Documents

Filters:

Coverage [desc](x)
Classification [asc](x)
Page [49](x)
Results per Page:
Date Added+-Title+-Organization+-Min Coverage+-Max Coverage+-CreatorFiles+-Options
6 Sep 18The Effect of Articulated (tech prep) Credit on College Outcomes at a Stand-alone Technical CollegeIdaho State University Education Educational LeadershipUnknownUnknownLeslie A. Jernberg1View
14 Sep 15The Effects of Scenario-Based E-Learning Tutorials as Preparation for the Flipped Classroom: Lessons From a Beginning Nursing CourseIdaho State University Education Educational LeadershipUnknownUnknownGaylen Jensen1View
14 Sep 15Transformational Leadership Characteristics of Distance Education Directors at Intermountain West UniversitiesIdaho State University Education Educational LeadershipUnknownUnknownRyan Faulkner1View
24 Feb 23Women Community College Student Leaders: A Phenomenological Study of Leadership Identity DevelopmentIdaho State University Education Educational LeadershipUnknownUnknownSherry N. Simkins1View
9 Feb 18A Technology-based Service-learning Project to Connect Community-School Relationships in a Vocational College CourseIdaho State University Education Educational LeadershipUnknownUnknownWei-Lun W. Li1View
13 May 21Closing the Gap? How Grit Impacts Hispanic Students’ RetentionIdaho State University Education Educational LeadershipUnknownUnknownSandro G. Benitez1View
15 Feb 19EMPLOYEE WORK ENGAGEMENT: TO WHAT EXTENT DOES SELF-DETERMINATION THEORY (SDT) PROVIDE A THEORETICAL EXPLANATION OF EMPLOYEE LEVELS OF WORK ENGAGEMENT IN IDAHO HIGHER EDUCATIONIdaho State University EducationUnknownUnknownDan Woerner1View
6 Jul 18The Effects of Using the Social Elements of Competition and Cooperation in a Transformational Play-based Educational Video GameIdaho State University EducationUnknownUnknownLuke Erickson1View
5 Mar 15A Phishing Layered Defense Framework: A Holistic Approach to the Phishing ProblemIdaho State University Business BusinessUnknownUnknownCade Kamachi1View
5 Mar 15Fox 2014Idaho State University Business BusinessUnknownUnknownAlbert Fox, Jr.1View
24 Mar 15What Women Want (and Don't Want) in the Cybersecurity Profession: An Examination of Why the Industry Lacks Women and How to Inspire Gender Diversity in the WorkplaceIdaho State University Business BusinessUnknownUnknownPrincess Young1View
24 Mar 15Establishing a Criteria for Collegiate Cyber Defense Competition Injects: A Qualitative AnalysisIdaho State University Business BusinessUnknownUnknownRyan Beckstead1View
10 Mar 15Visualizing Information Systems Risk Model Usage Among Professionals: An Analysis of Alternatives to ALEIdaho State University Business BusinessUnknownUnknownJeremy Brown1View
6 Mar 15An Evaluation of Motivational Factors for Information Security Policy Buy-inIdaho State University Business BusinessUnknownUnknownEliot Long1View
24 Mar 15Covert Transmission Malware SystemIdaho State University Business BusinessUnknownUnknownMarshall Smith1View
10 Mar 15Conceptual Metaphor Theory and Its Applications to "A Midsummer Night's Dream"Idaho State University Arts & Letters TheatreUnknownUnknownJesse Arnold1View
14 Jun 16A Stage Adaptation of J.R.R. Tolkien's "The Hobbit": or, "There and Back Again"Idaho State University Arts & Letters TheatreUnknownUnknownLizarose Hansen1View
6 Sep 18Creating a Mission and Entrepreneurial Projects for Theatre ArtistsIdaho State University Arts & Letters TheatreUnknownUnknownKelsey R. Palmer1View
21 Sep 17Costumes Of Subversion: A Study Of Mardi Gras and the Cajun IdentityIdaho State University Arts & Letters TheatreUnknownUnknownColin Wintz1View
26 May 23The Color of Rain: Technical Direction of The Burial at Thebes: A Version of Sophocles’ AntigoneIdaho State University Arts & Letters TheatreUnknownUnknownElizabeth M. Christensen1View
2008 - 2016 Informatics Research Institute (IRI)
Version 0.6.1.5 | beta | 6 April 2016

Other Projects

//