Documents

Filters:

Classification [asc](x)
Count [20](x)
DateAdded [desc](x)
Page [52](x)
Results per Page:
Date Added+-Title+-Organization+-Min Coverage+-Max Coverage+-CreatorFiles+-Options
15 Feb 19EMPLOYEE WORK ENGAGEMENT: TO WHAT EXTENT DOES SELF-DETERMINATION THEORY (SDT) PROVIDE A THEORETICAL EXPLANATION OF EMPLOYEE LEVELS OF WORK ENGAGEMENT IN IDAHO HIGHER EDUCATIONIdaho State University EducationUnknownUnknownDan Woerner1View
2 Feb 18NAVIGATING BY TIME, TOPIC, OR TOOL: LOST IN THE LEARNING MANAGEMENT SYSTEM?Idaho State University Education Educational LeadershipUnknownUnknownLisa C. Kidder1View
2 Feb 18TURN ON COMPLETION TRACKING: THE EFFECTS OF A PERSONAL PROGRESS-MONITORING TOOL ON ACADEMIC ACHIEVEMENT AND PERSISTENCE IN AN ONLINE LEARNING ENVIRONMENTIdaho State University Education Educational LeadershipUnknownUnknownEmma Wood1View
4 Feb 16Using an Appreciative Inquiry Approach to Enhance Student Motivation and Achievement in Higher Education CoursesIdaho State University Education Educational LeadershipUnknownUnknownBetty McQuain1View
2 Feb 18GRANT PROPOSAL PREPARATION BY HIGHER EDUCATION FACULTYIdaho State University Education Educational LeadershipUnknownUnknownKristin M. Shuman1View
11 Oct 21Effects of Student Response System in University Foundation CoursesIdaho State University Education Educational LeadershipUnknownUnknownGrace M. Tutle1View
10 Jul 15Exploring the Effectiveness of an E-Learning Module for Graduate Level Occupational Therapy StudentsIdaho State University Education Educational LeadershipUnknownUnknownBryan Gee1View
6 Mar 15An Evaluation of Motivational Factors for Information Security Policy Buy-inIdaho State University Business BusinessUnknownUnknownEliot Long1View
24 Mar 15What Women Want (and Don't Want) in the Cybersecurity Profession: An Examination of Why the Industry Lacks Women and How to Inspire Gender Diversity in the WorkplaceIdaho State University Business BusinessUnknownUnknownPrincess Young1View
14 Jun 16A Stage Adaptation of J.R.R. Tolkien's "The Hobbit": or, "There and Back Again"Idaho State University Arts & Letters TheatreUnknownUnknownLizarose Hansen1View
5 Mar 15A Phishing Layered Defense Framework: A Holistic Approach to the Phishing ProblemIdaho State University Business BusinessUnknownUnknownCade Kamachi1View
5 Mar 15Fox 2014Idaho State University Business BusinessUnknownUnknownAlbert Fox, Jr.1View
10 Mar 15Visualizing Information Systems Risk Model Usage Among Professionals: An Analysis of Alternatives to ALEIdaho State University Business BusinessUnknownUnknownJeremy Brown1View
6 Jul 18The Effects of Using the Social Elements of Competition and Cooperation in a Transformational Play-based Educational Video GameIdaho State University EducationUnknownUnknownLuke Erickson1View
24 Mar 15Covert Transmission Malware SystemIdaho State University Business BusinessUnknownUnknownMarshall Smith1View
24 Mar 15Establishing a Criteria for Collegiate Cyber Defense Competition Injects: A Qualitative AnalysisIdaho State University Business BusinessUnknownUnknownRyan Beckstead1View
8 Feb 18DEGREE OF UNDERSTANDING: HOW STUDENT BORROWERS IN MONTANA UNDERSTAND STUDENT LOANSIdaho State University Education Educational LeadershipUnknownUnknownTeresa S. Borrenpohl1View
11 Oct 21Multimedia Learning: Effect of Personalization and Segmentation on Recall, Transfer, and MotivationIdaho State University Education Educational LeadershipUnknownUnknownJanna Verburg-Hamlett1View
13 Jul 15A Structured Approach in the Development of an Online Assistive Technology Professional Development TrainingIdaho State University Education Educational LeadershipUnknownUnknownJanice Carson1View
28 Feb 24Instructional Designers’ Insights Regarding Factors that are Important Yet Lacking in Subject Matter ExpertsIdaho State University Education Educational LeadershipUnknownUnknownSusan Palmer1View
2008 - 2016 Informatics Research Institute (IRI)
Version 0.6.1.5 | beta | 6 April 2016

Other Projects

//