks. In this dissertation, we focus on two areas of the next generation botnet attacks and defenses: the peer-to-peer (P2P) structured botnets and the possible honeypot detection techniques used by future botnets. Currently, most botnets have centralized command and control (C&C) architecture. However, P2P structured botnets have gradually emerged as a new advanced form of botnets. Without C&C servers, P2P botnets are more resilient to defense countermeasures than traditional centralized botnets. Therefore, we first systematically study P2P botnets along multiple dimensions: bot candidate selection, network construction and C&C mechanisms and communication protocols. As a further illustration of P2P botnets, we then present the design of an advanced hybrid P2P botnet, which could be developed by botmasters in the near future. Compared with current botnets, the proposed botnet is harder to be shut down, monitored, and hijacked. It provides robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each bot, and easy monitoring and recovery by its botmaster. We suggest and analyze several possible defenses against this advanced botnet. Upon our understanding of P2P botnets, we turn our focus to P2P botnet countermeasures. We provide mathematical analysis of two P2P botnet mitigation approaches --- index poisoning defense and Sybil defense, and one monitoring technique - passive monitoring. We are able to give analytical results to evaluate their performance. And simulation-based experiments show that our analysis is accurate. Besides P2P botnets, we investigate honeypot-aware botnets as well. This is because honeypot techniques have been widely used in botnet defense systems, botmasters will have to find ways to detect honeypots in order to protect and secure their botnets. We point out a general honeypot-aware principle, that is security professionals deploying honeypots have liability constraint such that they cannot allow their honeypots to participate in real attacks that could cause damage to others, while attackers do not need to follow this constraint. Based on this principle, a hardware- and software- independent honeypot detection methodology is proposed. We present possible honeypot detection techniques that can be used in both centralized botnets and P2P botnets. Our experiments show that current standard honeypot and honeynet programs are vulnerable to the proposed honeypot detection techniques. In the meantime, we discuss some guidelines for defending against general honeypot-aware botnet attacks.
Show less
-
Date Issued
-
2010
-
Identifier
-
CFE0003443, ucf:48428
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003443
-
-
Title
-
IDENTIFYING UNDERGRADUATE STUDENT'S MOTIVATION TO ATTEND TUTORING FOR GENERAL CHEMISTRY COURSES.
-
Creator
-
Hyacinthe, Alexis C, Saitta, Erin, University of Central Florida
-
Abstract / Description
-
General Chemistry II is a common chemistry course that is required for professional school such as, medical, dental, optometry schooling. Considering that it historically has a high drop, fail, withdrawal rate, it is surprising that less than 10% of students in chemistry II attend tutoring at the Student Academic Resource Center (SARC). In this tutoring center, sessions are led by students who have excelled previously in that specific course. The objective of this research is to investigate...
Show moreGeneral Chemistry II is a common chemistry course that is required for professional school such as, medical, dental, optometry schooling. Considering that it historically has a high drop, fail, withdrawal rate, it is surprising that less than 10% of students in chemistry II attend tutoring at the Student Academic Resource Center (SARC). In this tutoring center, sessions are led by students who have excelled previously in that specific course. The objective of this research is to investigate the relationship between student motivation and attendance in SARC peer tutoring sessions for chemistry II. More precisely, to better understand the connection between those who have a motivation of getting a good grade and learning the material and those who attend tutoring. In order to gain insight on a student's motivation to attend sessions in SARC, a survey was distributed to those taking the class currently. Two modes were used including paper survey and online. Findings from this investigation will lead to suggestions to increase SARC chemistry tutoring attendance which could positively impact the success of STEM students on UCF's campus.
Show less
-
Date Issued
-
2018
-
Identifier
-
CFH2000330, ucf:45862
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH2000330
-
-
Title
-
The Relationship Between Social Phobia, Peer Attachment, and Identity Within Different Cultural Contexts.
-
Creator
-
Li, Shengnan, Berman, Steven, Fouty, Homer, Compson, Jane, University of Central Florida
-
Abstract / Description
-
This study investigated the relationship between social phobia, peer attachment, and identity development, within three different countries: China, India, and the USA. It was hypothesized that social phobia interferes with peer attachment, and that poor peer attachment interferes with identity development among late adolescents and emerging adults, thus peer attachment mediates the relationship between social phobia and identity. It was further hypothesized that this relationship between...
Show moreThis study investigated the relationship between social phobia, peer attachment, and identity development, within three different countries: China, India, and the USA. It was hypothesized that social phobia interferes with peer attachment, and that poor peer attachment interferes with identity development among late adolescents and emerging adults, thus peer attachment mediates the relationship between social phobia and identity. It was further hypothesized that this relationship between variables is moderated by culture such that in collectivistic cultures, where identity is more dependent upon group affiliation and identification, the interference of social phobia (through peer attachment) on identity would be much greater than in individualistic cultures where identity may be based more on unique characteristics. Participants were 422 undergraduate students from three locations: China (n = 180), India (n = 96), and the USA (n = 146). Results varied by country. For the combined sample collectivism, social phobia, and peer attachment each independently predicted identity. Collectivism also negatively predicted social phobia and positively predicted peer attachment. None of the variables served as a mediator or moderator between the other variables. In the USA sample, collectivism predicted identity but was mediated by peer attachment. Social phobia negatively predicted peer attachment and identity, but was not related to collectivism. In the Chinese sample, peer attachment predicted identity, but was mediated by social phobia. Collectivism predicted identity, but was not related to the other two variables. Among the Indian sample none of the variables predicted identity. A number of possible reasons for these complex results are explored.
