檢索結果 - Kennesaw State University
-
1
Representations of Nature in Andean Textiles
出版 2013-12-01“...Kennesaw State University...”Andean textile tradition is rich with symbolism demonstrating the close ties of Quechua speaking people of Peru with nature. The observations of several researchers and textile production centers bear witness to the fascinating world of Andean cosmology as it is expressed in traditional cloth. This...
獲取全文
Article -
2
Carefree, Connected, and Driving: A Study of Social-Structural Factors Contributing to Texting while Driving among Teenagers
出版 2017-08-01“...Kennesaw State University...”Introduction: As mobile phones become increasingly integrated into every aspect of public social life, structural contradictions between the norms of mobile use and norms within public social environments become increasingly apparent. Driving is a social environment in which these contradictions are...
獲取全文
Article -
3
Language Contact between Korean and English in Online Communication
出版 2011-06-01“...Kennesaw State University...”Over the past decade, the use of the Internet has become an indispensable part of life in the new millennium. One of the most popular activities in the era of the Internet is online communication. Net-Lingo, which is a product of online communication, is a new language variety that differs from both...
獲取全文
Article -
4
Examining Aggravated Assault on College Campuses: A Differential Association Approach
出版 2015-03-01“...Kennesaw State University...”Despite its status as the most common violent crime committed on college campuses, very little is known about factors that cause students to participate in aggravated assault. In this paper, we offer a theoretical proposal that utilizes Edwin Sutherland’s differential association theory to better an...
獲取全文
Article -
5
A Design Case: Assessing the Functional Needs for a Multi-faceted Cybersecurity Learning Space
出版 2019-06-01“...Kennesaw State University...”Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequen...
獲取全文
Article -
6
A Mixed-Method Study Exploring Cyber Ranges and Educator Motivation
出版 2023-10-01“...Kennesaw State University...”A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applicatio...
獲取全文
Article -
7
The “Childfree” Movement: How Individuals Negotiate Identities on Reddit
出版 2024-02-01“...Kennesaw State University...”“Childfree” is a chosen identity, reflecting an individual or couple’s decision to not procreate or parent. This paper explores how individuals who identify as childfree exhibit a high degree of agency while navigating external cultural expectations and social sanctions. We use the online discussion...
獲取全文
Article -
8
Ink Painting of Orchids among the Literati in the Qing and Choson Dynasties
出版 2011-06-01“...Kennesaw State University...”Genres of cultural products have flowed in and out between China and Korea for thousands of years. It is well known that among these genres, the orchid was one of the most elegant subjects in ink painting. Although research has shown which types and how many works have been exchanged between the two...
獲取全文
Article -
9
Global Learning and the Engaging Questions of Globalization
出版 2010-08-01“...Kennesaw State University...”While universities can act as important mediators amidst the highly disruptive and contentious change processes of globalization, very few institutions are intentionally fulfilling such a mission. Moreover, there are significant ethnocentric and ideological barriers to overcome before intercultural...
獲取全文
Article -
10
Turnstile File Transfer: A Unidirectional System for Medium-Security Isolated Clusters
出版 2023-12-01“...Kennesaw State University...”Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity techn...
獲取全文
Article -
11
A Street Child's Revolt Against Her Mother and Society: Lessons from Amma Darko's Faceless
出版 2013-01-01“...Kennesaw State University...”The writings of Amma Darko rank among Africa’s great literature. In Faceless, Amma Darko uses conflicts that bedevil mother-daughter bonds to address larger issues such as streetism, patriarchy, government indifference, irresponsible parenting, and inefficiency in the police service. Faceless may ap...
獲取全文
Article -
12
Comparing Cognitive Theories of Learning Transfer to Advance Cybersecurity Instruction, Assessment, and Testing
出版 2024-04-01“...Kennesaw State University...”The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These...
獲取全文
Article -
13
Gendering Peacebuilding in Post-conflict Northern Uganda
出版 2016-03-01“...Kennesaw State University...”Approximately 1.8 million northern Ugandans were internally displaced during conflict between the Ugandan government and Lord’s Resistance Army (LRA) rebels (1987-2006). The ethnographic and qualitative research findings presented in this article illuminate the need to address structural violence, n...
獲取全文
Article -
14
Leading K-12 Community Responsiveness to Cyber Threats via Education of School Community
出版 2023-10-01“...Kennesaw State University...”Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explai...
獲取全文
Article -
15
Patterns of Interstate Migration in the Mid-2000s: Are Racial Groups Moving in Different Directions?
出版 2013-01-01“...Kennesaw State University...”This research examines interstate in-movement, out-movement, and resulting patterns of net internal migration of Blacks, Asians, Hispanics, and non-Hispanic Whites in the United States, using data from the 2005-2007 American Community Survey. One goal is to learn how similar or dissimilar members of...
獲取全文
Article -
16
MalAware Defensive: A Game to Train Users to Combat Malware
出版 2020-06-01“...Kennesaw State University...”Several research findings indicate that basic cyber hygiene can potentially deter the majority of cyber threats. One of the ways cybersecurity professionals can prepare users to ensure proper hygiene is to help them develop their ability to spot the difference between normal and abnormal behavior in...
獲取全文
Article -
17
Gophish: Implementing a Real-World Phishing Exercise to Teach Social Engineering
出版 2021-01-01“...Kennesaw State University...”Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through c...
獲取全文
Article -
18
Sustainability Practices of Multinational Enterprises in Developing Countries: A Comparative Analysis of Coca-Cola Company and PepsiCo Inc.
出版 2017-04-01“...Kennesaw State University...”Recent scholarly discussions on corporate social responsibility have focused extensively on sustainability. Corporate strategies and practices are sustainable if they create long-term value in the economic, social, cultural, and physical environments within which corporations operate. Despite the gr...
獲取全文
Article -
19
Predictors of Bystander Intervention: Examining the Heteronormative Bias in Bystander Intervention Research
出版 2024-02-01“...Kennesaw State University...”Although numerous studies have explored the factors that impact bystander intervention in sexual assault situations, findings have been inconsistent and all prior studies have depicted sexual violence as an exclusively female and heterosexual issue. This study explores the many individual-level and...
獲取全文
Article -
20
Integrating certifications into the cybersecurity college curriculum: The efficacy of education with certifications to increase the cybersecurity workforce
出版 2023-10-01“...Kennesaw State University...”One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational...
獲取全文
Article