Student Research Symposium
Permanent URI for this collection
This online collection holds presentations showcasing student knowledge from the University of Hawai’i – West O’ahu in the art of research methodology, scientific reasoning, and giving skillful presentations.
The symposium's primary aim is to provide an opportunity for practice-based education through presentations on a variety of research topics, including: research methods, education, justice, and STEM-related fields. Ultimately, the goal of these symposiums is to increase the number of UH West O’ahu students with research presentation experience while demonstrating diversity in the field of research.
For more information, please contact Dr. Camonia Graham-Tutt.
Browse
Browsing Student Research Symposium by Title
Now showing 1 - 20 of 193
Results Per Page
Sort Options
Item A Deeper Look into Word Problems(University of Hawaiʻi — West Oʻahu, 2020-11) Remata, KarliWhen having to learn mathematics, word problems are considered by many to be the most difficult concept for students to practice and master. A variety of skills need to be used simultaneously and in succession to determine: (1) what the questions are asking, (2) create equations to match the scenarios, and (3) solve the problems. Stereotypical word problems originate from textbooks that revolve around unrelatable scenarios and complicated situations that students will find difficulty in understanding. These word problems are often presented to students in ways that associate with the classroom practices that neglect to allow students to connect with what they are trying to solve (Bonotto, 2007). Teachers find that common practices and use of basic methods in word problems can be more detrimental towards student mathematical learning and not allowing room for critical thinking or relatable comprehension (Karp, et al., 2019).Item A Navigation Theory of Intelligence For an Ethical, Data Governed Future(University of Hawaiʻi — West Oʻahu, 2022-11) King, HarvyForecasts for the future of our modern world have positioned data as the keystone of our advancing civilization for some time. This has slowly materialized as data governance structures have made their way into managing the decision making of parts of our economic, social, and criminal justice systems. As the validity of mass media has fractured public trust due to false information, can existing data governance structures inherently offer the general public security over our public and private information?Item A Student’s Attitude Correlates to Achievement(University of Hawaiʻi — West Oʻahu, 2020-11) Scott, TiffanyResearch shows a strong connection between a students attitude toward math and their personal achievement in math. In a study (Brassell, 1980) research shows those students who have a negative attitude towards math, lower self esteem or math anxiety also tend to have a lower level of success in math. The way a student perceives themselves plays a key role in their confidence and willingness to persevere through critical challenging stages of math competency. A student may give up before they even start if they feel they just are not “good” at math.Item A Student’s Attitude Correlates to Achievement(University of Hawaiʻi — West Oʻahu, 2020-11) Scott, TiffanyResearch shows a strong connection between a students attitude toward math and their personal achievement in math. In a study (Brassell, 1980) research shows those students who have a negative attitude towards math, lower self esteem or math anxiety also tend to have a lower level of success in math. The way a student perceives themselves plays a key role in their confidence and willingness to persevere through critical challenging stages of math competency. A student may give up before they even start if they feel they just are not “good” at math.Item Accessibility of Mental Health Services in Hawaii(University of Hawaiʻi — West Oʻahu, 2022-03) Au,TierneyThe purpose is to analyze the availability of mental health services in the state of Hawaii in order to determine if there is adequate access/resources for the population. So, this brings about my research question, is there adequate accessibility to mental health services? The research methods that I used to design this study was quantitative and correlational types of research. After conducting the surveys and interview and analyzing the data collected, I found out that the outcomes were as follows: A lack of accessibility to mental health services exist due to reasons such as expenses, major gaps in the professional field and unprecedented crisis.Item Adding Ethnomathematics to Elementary Mathematics(University of Hawai'i - West O'ahu, 2019-11-20) Rossetti, Hannah MaliaItem Adoption of Cloud services verses Risk(University of Hawaiʻi — West Oʻahu, 2020-11) Basir, NaazamTo effectively gauge the impact of said threats, the study will examine the data across various case studies that only pertain to factors that inhibit a company's ability to go through with adopting a service/deployment model. It is expected that such variables would make the adoption of cloud services a more difficult decision to make, but will not heavily affect the frequency of companies migrating to this technology because of how useful--or necessary it is; the purpose is to demonstrate the quantitative factors which formulate the decision.Item Alcohol and Drug Addiction(University of Hawaiʻi — West Oʻahu, 2022-03) Walcott, EricaDisproportionate number of Native Hawaiians contribute to the ongoing addiction problem in Hawaii. • People who suffer from historic trauma, which results in various social disadvantages are likely to suffer with addiction. •Purpose of this research is to bring awareness to the addiction problem present in Hawaii and why cultural healing is imperative in treating patients who suffer from both historical trauma and addiction.Item Allergies and