Show less
-
Date Issued
-
2012
-
Identifier
-
CFE0004399, ucf:49389
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004399
-
-
Title
-
(")Why You Gotta Be So Mean?(") Examining The Impact Of Underlying Social Factors On Traditional And Cyberbullying Offending.
-
Creator
-
Strohacker, Emily, Huff-Corzine, Lin, Corzine, Harold, Hinojosa, Melanie, Bachmann, Michael, University of Central Florida
-
Abstract / Description
-
Instances of traditional school yard bullying among adolescents have been examined by researchers for decades. More recently, cyberbullying has been introduced among adolescents and has begun to be seen as a counterpart to traditional offending behaviors. Scholars have examined the rates of these types of offending, as well as the negative outcomes that result from victimization. However, studies examining the underlying factors that lead to these types of offending, specifically a comparison...
Show moreInstances of traditional school yard bullying among adolescents have been examined by researchers for decades. More recently, cyberbullying has been introduced among adolescents and has begun to be seen as a counterpart to traditional offending behaviors. Scholars have examined the rates of these types of offending, as well as the negative outcomes that result from victimization. However, studies examining the underlying factors that lead to these types of offending, specifically a comparison and combination of the two, are few and far between. This research examines how factors of strain, association with deviant peers, alcohol and/or drug use, and time spent with friends may influence an adolescent's likelihood to engage in any or all offending behaviors. Data are from the Health Behavior in School-Aged Children for which a national sample of 12,642 adolescents aged 10 to 17 years, in grades 5 through 10 were surveyed during the 2009-2010 school year, to assess behaviors that have been linked to health-risks among adolescents. Results indicate that specific factors of strain, drug and/or alcohol use, deviant peers, and time spent with peers significantly impact cyberbullying offending, traditional bullying offending, and both types of offending combined, among adolescents. The findings show that further action should be taken to reduce rates of all types of bullying among adolescents in schools and homes.
Show less
-
Date Issued
-
2017
-
Identifier
-
CFE0006666, ucf:51237
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006666
-
-
Title
-
Measuring the evolving Internet ecosystem with exchange points.
-
Creator
-
Ahmad, Mohammad Zubair, Guha, Ratan, Bassiouni, Mostafa, Chatterjee, Mainak, Jha, Sumit, Goldiez, Brian, University of Central Florida
-
Abstract / Description
-
The Internet ecosystem comprising of thousands of Autonomous Systems (ASes) now include Internet eXchange Points (IXPs) as another critical component in the infrastructure. Peering plays a significant part in driving the economic growth of ASes and is contributing to a variety of structural changes in the Internet. IXPs are a primary component of this peering ecosystem and are playing an increasing role not only in the topology evolution of the Internet but also inter-domain path routing. In...
Show moreThe Internet ecosystem comprising of thousands of Autonomous Systems (ASes) now include Internet eXchange Points (IXPs) as another critical component in the infrastructure. Peering plays a significant part in driving the economic growth of ASes and is contributing to a variety of structural changes in the Internet. IXPs are a primary component of this peering ecosystem and are playing an increasing role not only in the topology evolution of the Internet but also inter-domain path routing. In this dissertation we study and analyze the overall affects of peering and IXP infrastructure on the Internet. We observe IXP peering is enabling a quicker flattening of the Internet topology and leading to over-utilization of popular inter-AS links. Indiscriminate peering at these locations is leading to higher end-to-end path latencies for ASes peering at an exchange point, an effect magnified at the most popular worldwide IXPs. We first study the effects of recently discovered IXP links on the inter-AS routes using graph based approaches and find that it points towards the changing and flattening landscape in the evolution of the Internet's topology. We then study more IXP effects by using measurements to investigate the networks benefits of peering. We propose and implement a measurement framework which identifies default paths through IXPs and compares them with alternate paths isolating the IXP hop. Our system is running and recording default and alternate path latencies and made publicly available. We model the probability of an alternate path performing better than a default path through an IXP by identifying the underlying factors influencing the end-to end path latency. Our first-of-its-kind modeling study, which uses a combination of statistical and machine learning approaches, shows that path latencies depend on the popularity of the particular IXP, the size of the provider ASes of the networks peering at common locations and the relative position of the IXP hop along the path. An in-depth comparison of end-to-end path latencies reveal a significant percentage of alternate paths outperforming the default route through an IXP. This characteristic of higher path latencies is magnified in the popular continental exchanges as measured by us in a case study looking at the largest regional IXPs. We continue by studying another effect of peering which has numerous applications in overlay routing, Triangle Inequality Violations (TIVs). These TIVs in the Internet delay space are created due to peering and we compare their essential characteristics with overlay paths such as detour routes. They are identified and analyzed from existing measurement datasets but on a scale not carried out earlier. This implementation exhibits the effectiveness of GPUs in analyzing big data sets while the TIVs studied show that the a set of common inter-AS links create these TIVs. This result provides a new insight about the development of TIVs by analyzing a very large data set using GPGPUs.Overall our work presents numerous insights into the inner workings of the Internet's peering ecosystem. Our measurements show the effects of exchange points on the evolving Internet and exhibits their importance to Internet routing.
