Ngā hua rapu - Kennesaw State University

Whakamahine hua
  1. 1

    Representations of Nature in Andean Textiles Catherine Joslyn

    I whakaputaina 2013-12-01

    Andean textile tradition is rich with symbolism demonstrating the close ties of Quechua speaking people of Peru with nature. The observations of several researchers and textile production centers bear witness to the fascinating world of Andean cosmology as it is expressed in traditional cloth. This...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  2. 2

    Carefree, Connected, and Driving: A Study of Social-Structural Factors Contributing to Texting while Driving among Teenagers Steven J. Seiler, Randall Kirby

    I whakaputaina 2017-08-01

    Introduction: As mobile phones become increasingly integrated into every aspect of public social life, structural contradictions between the norms of mobile use and norms within public social environments become increasingly apparent. Driving is a social environment in which these contradictions are...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  3. 3

    Language Contact between Korean and English in Online Communication Jiyoung L. Daniel

    I whakaputaina 2011-06-01

    Over the past decade, the use of the Internet has become an indispensable part of life in the new millennium. One of the most popular activities in the era of the Internet is online communication. Net-Lingo, which is a product of online communication, is a new language variety that differs from both...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  4. 4

    Examining Aggravated Assault on College Campuses: A Differential Association Approach Edlin Veras, Jason Davis Dr

    I whakaputaina 2015-03-01

    Despite its status as the most common violent crime committed on college campuses, very little is known about factors that cause students to participate in aggravated assault. In this paper, we offer a theoretical proposal that utilizes Edwin Sutherland’s differential association theory to better an...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  5. 5

    A Design Case: Assessing the Functional Needs for a Multi-faceted Cybersecurity Learning Space Charles J. Lesko Jr.

    I whakaputaina 2019-06-01

    Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequen...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  6. 6

    A Mixed-Method Study Exploring Cyber Ranges and Educator Motivation Cheryl Beauchamp, Holly M. Matusovich

    I whakaputaina 2023-10-01

    A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applicatio...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  7. 7

    The “Childfree” Movement: How Individuals Negotiate Identities on Reddit Elizabeth Rivera, Ellis S. Logan, Anne Price

    I whakaputaina 2024-02-01

    “Childfree” is a chosen identity, reflecting an individual or couple’s decision to not procreate or parent. This paper explores how individuals who identify as childfree exhibit a high degree of agency while navigating external cultural expectations and social sanctions. We use the online discussion...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  8. 8

    Ink Painting of Orchids among the Literati in the Qing and Choson Dynasties Herin Jung

    I whakaputaina 2011-06-01

    Genres of cultural products have flowed in and out between China and Korea for thousands of years. It is well known that among these genres, the orchid was one of the most elegant subjects in ink painting. Although research has shown which types and how many works have been exchanged between the two...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  9. 9

    Global Learning and the Engaging Questions of Globalization Daniel Paracka

    I whakaputaina 2010-08-01

    While universities can act as important mediators amidst the highly disruptive and contentious change processes of globalization, very few institutions are intentionally fulfilling such a mission. Moreover, there are significant ethnocentric and ideological barriers to overcome before intercultural...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  10. 10

    Turnstile File Transfer: A Unidirectional System for Medium-Security Isolated Clusters Mark Monnin, Lori L. Sussman

    I whakaputaina 2023-12-01

    Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity techn...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  11. 11

    A Street Child's Revolt Against Her Mother and Society: Lessons from Amma Darko's Faceless Philomena Yeboah Ama Okyeso

    I whakaputaina 2013-01-01

    The writings of Amma Darko rank among Africa’s great literature. In Faceless, Amma Darko uses conflicts that bedevil mother-daughter bonds to address larger issues such as streetism, patriarchy, government indifference, irresponsible parenting, and inefficiency in the police service. Faceless may ap...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  12. 12

    Comparing Cognitive Theories of Learning Transfer to Advance Cybersecurity Instruction, Assessment, and Testing Daniel T. Hickey Ph.D., Ronald J. Kantor

    I whakaputaina 2024-04-01

    The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  13. 13

    Gendering Peacebuilding in Post-conflict Northern Uganda Amanda J. Reinke

    I whakaputaina 2016-03-01

    Approximately 1.8 million northern Ugandans were internally displaced during conflict between the Ugandan government and Lord’s Resistance Army (LRA) rebels (1987-2006). The ethnographic and qualitative research findings presented in this article illuminate the need to address structural violence, n...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  14. 14

    Leading K-12 Community Responsiveness to Cyber Threats via Education of School Community Michele Kielty, A. Renee Staton

    I whakaputaina 2023-10-01

    Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explai...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  15. 15

    Patterns of Interstate Migration in the Mid-2000s: Are Racial Groups Moving in Different Directions? Charles Jaret, Jim Baird

    I whakaputaina 2013-01-01

    This research examines interstate in-movement, out-movement, and resulting patterns of net internal migration of Blacks, Asians, Hispanics, and non-Hispanic Whites in the United States, using data from the 2005-2007 American Community Survey. One goal is to learn how similar or dissimilar members of...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  16. 16

    MalAware Defensive: A Game to Train Users to Combat Malware Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi

    I whakaputaina 2020-06-01

    Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  17. 17

    Gophish: Implementing a Real-World Phishing Exercise to Teach Social Engineering Andy Luse, Jim Burkman

    I whakaputaina 2021-01-01

    Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through c...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  18. 18

    Sustainability Practices of Multinational Enterprises in Developing Countries: A Comparative Analysis of Coca-Cola Company and PepsiCo Inc. Hope K. Torkornoo, Komla D. Dzigbede

    I whakaputaina 2017-04-01

    Recent scholarly discussions on corporate social responsibility have focused extensively on sustainability. Corporate strategies and practices are sustainable if they create long-term value in the economic, social, cultural, and physical environments within which corporations operate. Despite the gr...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  19. 19

    Predictors of Bystander Intervention: Examining the Heteronormative Bias in Bystander Intervention Research Mellisa Holtzman

    I whakaputaina 2024-02-01

    Although numerous studies have explored the factors that impact bystander intervention in sexual assault situations, findings have been inconsistent and all prior studies have depicted sexual violence as an exclusively female and heterosexual issue. This study explores the many individual-level and...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga
  20. 20

    Integrating certifications into the cybersecurity college curriculum: The efficacy of education with certifications to increase the cybersecurity workforce Binh Tran, Karen C. Benson, Lorraine Jonassen

    I whakaputaina 2023-10-01

    One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational...

    Whakaahuatanga katoa

    “…Kennesaw State University…”
    Whiwhi kuputuhi katoa
    Tuhinga