Genetics(University of Hawaiʻi — West Oʻahu, 2020-04) Cullen-Utu, Rustean; Givens, Veronica; Le-Scott, Hanh; George, Olivia L.Item An Evaluation of the Cobalt Strike Framework for Red Team Engagements(University of Hawaiʻi — West Oʻahu, 2022-11) Hendricks, Christopher P.Following the increase in the sophistication and frequency of cyber-attacks in recent years, the demand for skilled cybersecurity experts has also continued to grow year-over-year. Despite an industry-wide awareness of the cybersecurity skills shortage, few organizations have developed long- term plans to address the persistent gap in hiring and retaining quali ed personnel. In a global survey conducted by the Information Systems Security Association (ISSA) last year, 489 cybersecurity professionals were asked what actions an organization could take to address the ongoing skills shortage. The biggest response (39%) received was an increase in cybersecurity training so that candidates can be properly trained for their roles (ISSA, 2021). More speci cally, the study indicates how cybersecurity professionals widely value hands-on experience and mentoring for skills development, with a majority stating this experience is even more important than the achievement of industry certi cations. When combined with technical training courses, Red Team adversary emulation and attack simulations can help bridge this gap by providing the hands-on experience that cybersecurity professionals necessitate. This is achieved by essentially teaching defenders how to respond to threats as they would appear in real life and how to react to di erent, unpredictable situations in a collective and collaborative way. Furthermore, Red Team engagements can help mitigate the risks to an enterprise by challenging the assumptions made by defenders and identifying areas for improving an organization’s operational defense. The purpose of this study was to investigate how Cyber Red Teams use adversary emulation frameworks – focusing primarily on post exploitation, lateral movement, and maintaining persistence – to challenge the detection and response capabilities of an organization. In particular, we will evaluate the e cacy of the popular Cobalt Strike framework in simulating the threats posed by Advanced Persistent Threat (APT) actors in a secure training environment and how it can be used to promote a proactive approach to enterprise network security.Item Analysis of Free Antivirus Software Compared to Windows Defender on Windows Computers(University of Hawaiʻi — West Oʻahu, 2020-11) de Anda, ChristianThe purpose of this project is to compare the security characteristics of various free consumer antivirus products. The goal for this project was to conclude which antivirus is currently the most secure and functional while also comparing additional and unique features based on a score from 1-10 depending on the results of the test and functionality.Item Art Integration in Math Instruction(University of Hawaiʻi — West Oʻahu, 2021-11) Guzman, Tatiana; Kamiya, HaleyArt usually refers to the visual arts - things that can be viewed, drawn, painted, or sculpted. It not only involves tangible products but music, dance, poetry, drama, and abstract concepts too (Dissanayake, 2015). Art and math do not receive an equal amount of classroom instruction time. Math is always evolving, and it is important that educators provide instruction that allows students to apply their learning to real-world situations (Lott, 2002). Students may not connect with math lessons because they don’t see how the learning could apply to their lives; Art integration can be the solution to this issue.Item Basics of Python Coding(University of Hawaiʻi — West Oʻahu, 2020-11) Gamble, AutumnItem Basketball Conference Champions: Printing: Does it Help with the Madness?(University of Hawaii - West Oahu, 2018-11) Orphen, Ryan; Furuto, MichaelItem Beliefs in Mathematics(University of Hawaiʻi — West Oʻahu, 2021-11) Kitaoka, MicahWe all have beliefs! These beliefs affect the things we do and the way we feel. The same applies to math, the things we believe about math affect the way we approach the subject and our enjoyment (Stipek 2001). Teachers who adopt “traditional” beliefs generally do not have confidence in their math abilities and do not enjoy math as a subject (Stipek 2001).Item Biometrics: Evaluating the Performance of Biometric Authentication Methods(University of Hawaiʻi — West Oʻahu, 2021-11) Cabreros, IrvinWeak passwords and rudimentary authentication systems have been a top concern for both businesses and individual users for some time now. Last year, a data breach investigations report by Verizon claimed that over 0% of the total number of breaches leveraged stolen or weak passwords. As a result, companies have been investing on a multitude of ways to strengthen password security and improve the authentication process for both clients/ users and employees. One of these ways is biometric authentication. Currently, most of the general population’s experience with biometric authentication is done through mobile devices such as Apple’s FaceID and TouchID and Android fingerprint readers. They are often marketed as convenient and secure alternatives to common 4- or 6-digit user passcodes.Item Blood Typing(University of Hawaii - West Oahu, 2019-04) Galvan, Vanessa; Jimenez, Jace Ann; Miyazaki, Yumi; Ramil, Rochelle; Le-Scott, Hanh; Romaine, Rebecca; Romaine, Rebecca-
- 15 participants pricked their finger using a lancet, 3 drops of blood were placed on a blood test card, and an agglutination test kit with antiserums were mixed with the blood to determine blood type.
- 67% was blood type O.Based on the U.S. population, the class was above the national average for Asians.
- In conclusion, blood typing is a vital component in science, and is especially crucial in clinical settings. Getting the correct blood transfusion is a matter of life or death.