Show less
-
Date Issued
-
2013
-
Identifier
-
CFE0004802, ucf:49744
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004802
-
-
Title
-
A Study of the Impact of Brevard Public School's Peer Coaching Model on Student Achievement Outcomes and Teacher Evaluation Results.
-
Creator
-
Pace, Debra, Murray, Barbara, Murray, Kenneth, Taylor, Rosemarye, Thedy, Elizabeth, University of Central Florida
-
Abstract / Description
-
This study investigated the effectiveness of a sustained professional development initiative, Brevard's Peer Coaching Model, on improving teacher performance and student achievement in a large Central Florida school district. The study analyzed professional practices scores and value-added scores for teachers who participated in a minimum of six of nine days of professional learning before the study, after year one of the training, and after year two of the training to evaluate growth in...
Show moreThis study investigated the effectiveness of a sustained professional development initiative, Brevard's Peer Coaching Model, on improving teacher performance and student achievement in a large Central Florida school district. The study analyzed professional practices scores and value-added scores for teachers who participated in a minimum of six of nine days of professional learning before the study, after year one of the training, and after year two of the training to evaluate growth in professional practices and student achievement, and also compared the scores of BPCM participants to the scores of teachers who did not participate in the study. The findings of the study replicated those of previous researchers who found that peer coaching generally has a positive impact on improving teacher practice but limited impact on student achievement. Both professional practices scores and value-added results improved over the course of the study, during and after implementation of BPCM. However, the results were not statistically significant when comparing improvements of value-added results for BPCM participants with the VAM scores of the population of Brevard Public Schools teachers who did not participate in the professional development. BPCM participants showed significant growth over the course of the study and demonstrated stronger improvements in observation scores when compared to the non-BPCM teachers. The most significant growth occurred after the first year of the BPCM training, with smaller levels of growth in year two. Implications for practice and recommendations for future research were provided.
Show less
-
Date Issued
-
2015
-
Identifier
-
CFE0005678, ucf:50159
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005678
-
-
Title
-
SARP NET: A SECURE, ANONYMOUS, REPUTATION-BASED, PEER-TO-PEER NETWORK.
-
Creator
-
Mondesire, Sean, Lee, Joohan, University of Central Florida
-
Abstract / Description
-
Since the advent of Napster, the idea of peer-to-peer (P2P) architectures being applied to file-sharing applications has become popular, spawning other P2P networks like Gnutella, Morpheus, Kazaa, and BitTorrent. This growth in P2P development has nearly eradicated the idea of the traditional client-server structure in the file-sharing model, now placing emphasizes on faster query processing, deeper levels of decentralism, and methods to protect against copyright law violation. SARP Net is a...
Show moreSince the advent of Napster, the idea of peer-to-peer (P2P) architectures being applied to file-sharing applications has become popular, spawning other P2P networks like Gnutella, Morpheus, Kazaa, and BitTorrent. This growth in P2P development has nearly eradicated the idea of the traditional client-server structure in the file-sharing model, now placing emphasizes on faster query processing, deeper levels of decentralism, and methods to protect against copyright law violation. SARP Net is a secure, anonymous, decentralized, P2P overlay network that is designed to protect the activity of its users in its own file-sharing community. It is secure in the fact that public-key encryption is used to guard eavesdroppers during messages. The protocol guarantees user anonymity by incorporating message hopping from node to node to prevent any network observer from pinpointing the origin of any file query or shared-file source. To further enhance the system's security, a reputation scheme is incorporated to police nodes from malicious activity, maintain the overlay's topology, and enforce rules to protect node identity.
Show less
-
Date Issued
-
2006
-
Identifier
-
CFE0001264, ucf:46900
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001264
-
-
Title
-
SEARCH AND DELIVERY TECHNIQUES IN PEER-TO-PEER NETWORKS.
-
Creator
-
Do, Tai, Hua, Kien, University of Central Florida
-
Abstract / Description
-
The presence of millions of interconnected personal computing devices has given rise to a new class of decentralized networking applications, which are loosely labeled as peer-to-peer (P2P) applications. These P2P applications leverage resources such as processing cycles, storage, content, and network bandwidth available to the user devices, which are also known as peers. A number of current systems - SETI@home, Napster, BitTorrent, and Pastry - are examples of these emerging P2P systems. To...
