Результаты поиска - Kennesaw State University

  1. 1

    Representations of Nature in Andean Textiles по Catherine Joslyn

    Опубликовано 2013-12-01

    Andean textile tradition is rich with symbolism demonstrating the close ties of Quechua speaking people of Peru with nature. The observations of several researchers and textile production centers bear witness to the fascinating world of Andean cosmology as it is expressed in traditional cloth. This...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  2. 2

    Carefree, Connected, and Driving: A Study of Social-Structural Factors Contributing to Texting while Driving among Teenagers по Steven J. Seiler, Randall Kirby

    Опубликовано 2017-08-01

    Introduction: As mobile phones become increasingly integrated into every aspect of public social life, structural contradictions between the norms of mobile use and norms within public social environments become increasingly apparent. Driving is a social environment in which these contradictions are...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  3. 3

    Language Contact between Korean and English in Online Communication по Jiyoung L. Daniel

    Опубликовано 2011-06-01

    Over the past decade, the use of the Internet has become an indispensable part of life in the new millennium. One of the most popular activities in the era of the Internet is online communication. Net-Lingo, which is a product of online communication, is a new language variety that differs from both...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  4. 4

    Examining Aggravated Assault on College Campuses: A Differential Association Approach по Edlin Veras, Jason Davis Dr

    Опубликовано 2015-03-01

    Despite its status as the most common violent crime committed on college campuses, very little is known about factors that cause students to participate in aggravated assault. In this paper, we offer a theoretical proposal that utilizes Edwin Sutherland’s differential association theory to better an...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  5. 5

    A Design Case: Assessing the Functional Needs for a Multi-faceted Cybersecurity Learning Space по Charles J. Lesko Jr.

    Опубликовано 2019-06-01

    Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequen...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  6. 6

    A Mixed-Method Study Exploring Cyber Ranges and Educator Motivation по Cheryl Beauchamp, Holly M. Matusovich

    Опубликовано 2023-10-01

    A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applicatio...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  7. 7

    The “Childfree” Movement: How Individuals Negotiate Identities on Reddit по Elizabeth Rivera, Ellis S. Logan, Anne Price

    Опубликовано 2024-02-01

    “Childfree” is a chosen identity, reflecting an individual or couple’s decision to not procreate or parent. This paper explores how individuals who identify as childfree exhibit a high degree of agency while navigating external cultural expectations and social sanctions. We use the online discussion...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  8. 8

    Ink Painting of Orchids among the Literati in the Qing and Choson Dynasties по Herin Jung

    Опубликовано 2011-06-01

    Genres of cultural products have flowed in and out between China and Korea for thousands of years. It is well known that among these genres, the orchid was one of the most elegant subjects in ink painting. Although research has shown which types and how many works have been exchanged between the two...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  9. 9

    Global Learning and the Engaging Questions of Globalization по Daniel Paracka

    Опубликовано 2010-08-01

    While universities can act as important mediators amidst the highly disruptive and contentious change processes of globalization, very few institutions are intentionally fulfilling such a mission. Moreover, there are significant ethnocentric and ideological barriers to overcome before intercultural...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  10. 10

    Turnstile File Transfer: A Unidirectional System for Medium-Security Isolated Clusters по Mark Monnin, Lori L. Sussman

    Опубликовано 2023-12-01

    Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity techn...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  11. 11

    A Street Child's Revolt Against Her Mother and Society: Lessons from Amma Darko's Faceless по Philomena Yeboah Ama Okyeso

    Опубликовано 2013-01-01

    The writings of Amma Darko rank among Africa’s great literature. In Faceless, Amma Darko uses conflicts that bedevil mother-daughter bonds to address larger issues such as streetism, patriarchy, government indifference, irresponsible parenting, and inefficiency in the police service. Faceless may ap...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  12. 12

    Comparing Cognitive Theories of Learning Transfer to Advance Cybersecurity Instruction, Assessment, and Testing по Daniel T. Hickey Ph.D., Ronald J. Kantor

    Опубликовано 2024-04-01

    The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  13. 13

    Gendering Peacebuilding in Post-conflict Northern Uganda по Amanda J. Reinke

    Опубликовано 2016-03-01

    Approximately 1.8 million northern Ugandans were internally displaced during conflict between the Ugandan government and Lord’s Resistance Army (LRA) rebels (1987-2006). The ethnographic and qualitative research findings presented in this article illuminate the need to address structural violence, n...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  14. 14

    Leading K-12 Community Responsiveness to Cyber Threats via Education of School Community по Michele Kielty, A. Renee Staton

    Опубликовано 2023-10-01

    Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explai...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  15. 15

    Patterns of Interstate Migration in the Mid-2000s: Are Racial Groups Moving in Different Directions? по Charles Jaret, Jim Baird

    Опубликовано 2013-01-01

    This research examines interstate in-movement, out-movement, and resulting patterns of net internal migration of Blacks, Asians, Hispanics, and non-Hispanic Whites in the United States, using data from the 2005-2007 American Community Survey. One goal is to learn how similar or dissimilar members of...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  16. 16

    MalAware Defensive: A Game to Train Users to Combat Malware по Tyler Moon, Tamirat Abegaz, Bryson Payne, Abi Salimi

    Опубликовано 2020-06-01

    Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  17. 17

    Gophish: Implementing a Real-World Phishing Exercise to Teach Social Engineering по Andy Luse, Jim Burkman

    Опубликовано 2021-01-01

    Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through c...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  18. 18

    Sustainability Practices of Multinational Enterprises in Developing Countries: A Comparative Analysis of Coca-Cola Company and PepsiCo Inc. по Hope K. Torkornoo, Komla D. Dzigbede

    Опубликовано 2017-04-01

    Recent scholarly discussions on corporate social responsibility have focused extensively on sustainability. Corporate strategies and practices are sustainable if they create long-term value in the economic, social, cultural, and physical environments within which corporations operate. Despite the gr...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  19. 19

    Predictors of Bystander Intervention: Examining the Heteronormative Bias in Bystander Intervention Research по Mellisa Holtzman

    Опубликовано 2024-02-01

    Although numerous studies have explored the factors that impact bystander intervention in sexual assault situations, findings have been inconsistent and all prior studies have depicted sexual violence as an exclusively female and heterosexual issue. This study explores the many individual-level and...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья
  20. 20

    Integrating certifications into the cybersecurity college curriculum: The efficacy of education with certifications to increase the cybersecurity workforce по Binh Tran, Karen C. Benson, Lorraine Jonassen

    Опубликовано 2023-10-01

    One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational...

    Полное описание

    “...Kennesaw State University...”
    Полный текст
    Статья