Documents

Filters:

Coverage [desc](x)
Classification [asc](x)
Dateadded [asc,desc,desc,desc,desc,desc,desc,desc,desc,desc,asc,desc,asc,asc,asc,asc,desc,asc,asc](x)
Page [17](x)
Results per Page:
Date Added+-Title+-Organization+-Min Coverage+-Max Coverage+-CreatorFiles+-Options
21 Sep 17Costumes Of Subversion: A Study Of Mardi Gras and the Cajun IdentityIdaho State University Arts & Letters TheatreUnknownUnknownColin Wintz1View
26 May 23The Color of Rain: Technical Direction of The Burial at Thebes: A Version of Sophocles’ AntigoneIdaho State University Arts & Letters TheatreUnknownUnknownElizabeth M. Christensen1View
6 Sep 18Creating a Mission and Entrepreneurial Projects for Theatre ArtistsIdaho State University Arts & Letters TheatreUnknownUnknownKelsey R. Palmer1View
6 Jul 18The Unmasked Artisan: Techniques to Economically Build Theatrical Masks For the StageIdaho State University Arts & Letters TheatreUnknownUnknownDanielle Feige1View
13 Jul 15The Value of Community Theatre: Hidden Costs of Play ProductionIdaho State University Arts & Letters TheatreUnknownUnknownGabrielle Kane1View
24 Mar 15The Slam Community: Training Grounds of Oral PoetryIdaho State University Arts & Letters TheatreUnknownUnknownSam Hansen1View
8 Jun 21Developing The Voice WithinIdaho State University Arts & Letters TheatreUnknownUnknownRichard Aufdermauer1View
17 Dec 19Reappropriating Shakespeare’s ‘Mad’ Women:Creating Positive Representations of Mentally Ill Women Through Solo PerformanceIdaho State University Arts & Letters TheatreUnknownUnknownJessica D. Sager1View
10 Mar 15Conceptual Metaphor Theory and Its Applications to "A Midsummer Night's Dream"Idaho State University Arts & Letters TheatreUnknownUnknownJesse Arnold1View
5 Mar 15A Phishing Layered Defense Framework: A Holistic Approach to the Phishing ProblemIdaho State University Business BusinessUnknownUnknownCade Kamachi1View
24 Mar 15What Women Want (and Don't Want) in the Cybersecurity Profession: An Examination of Why the Industry Lacks Women and How to Inspire Gender Diversity in the WorkplaceIdaho State University Business BusinessUnknownUnknownPrincess Young1View
24 Mar 15Covert Transmission Malware SystemIdaho State University Business BusinessUnknownUnknownMarshall Smith1View
5 Mar 15Fox 2014Idaho State University Business BusinessUnknownUnknownAlbert Fox, Jr.1View
6 Mar 15An Evaluation of Motivational Factors for Information Security Policy Buy-inIdaho State University Business BusinessUnknownUnknownEliot Long1View
10 Mar 15Visualizing Information Systems Risk Model Usage Among Professionals: An Analysis of Alternatives to ALEIdaho State University Business BusinessUnknownUnknownJeremy Brown1View
24 Mar 15Establishing a Criteria for Collegiate Cyber Defense Competition Injects: A Qualitative AnalysisIdaho State University Business BusinessUnknownUnknownRyan Beckstead1View
6 Jul 18The Effects of Using the Social Elements of Competition and Cooperation in a Transformational Play-based Educational Video GameIdaho State University EducationUnknownUnknownLuke Erickson1View
15 Feb 19EMPLOYEE WORK ENGAGEMENT: TO WHAT EXTENT DOES SELF-DETERMINATION THEORY (SDT) PROVIDE A THEORETICAL EXPLANATION OF EMPLOYEE LEVELS OF WORK ENGAGEMENT IN IDAHO HIGHER EDUCATIONIdaho State University EducationUnknownUnknownDan Woerner1View
13 May 21Closing the Gap? How Grit Impacts Hispanic Students’ RetentionIdaho State University Education Educational LeadershipUnknownUnknownSandro G. Benitez1View
13 Sep 16Identifying Talents in Primary Reading Teachers in Rural East Idaho SchoolsIdaho State University Education Educational LeadershipUnknownUnknownDavid Marotz1View
2008 - 2016 Informatics Research Institute (IRI)
Version 0.6.1.5 | beta | 6 April 2016

Other Projects

//