Show moreThe presence of millions of interconnected personal computing devices has given rise to a new class of decentralized networking applications, which are loosely labeled as peer-to-peer (P2P) applications. These P2P applications leverage resources such as processing cycles, storage, content, and network bandwidth available to the user devices, which are also known as peers. A number of current systems - SETI@home, Napster, BitTorrent, and Pastry - are examples of these emerging P2P systems. To fully realize the potential of the peer-to-peer technology, there is a need to define and provide a set of core competencies, serving as the basic services upon which various peer-to-peer applications can be built on. Among these core competencies, this dissertation focuses on two fundamental services, which are search and delivery. In the first part of the dissertation, delivery techniques to support video-on-demand services in wireline and wireless P2P networks are investigated. Video services are considered due to two reasons. First, video services are the pivotal basis for many other multimedia applications. Second, it is challenging to provide on-demand video services due to asynchronous playback progresses at peers. The proposed techniques enable efficient video sharing between peers with asynchronous playback progresses, and maximize peer bandwidth utilization. In the second part of the dissertation, the problem of supporting continuous moving range queries in wireless mobile peer-to-peer networks is studied. Continuous moving range queries have a number of applications when a moving object wants to monitor its surrounding environment for a period of time. When a fixed network infrastructure is not available, wireless mobile peer-to-peer networks become a viable option to support the continuous query system. The proposed distributed solution ensures the accuracy of the query results under realistic assumptions, and incurs much less overhead than alternative solutions.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002753, ucf:48111
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002753
-
-
Title
-
STUDENT DIGITAL PIRACY IN THE FLORIDA STATE UNIVERSITY SYSTEM:AN EXPLORATORY STUDY ON ITS INFRASTRUCTURAL EFFECTS.
-
Creator
-
Reiss, Jeffrey, Cintron, Rosa, University of Central Florida
-
Abstract / Description
-
Digital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institutionÃÂ's resources combined with the typical college studentÃÂ's lack of funds makes it more lucrative. Students use a number of methods to justify their actions ranging from previewing media to bringing justice...
Show moreDigital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institutionÃÂ's resources combined with the typical college studentÃÂ's lack of funds makes it more lucrative. Students use a number of methods to justify their actions ranging from previewing media to bringing justice to a corrupt company. While trying to understand the mindset of pirates is one route to deal with piracy, corporations attempted to alleviate the situation using added software encoding. These messages are not always effective, and in some cases caused further damage to consumer morale. Furthermore, students such as Joel Tenenbaum, who continued to pirate music despite warnings from his parents and the recording industry, exemplify the type of person that is unfazed by legal threats, leading to a question of ethics. Students may not feel that downloading is stealing despite numerous warnings from the Digital Millennium Copyright Act and other major media organizations. The predominant solution used by universities involves monitoring the studentsÃÂ' network connection to detect Peer-to-Peer (P2P) connections or other connections that involve the transferring of copyrighted goods. Unfortunately, the current tools contain flaws that a crafty student may easily circumvent, undermining any attempts a universityÃÂ's IT department may use to deter piracy. This study explored the nature of piracy prevention tools used by IT departments in the Florida State University System in order to determine their relative effectiveness. The study also looked into the opinions of the Information Security Officer in terms of alternative piracy prevention techniques that do not involve legal action and monitoring. It was found that most institutions do not use a formal piece of software that monitors for infringing data. They also stated that while their current techniques can do its required task, it was not perfected to a point where it could run autonomously. Furthermore, institutions agreed that students lack proper ethics and concern over the matter of copyright, but were not fully convinced that other preventions methods would be effective. The study ultimately considered monitoring techniques a short-term solution and that more research should be put into finding long-term solutions. It also implied that IT departments should be better funded in order to keep up with the technological gap.
Show less
-
Date Issued
-
2010
-
Identifier
-
CFE0003131, ucf:48645
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003131
-
-
Title
-
Peering Into The Future: Three Essays on the Nascent Phenomenon of Collaborative Consumption.
-
Creator
-
Dellegrazie-Perren, Rebeca, Massiah, Carolyn, He, Xin, Tafaghodijami, Ata, Grauerholz, Liz, University of Central Florida
-
Abstract / Description
-
The primary objective of this dissertation is to examine the theoretical and practical implications of the collaborative consumption phenomenon for individuals, businesses and society. To accomplish this goal, a research approach at three levels of analysis is used to explore how market institutions and consumer practices negotiate a social order that combines the social domain of peers with the economic domain of market exchange. The first essay of the dissertation approaches this objective...
Show moreThe primary objective of this dissertation is to examine the theoretical and practical implications of the collaborative consumption phenomenon for individuals, businesses and society. To accomplish this goal, a research approach at three levels of analysis is used to explore how market institutions and consumer practices negotiate a social order that combines the social domain of peers with the economic domain of market exchange. The first essay of the dissertation approaches this objective from a macro level to examine how social order is produced and sustained through the systemic interactions of service firms and peers. This essay provides a framework to understand the emergent business models by developing a typological theory that explains how platforms can be configured for higher value creation. The second essay approaches our understanding of the phenomenon from a meso level analysis to examine how peers interact with the social order of collaborative consumption markets to negotiate key existential tensions between consumer resistance and market appropriation. This essay explores the metaphors that peers use to construe the field of collaborative consumption. Through the interpretive analysis of participant-generated images, this research uncovers the prevailing use of a liberation metaphor that reveals a new way of thinking about resource circulation. Lastly, the third essay employs a micro level of analysis to examine how participation in collaborative consumption practices provokes intrapersonal dynamics leading to moral decay. By relying on a social cognitive framework that considers how behaviors impact personal and environmental factors in a recursive fashion, this essay scrutinizes when and how prolonged participation can erode moral identity and negatively impact prosocial behaviors. Together, this holistic approach advances our theoretical understanding of the collaborative consumption phenomenon and provides practical implications for managerial practice and public policy.
