Search Results - Kennesaw State University

Refine Results
  1. 1

    Representations of Nature in Andean Textiles by Catherine Joslyn

    Published 2013-12-01

    Andean textile tradition is rich with symbolism demonstrating the close ties of Quechua speaking people of Peru with nature. The observations of several researchers and textile production centers bear witness to the fascinating world of Andean cosmology as it is expressed in traditional cloth. This...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  2. 2

    Carefree, Connected, and Driving: A Study of Social-Structural Factors Contributing to Texting while Driving among Teenagers by Steven J. Seiler, Randall Kirby

    Published 2017-08-01

    Introduction: As mobile phones become increasingly integrated into every aspect of public social life, structural contradictions between the norms of mobile use and norms within public social environments become increasingly apparent. Driving is a social environment in which these contradictions are...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  3. 3

    Language Contact between Korean and English in Online Communication by Jiyoung L. Daniel

    Published 2011-06-01

    Over the past decade, the use of the Internet has become an indispensable part of life in the new millennium. One of the most popular activities in the era of the Internet is online communication. Net-Lingo, which is a product of online communication, is a new language variety that differs from both...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  4. 4

    Examining Aggravated Assault on College Campuses: A Differential Association Approach by Edlin Veras, Jason Davis Dr

    Published 2015-03-01

    Despite its status as the most common violent crime committed on college campuses, very little is known about factors that cause students to participate in aggravated assault. In this paper, we offer a theoretical proposal that utilizes Edwin Sutherland’s differential association theory to better an...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  5. 5

    A Design Case: Assessing the Functional Needs for a Multi-faceted Cybersecurity Learning Space by Charles J. Lesko Jr.

    Published 2019-06-01

    Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequen...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  6. 6

    A Mixed-Method Study Exploring Cyber Ranges and Educator Motivation by Cheryl Beauchamp, Holly M. Matusovich

    Published 2023-10-01

    A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applicatio...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  7. 7

    The “Childfree” Movement: How Individuals Negotiate Identities on Reddit by Elizabeth Rivera, Ellis S. Logan, Anne Price

    Published 2024-02-01

    “Childfree” is a chosen identity, reflecting an individual or couple’s decision to not procreate or parent. This paper explores how individuals who identify as childfree exhibit a high degree of agency while navigating external cultural expectations and social sanctions. We use the online discussion...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  8. 8

    Ink Painting of Orchids among the Literati in the Qing and Choson Dynasties by Herin Jung

    Published 2011-06-01

    Genres of cultural products have flowed in and out between China and Korea for thousands of years. It is well known that among these genres, the orchid was one of the most elegant subjects in ink painting. Although research has shown which types and how many works have been exchanged between the two...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  9. 9

    Global Learning and the Engaging Questions of Globalization by Daniel Paracka

    Published 2010-08-01

    While universities can act as important mediators amidst the highly disruptive and contentious change processes of globalization, very few institutions are intentionally fulfilling such a mission. Moreover, there are significant ethnocentric and ideological barriers to overcome before intercultural...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  10. 10

    Turnstile File Transfer: A Unidirectional System for Medium-Security Isolated Clusters by Mark Monnin, Lori L. Sussman

    Published 2023-12-01

    Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity techn...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  11. 11

    A Street Child's Revolt Against Her Mother and Society: Lessons from Amma Darko's Faceless by Philomena Yeboah Ama Okyeso

    Published 2013-01-01

    The writings of Amma Darko rank among Africa’s great literature. In Faceless, Amma Darko uses conflicts that bedevil mother-daughter bonds to address larger issues such as streetism, patriarchy, government indifference, irresponsible parenting, and inefficiency in the police service. Faceless may ap...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  12. 12

    Comparing Cognitive Theories of Learning Transfer to Advance Cybersecurity Instruction, Assessment, and Testing by Daniel T. Hickey Ph.D., Ronald J. Kantor

    Published 2024-04-01

    The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  13. 13

    Gendering Peacebuilding in Post-conflict Northern Uganda by Amanda J. Reinke

    Published 2016-03-01

    Approximately 1.8 million northern Ugandans were internally displaced during conflict between the Ugandan government and Lord’s Resistance Army (LRA) rebels (1987-2006). The ethnographic and qualitative research findings presented in this article illuminate the need to address structural violence, n...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  14. 14

    Leading K-12 Community Responsiveness to Cyber Threats via Education of School Community by Michele Kielty, A. Renee Staton

    Published 2023-10-01

    Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explai...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  15. 15

    Patterns of Interstate Migration in the Mid-2000s: Are Racial Groups Moving in Different Directions? by Charles Jaret, Jim Baird

    Published 2013-01-01

    This research examines interstate in-movement, out-movement, and resulting patterns of net internal migration of Blacks, Asians, Hispanics, and non-Hispanic Whites in the United States, using data from the 2005-2007 American Community Survey. One goal is to learn how similar or dissimilar members of...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  16. 16

    MalAware Defensive: A Game to Train Users to Combat Malware by Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi

    Published 2020-06-01

    Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  17. 17

    Gophish: Implementing a Real-World Phishing Exercise to Teach Social Engineering by Andy Luse, Jim Burkman

    Published 2021-01-01

    Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through c...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  18. 18

    Sustainability Practices of Multinational Enterprises in Developing Countries: A Comparative Analysis of Coca-Cola Company and PepsiCo Inc. by Hope K. Torkornoo, Komla D. Dzigbede

    Published 2017-04-01

    Recent scholarly discussions on corporate social responsibility have focused extensively on sustainability. Corporate strategies and practices are sustainable if they create long-term value in the economic, social, cultural, and physical environments within which corporations operate. Despite the gr...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  19. 19

    Predictors of Bystander Intervention: Examining the Heteronormative Bias in Bystander Intervention Research by Mellisa Holtzman

    Published 2024-02-01

    Although numerous studies have explored the factors that impact bystander intervention in sexual assault situations, findings have been inconsistent and all prior studies have depicted sexual violence as an exclusively female and heterosexual issue. This study explores the many individual-level and...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article
  20. 20

    Integrating certifications into the cybersecurity college curriculum: The efficacy of education with certifications to increase the cybersecurity workforce by Binh Tran, Karen C. Benson, Lorraine Jonassen

    Published 2023-10-01

    One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational...

    Full description

    “…Kennesaw State University…”
    Get full text
    Article