Documents

Filters:

Coverage [desc](x)
Classification [desc](x)
Page [21](x)
Results per Page:
Date Added+-Title+-Organization+-Min Coverage+-Max Coverage+-CreatorFiles+-Options
24 Mar 15The Slam Community: Training Grounds of Oral PoetryIdaho State University Arts & Letters TheatreUnknownUnknownSam Hansen1View
6 Sep 18Creating a Mission and Entrepreneurial Projects for Theatre ArtistsIdaho State University Arts & Letters TheatreUnknownUnknownKelsey R. Palmer1View
13 Jul 15A Wilde Moment: An Exploration of Moment Work in the Technical Process of "Gross Indecency: The Tree Trials of Oscar Wilde"Idaho State University Arts & Letters TheatreUnknownUnknownShaun Nichols1View
10 Mar 15Conceptual Metaphor Theory and Its Applications to "A Midsummer Night's Dream"Idaho State University Arts & Letters TheatreUnknownUnknownJesse Arnold1View
17 Dec 19Reappropriating Shakespeare’s ‘Mad’ Women:Creating Positive Representations of Mentally Ill Women Through Solo PerformanceIdaho State University Arts & Letters TheatreUnknownUnknownJessica D. Sager1View
5 Mar 15A Phishing Layered Defense Framework: A Holistic Approach to the Phishing ProblemIdaho State University Business BusinessUnknownUnknownCade Kamachi1View
24 Mar 15Covert Transmission Malware SystemIdaho State University Business BusinessUnknownUnknownMarshall Smith1View
24 Mar 15Establishing a Criteria for Collegiate Cyber Defense Competition Injects: A Qualitative AnalysisIdaho State University Business BusinessUnknownUnknownRyan Beckstead1View
24 Mar 15What Women Want (and Don't Want) in the Cybersecurity Profession: An Examination of Why the Industry Lacks Women and How to Inspire Gender Diversity in the WorkplaceIdaho State University Business BusinessUnknownUnknownPrincess Young1View
5 Mar 15Fox 2014Idaho State University Business BusinessUnknownUnknownAlbert Fox, Jr.1View
10 Mar 15Visualizing Information Systems Risk Model Usage Among Professionals: An Analysis of Alternatives to ALEIdaho State University Business BusinessUnknownUnknownJeremy Brown1View
6 Mar 15An Evaluation of Motivational Factors for Information Security Policy Buy-inIdaho State University Business BusinessUnknownUnknownEliot Long1View
15 Feb 19EMPLOYEE WORK ENGAGEMENT: TO WHAT EXTENT DOES SELF-DETERMINATION THEORY (SDT) PROVIDE A THEORETICAL EXPLANATION OF EMPLOYEE LEVELS OF WORK ENGAGEMENT IN IDAHO HIGHER EDUCATIONIdaho State University EducationUnknownUnknownDan Woerner1View
6 Jul 18The Effects of Using the Social Elements of Competition and Cooperation in a Transformational Play-based Educational Video GameIdaho State University EducationUnknownUnknownLuke Erickson1View
25 Jun 25Dual Credit Students: College Bound or Not? A Qualitative AnalysisIdaho State University Education Educational LeadershipUnknownUnknownPolly D. Hulsey1View
3 Mar 15Slack 2014Idaho State University Education Educational LeadershipUnknownUnknownAmy Slack1View
25 Jun 25Mind the Gap: How Institutions Demonstrate NWCCU Standard 1.D.2-4 in Public Research UniversitiesIdaho State University Education Educational LeadershipUnknownUnknownSara Mahuron1View
11 Oct 21Effects of Student Response System in University Foundation CoursesIdaho State University Education Educational LeadershipUnknownUnknownGrace M. Tutle1View
9 Mar 15International Research Collaboration in Higher EducationIdaho State University Education Educational LeadershipUnknownUnknownJacqueline Throngard1View
2 Aug 23An Analysis of Transferrable Skills, Skills Gaps, and their Impact on Former K-12 Classroom Teachers who Transition into an Instructional Design and Technology CareerIdaho State University Education Educational LeadershipUnknownUnknownAmy Eno1View
2008 - 2016 Informatics Research Institute (IRI)
Version 0.6.1.5 | beta | 6 April 2016

Other Projects

//