Show less
-
Date Issued
-
2015
-
Identifier
-
CFE0005783, ucf:50055
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005783
-
-
Title
-
THE IMPACT OF FORMAL CLASSWIDE PEER SUPPORT TRAINING ON THE OCCURRENCE OF INITIATED AND RECIPROCAL PEER INTERACTIONS OF STUDENTS WITH SIGNIFICANT DISABILITIES IN INCLUSIVE PHYSICAL EDUCATION CLASSES.
-
Creator
-
Reardon, Richard, Wienke, Wilfred, University of Central Florida
-
Abstract / Description
-
This research study examined the effects of classwide peer support training on the occurrence of initiated and reciprocal peer interactions of students with significant disabilities in two inclusive physical education classes. An AB research design was used to document changes in the occurrence of initiated and reciprocal peer interactions of students with significant disabilities following the provision of peer support training to all of their classmates. Four students with significant...
Show moreThis research study examined the effects of classwide peer support training on the occurrence of initiated and reciprocal peer interactions of students with significant disabilities in two inclusive physical education classes. An AB research design was used to document changes in the occurrence of initiated and reciprocal peer interactions of students with significant disabilities following the provision of peer support training to all of their classmates. Four students with significant disabilities were observed in the study and baseline and post-intervention data on the occurrence of peer interactions were collected. The peer support training was provided to classes where four students with significant disabilities were included (two students in each classroom). Thirty-seven peers in the physical education classes were taught to (a) identify expectations within a single activity designed for the entire class in which a student with significant disabilities could also participate, (b) utilize the concept of partial participation to meaningfully include a student with significant disabilities in physical education classroom activities, (c) address priority educational goals from a student's Individual Education Plan during group activities, (d) use positive feedback and reinforcement to encourage participation, (e) program and use augmentative communication devices for meaningful participation in activities occurring in a physical education classroom, and (f) employ strategies to facilitate the development of peer relations and encourage interactions in ways that provide alternatives to an overreliance on paraprofessionals. After the peer support training was provided to the students in both physical education classes, follow-up observations were conducted to determine the impact of that peer support training on the occurrence and type of peer interactions of students with significant disabilities in inclusive physical education classes. Increases in the occurrence of interactions, as well as increases in both initiated and reciprocal peer interactions were documented as additional opportunities for students with significant disabilities to interact with their classmates were created. With the total number of peer interactions increasing following the training for each of the four boys, the success of the strategies employed could lead to increased levels of acceptance and access to other areas of the general education environment alongside their peers without disabilities.
Show less
-
Date Issued
-
2008
-
Identifier
-
CFE0002277, ucf:47847
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002277
-
-
Title
-
Understanding the Dynamics of Peer Review and Its Impact on Revision.
-
Creator
-
Kopp, Julie, Roozen, Kevin, Rounsaville, Angela, Hall, Mark, University of Central Florida
-
Abstract / Description
-
Research in writing studies has focused on what happens as students, and often their teachers, talk about student writing. This line of inquiry has identified several strategies for productive peer interactions, including spontaneous talk (Danis; Dipardo and Freedman; Johnson, The New Frontier; Bruffee; Lam), a flexible environment (Dipardo (&) Freedman; Johnson, (")Friendly Persuasion(")), positive rapport (Rish; Thompson; Wolfe), feedback and support (Barron; Covill; Flynn; Grimm; Lam;...
Show moreResearch in writing studies has focused on what happens as students, and often their teachers, talk about student writing. This line of inquiry has identified several strategies for productive peer interactions, including spontaneous talk (Danis; Dipardo and Freedman; Johnson, The New Frontier; Bruffee; Lam), a flexible environment (Dipardo (&) Freedman; Johnson, (")Friendly Persuasion(")), positive rapport (Rish; Thompson; Wolfe), feedback and support (Barron; Covill; Flynn; Grimm; Lam; Yucel, Bird, Young, and Blanksby; Zhu), and reflection (Yucel, Bird, Young, and Blanksby). However, research invested in understanding the extent to which such interactions result in better revisions or make students better writers has been slower to emerge. To address this gap in the existing scholarship, this thesis involved case studies of two first-year undergraduates as they navigated multiple peer review interactions throughout one semester of ENC 1101. Data collection for this inquiry included observations of three peer review sessions, retrospective interviews with each participant, and participants' end of semester e-portfolios. Using conversation analysis as a lens (Black; Ford and Thompson; Kerschbaum), this project explores the extent to which peer interactions inform students' revision of their writing. The analysis of the data suggests that the amount of interruptions and control during peer interactions influences the amount of comments a student takes up in the revision process. The results of conversation analysis identify a power structure within peer interactions that are developed and constantly changing. Those power structures also show the relationship between social interaction and revision. Teachers can use this study to motivate students to use the comments given during peer review toward revising their papers. Also, with the development of more diverse case studies, researchers would be able to identify if these phenomena show up more consistently.
