Documents

Filters:

Coverage [asc](x)
Classification [asc](x)
Dateadded [asc,desc,desc,desc,desc,desc,desc,desc,desc,desc,asc,desc,asc,asc,asc,asc,desc,asc,asc](x)
Page [17](x)
Results per Page:
Date Added+-Title+-Organization+-Min Coverage+-Max Coverage+-CreatorFiles+-Options
13 Jul 15A Wilde Moment: An Exploration of Moment Work in the Technical Process of "Gross Indecency: The Tree Trials of Oscar Wilde"Idaho State University Arts & Letters TheatreUnknownUnknownShaun Nichols1View
24 Mar 15The Slam Community: Training Grounds of Oral PoetryIdaho State University Arts & Letters TheatreUnknownUnknownSam Hansen1View
6 Sep 18Creating a Mission and Entrepreneurial Projects for Theatre ArtistsIdaho State University Arts & Letters TheatreUnknownUnknownKelsey R. Palmer1View
21 Sep 17Costumes Of Subversion: A Study Of Mardi Gras and the Cajun IdentityIdaho State University Arts & Letters TheatreUnknownUnknownColin Wintz1View
17 Dec 19Reappropriating Shakespeare’s ‘Mad’ Women:Creating Positive Representations of Mentally Ill Women Through Solo PerformanceIdaho State University Arts & Letters TheatreUnknownUnknownJessica D. Sager1View
9 Jun 21A Study of CosplayIdaho State University Arts & Letters TheatreUnknownUnknownStephanie Lathrop1View
8 Jun 21Developing The Voice WithinIdaho State University Arts & Letters TheatreUnknownUnknownRichard Aufdermauer1View
13 Jul 15The Value of Community Theatre: Hidden Costs of Play ProductionIdaho State University Arts & Letters TheatreUnknownUnknownGabrielle Kane1View
6 Jul 18The Unmasked Artisan: Techniques to Economically Build Theatrical Masks For the StageIdaho State University Arts & Letters TheatreUnknownUnknownDanielle Feige1View
5 Mar 15A Phishing Layered Defense Framework: A Holistic Approach to the Phishing ProblemIdaho State University Business BusinessUnknownUnknownCade Kamachi1View
24 Mar 15What Women Want (and Don't Want) in the Cybersecurity Profession: An Examination of Why the Industry Lacks Women and How to Inspire Gender Diversity in the WorkplaceIdaho State University Business BusinessUnknownUnknownPrincess Young1View
24 Mar 15Establishing a Criteria for Collegiate Cyber Defense Competition Injects: A Qualitative AnalysisIdaho State University Business BusinessUnknownUnknownRyan Beckstead1View
5 Mar 15Fox 2014Idaho State University Business BusinessUnknownUnknownAlbert Fox, Jr.1View
10 Mar 15Visualizing Information Systems Risk Model Usage Among Professionals: An Analysis of Alternatives to ALEIdaho State University Business BusinessUnknownUnknownJeremy Brown1View
24 Mar 15Covert Transmission Malware SystemIdaho State University Business BusinessUnknownUnknownMarshall Smith1View
6 Mar 15An Evaluation of Motivational Factors for Information Security Policy Buy-inIdaho State University Business BusinessUnknownUnknownEliot Long1View
6 Jul 18The Effects of Using the Social Elements of Competition and Cooperation in a Transformational Play-based Educational Video GameIdaho State University EducationUnknownUnknownLuke Erickson1View
15 Feb 19EMPLOYEE WORK ENGAGEMENT: TO WHAT EXTENT DOES SELF-DETERMINATION THEORY (SDT) PROVIDE A THEORETICAL EXPLANATION OF EMPLOYEE LEVELS OF WORK ENGAGEMENT IN IDAHO HIGHER EDUCATIONIdaho State University EducationUnknownUnknownDan Woerner1View
12 Dec 22Academic Librarian Competencies for Online Library Instruction: A Competency-Based Needs AssessmentIdaho State University Education Educational LeadershipUnknownUnknownRebeca Peacock1View
4 Feb 16Using an Appreciative Inquiry Approach to Enhance Student Motivation and Achievement in Higher Education CoursesIdaho State University Education Educational LeadershipUnknownUnknownBetty McQuain1View
2008 - 2016 Informatics Research Institute (IRI)
Version 0.6.1.5 | beta | 6 April 2016

Other Projects

//