Show less
-
Date Issued
-
2017
-
Identifier
-
CFE0006613, ucf:51284
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006613
-
-
Title
-
A Hybrid Simulation Framework of Consumer-to-Consumer Ecommerce Space.
-
Creator
-
Joledo, Oloruntomi, Rabelo, Luis, Lee, Gene, Elshennawy, Ahmad, Ajayi, Richard, University of Central Florida
-
Abstract / Description
-
In the past decade, ecommerce transformed the business models of many organizations. Information Technology leveled the playing field for new participants, who were capable of causing disruptive changes in every industry. (")Web 2.0(") or (")Social Web(") further redefined ways users enlist for services. It is now easy to be influenced to make choices of services based on recommendations of friends and popularity amongst peers. This research proposes a simulation framework to investigate how...
Show moreIn the past decade, ecommerce transformed the business models of many organizations. Information Technology leveled the playing field for new participants, who were capable of causing disruptive changes in every industry. (")Web 2.0(") or (")Social Web(") further redefined ways users enlist for services. It is now easy to be influenced to make choices of services based on recommendations of friends and popularity amongst peers. This research proposes a simulation framework to investigate how actions of stakeholders at this level of complexity affect system performance as well as the dynamics that exist between different models using concepts from the fields of operations engineering, engineering management, and multi-model simulation. Viewing this complex model from a systems perspective calls for the integration of different levels of behaviors. Complex interactions exist among stakeholders, the environment and available technology. The presence of continuous and discrete behaviors coupled with stochastic and deterministic behaviors present challenges for using standalone simulation tools to simulate the business model.We propose a framework that takes into account dynamic system complexity and risk from a hybrid paradigm. The SCOR model is employed to map the business processes and it is implemented using agent based simulation and system dynamics. By combining system dynamics at the strategy level with agent based models of consumer behaviors, an accurate yet efficient representation of the business model that makes for sound basis of decision making can be achieved to maximize stakeholders' utility.
Show less
-
Date Issued
-
2016
-
Identifier
-
CFE0006122, ucf:51171
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006122
-
-
Title
-
THE EFFECT OF PEER ADVISORS ON ESL STUDENTS' PERSPECTIVES OF UNIVERSITY ACADEMIC TASKS.
-
Creator
-
Fishkin, Monica, Allen, Kay W., University of Central Florida
-
Abstract / Description
-
A review of the related literature revealed that international students face specific academic challenges. The goal of this research was to investigate the effect of international student peer advising sessions on English as a Second Language (ESL) international students' perceptions of their language skills and strategies for dealing with academic tasks. The research design included a control and an experimental group with a pretest and a posttest administration of the Strategy Inventory for...
Show moreA review of the related literature revealed that international students face specific academic challenges. The goal of this research was to investigate the effect of international student peer advising sessions on English as a Second Language (ESL) international students' perceptions of their language skills and strategies for dealing with academic tasks. The research design included a control and an experimental group with a pretest and a posttest administration of the Strategy Inventory for Language Learning (SILL) and the Xu International Student Academic Language Needs Assessment (ISALNA-2) instruments. Qualitative data was also collected. The participants in the study were upper-intermediate level international students in an intensive English program at a large metropolitan university. Scores (n = 23) on the SILL and the ISALNA-2 were used to investigate the changing perspectives of students receiving similar information from different sources, classroom teachers and peer advisors or only classroom teachers. Peer advising sessions were provided to the experimental group of students. The focus of the sessions was advice and direction in language skills (reading, writing, listening, and speaking) for university academic tasks. A split-plot analysis of variance was employed to analyze the quantitative data obtained from pre- and posttest administrations of the instruments. Analysis of the data did not reveal a statistically significant effect of the peer advising sessions as regards the improvement of scores on the SILL and ISALNA-2. Qualitative data (n = 29) indicated that the experimental participants were positively impacted in understanding the necessary language skills necessary for academic success. Interviews with the peer advisors revealed that they had enhanced their understanding of university expectations and had developed a higher level of confidence as a result of their participation in the advising sessions. Qualitative data revealed positive attitudes by the peer advisors in giving language skills information and by the ESL international students involved in receiving that information. The study format could contribute to future studies and may have implications for the development of international peer advising for English language instruction, foreign student orientation programs, host family programs, and programs linking foreign students with American student study partners.
Show less
-
Date Issued
-
2004
-
Identifier
-
CFE0000027, ucf:46093
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0000027
-
-
Title
-
Determinants of Satisfaction and EWOM in Collaborative Consumption and the Sharing Economy: Timeshare Stays Versus Peer-to-Peer Accommodations.
-
Creator
-
Redditt, Jennifer, Fyall, Alan, Gregory, Amy, Ro, Heejung, Orlowski, Marissa, Altinay, Levent, University of Central Florida
-
Abstract / Description
-
Considered a disrupter in the lodging industry, sharing economy accommodations have become an emergent field in hospitality literature. While this literature predominantly addresses peer-to-peer accommodations such as Airbnb, it has not considered timeshares, one of the sharing economy pioneers. However, consumer behavior literature has integrated timeshares into the sharing economy due to the shared resource of accommodations between consumers. This study examined the determinants of...
Show moreConsidered a disrupter in the lodging industry, sharing economy accommodations have become an emergent field in hospitality literature. While this literature predominantly addresses peer-to-peer accommodations such as Airbnb, it has not considered timeshares, one of the sharing economy pioneers. However, consumer behavior literature has integrated timeshares into the sharing economy due to the shared resource of accommodations between consumers. This study examined the determinants of Satisfaction (Amenities, Community Belonging, Economic Benefits, Trust, and Vacation Counselor/Host) for consumers of two different types of sharing economy lodging products, timeshares and peer-to-peer accommodations, and their electronic word-of-mouth (eWOM) behavior. Considered a critical travel information source, eWOM has been attributed to affecting purchase decisions in hospitality literature. Current research has revealed a gap in peer-to-peer accommodation studies related to eWOM. This study extended eWOM research by exploring the role of Satisfaction as a mediator between the determinants and eWOM. In addition, accommodation type (timeshare vs. peer-to-peer accommodation) was investigated as a moderator to the relationship between the determinants and Satisfaction, and to the relationship between Satisfaction and eWOM. The study employed the two-step approach of confirmatory factor analysis (CFA) and structural equation modelling (SEM). The results indicated that Amenities, Community Belonging, Economic Benefits, Trust, and Vacation Counselor/Host had a positive impact on sharing economy lodging Satisfaction. Amenities, Economic Benefits, and Trust demonstrated an indirect effect on eWOM behavior through sharing economy lodging satisfaction. The model also revealed that Community Belonging had a direct effect on eWOM. Multiple group SEM revealed that accommodation type moderated the effect of Community Belonging's impact on sharing economy lodging Satisfaction, as well as the effect of sharing economy lodging Satisfaction on eWOM behavior. Satisfaction did not mediate any relationships for peer-to-peer accommodations. This study extends eWOM literature and provides competitive advantage insights between two sharing economy accommodation types.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007854, ucf:52785
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007854
-
-
Title
-
SUPPLEMENTAL INSTRUCTION IN A COMMUNITY COLLEGE DEVELOPMENTAL MATHEMATICS CURRICULUM: A PHENOMENOLOGICAL STUDY OF LEARNING EXPERIENCES.
-
Creator
-
Phelps, Julie, Evans, Ruby, University of Central Florida
-
Abstract / Description
-
Mirroring the changing demographics of the nation, the community college student population continues to grow in size and in diversity. Almost half of all students who enter these institutions need at least one remedial course, which is often developmental mathematics. Developed in 1973, Supplemental Instruction (SI) has quickly gained recognition as an academic support program that is used to aid student performance, retention, and academic success. This dissertation used a phenomenological...
Show moreMirroring the changing demographics of the nation, the community college student population continues to grow in size and in diversity. Almost half of all students who enter these institutions need at least one remedial course, which is often developmental mathematics. Developed in 1973, Supplemental Instruction (SI) has quickly gained recognition as an academic support program that is used to aid student performance, retention, and academic success. This dissertation used a phenomenological approach to identify factors that motivated students' attendance and subsequent learning experiences in SI sessions associated with developmental mathematics. Sources of data included five rounds of interviews (three with SI learners and two with SI leaders), a Multiple Intelligence Inventory, and statistical information from the referent community college. Study findings revealed eight themes that characterized motivating factors for attending these optional instructional sessions. Moreover, nine themes emerged from the data regarding types of activities learners experienced in SI. Findings suggest that SI helps create a climate of achievement for learners taking developmental mathematics in a community college setting.
Show less
-
Date Issued
-
2005
-
Identifier
-
CFE0000661, ucf:46512
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0000661
-
-
Title
-
Rethinking Routing and Peering in the era of Vertical Integration of Network Functions.
-
Creator
-
Dey, Prasun, Yuksel, Murat, Wang, Jun, Ewetz, Rickard, Zhang, Wei, Hasan, Samiul, University of Central Florida
-
Abstract / Description
-
Content providers typically control the digital content consumption services and are getting the most revenue by implementing an (")all-you-can-eat(") model via subscription or hyper-targeted advertisements. Revamping the existing Internet architecture and design, a vertical integration where a content provider and access ISP will act as unibody in a sugarcane form seems to be the recent trend. As this vertical integration trend is emerging in the ISP market, it is questionable if existing...
Show moreContent providers typically control the digital content consumption services and are getting the most revenue by implementing an (")all-you-can-eat(") model via subscription or hyper-targeted advertisements. Revamping the existing Internet architecture and design, a vertical integration where a content provider and access ISP will act as unibody in a sugarcane form seems to be the recent trend. As this vertical integration trend is emerging in the ISP market, it is questionable if existing routing architecture will suffice in terms of sustainable economics, peering, and scalability. It is expected that the current routing will need careful modifications and smart innovations to ensure effective and reliable end-to-end packet delivery. This involves new feature developments for handling traffic with reduced latency to tackle routing scalability issues in a more secure way and to offer new services at cheaper costs. Considering the fact that prices of DRAM or TCAM in legacy routers are not necessarily decreasing at the desired pace, cloud computing can be a great solution to manage the increasing computation and memory complexity of routing functions in a centralized manner with optimized expenses. Focusing on the attributes associated with existing routing cost models and by exploring a hybrid approach to SDN, we also compare recent trends in cloud pricing (for both storage and service) to evaluate whether it would be economically beneficial to integrate cloud services with legacy routing for improved cost-efficiency. In terms of peering, using the US as a case study, we show the overlaps between access ISPs and content providers to explore the viability of a future in terms of peering between the new emerging content-dominated sugarcane ISPs and the healthiness of Internet economics. To this end, we introduce meta-peering, a term that encompasses automation efforts related to peering (-) from identifying a list of ISPs likely to peer, to injecting control-plane rules, to continuous monitoring and notifying any violation (-) one of the many outcroppings of vertical integration procedure which could be offered to the ISPs as a standalone service.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007797, ucf:52351
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007797
-
-
Title
-
THE SCHOOL RESOURCE OFFICER IN PUBLIC SCHOOLS: PERCEIVED DETERRENT EFFECT ON CAMPUS CRIME.
-
Creator
-
Rhinehart, David, Watkins, R. Cory, University of Central Florida
-
Abstract / Description
-
The purpose of this study was to examine student perceptions of the deterrent effect of School Resource Officers on crimes that may occur on school campuses and the factors that may influence those perceptions. The first school resource officer (SRO) program was implemented in 1953 and gained popularity in the 1990s. This study (conducted in 2008) reveals that the majority of students perceive that school resource officers are a deterrent to specific crimes and the overall crime rate on...
Show moreThe purpose of this study was to examine student perceptions of the deterrent effect of School Resource Officers on crimes that may occur on school campuses and the factors that may influence those perceptions. The first school resource officer (SRO) program was implemented in 1953 and gained popularity in the 1990s. This study (conducted in 2008) reveals that the majority of students perceive that school resource officers are a deterrent to specific crimes and the overall crime rate on school campuses. The results of the survey indicated that the crimes of rape (74.1%), homicide (73.7%), aggravated assault or threat with a weapon (70.5%), sexual assault (67.0%), robbery (64.9%), and weapon possession (68.4%) had the highest percentage of students who responded agree (strongly agree or agree) that the school resource officer was a perceived deterrent to those crimes on the school campus. The incident with the lowest perceived deterrent effect was truancy with 48.9% of the students responding with strongly agree or agree. Based on a multivariate analysis, this study found that the factors that influenced the students' perceptions of the School Resource Officer as a deterrent to crime were students' age, class standing, school attended, exposure to a SRO, friends' crime history, and family crime history. The students' race, past crimes, income level, and gender were not statistically significant for any of the dependent variables. The examination of the ordinal logistic regression showed the percentage of variance the model explained was low. Based on this research with the limitations presented, the SRO is perceived as a deterrent to crime on school campuses. The deterrent effect was not stronger in any one demographic group. Peer pressure was one factor that was an influence in the majority of studied crimes.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0003765, ucf:48718
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003765
-
-
Title
-
Social Skills and Social Acceptance in Childhood Anxiety Disorders.
-
Creator
-
Scharfstein, Lindsay, Beidel, Deborah, Rapport, Mark, Sims, Valerie, University of Central Florida
-
Abstract / Description
-
The present study examined the social skills and social acceptance of children with SAD (n=20), children with GAD (n=18), and typically developing (TD) children (n=20). A multimodal assessment paradigm was employed to address three study objectives: (a) to determine whether social skills deficits are unique to children with SAD or extend to children with GAD, (b) to assess whether skills vary as a function of social context (in vivo peer interaction Wii Task versus hypothetical Social...
Show moreThe present study examined the social skills and social acceptance of children with SAD (n=20), children with GAD (n=18), and typically developing (TD) children (n=20). A multimodal assessment paradigm was employed to address three study objectives: (a) to determine whether social skills deficits are unique to children with SAD or extend to children with GAD, (b) to assess whether skills vary as a function of social context (in vivo peer interaction Wii Task versus hypothetical Social Vignette Task) and (c) to examine the relationship between anxiety diagnosis and social acceptance. Parent questionnaire data indicated that both youth with SAD and GAD experienced difficulties with assertiveness, whereas children with SAD experienced a broader range of social skills difficulties. Blinded observers' ratings during the behavioral assessment social tasks indicated that compared to children with GAD and TD children, children with SAD have deficits in social behaviors and social knowledge across settings, including speech latency, a paucity of speech, few spontaneous comments, questions and exclamations, and ineffective social responses. In addition, vocal analysis revealed that children with SAD were characterized by anxious speech patterns. By comparison, children with GAD exhibited non-anxious speech patterns and did not differ significantly from TD youth on social behaviors, with the exception of fewer spontaneous comments and questions. Lastly, children with SAD were perceived as less likeable and less socially desirable by their peers than both children with GAD and TD children. Clinical implications of these findings are discussed.
Show less
-
Date Issued
-
2013
-
Identifier
-
CFE0004932, ucf:49631
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004932
Pages