Documents

Filters:

Classification [asc](x)
Dateadded [asc,desc,desc,desc,desc,desc,desc,desc,desc,desc,asc,desc,asc,asc,asc,asc,desc,asc,asc](x)
Page [17](x)
Results per Page:
Date Added+-Title+-Organization+-Min Coverage+-Max Coverage+-CreatorFiles+-Options
21 Sep 17Costumes Of Subversion: A Study Of Mardi Gras and the Cajun IdentityIdaho State University Arts & Letters TheatreUnknownUnknownColin Wintz1View
8 Jun 21Developing The Voice WithinIdaho State University Arts & Letters TheatreUnknownUnknownRichard Aufdermauer1View
6 Sep 18Creating a Mission and Entrepreneurial Projects for Theatre ArtistsIdaho State University Arts & Letters TheatreUnknownUnknownKelsey R. Palmer1View
9 Jun 21A Study of CosplayIdaho State University Arts & Letters TheatreUnknownUnknownStephanie Lathrop1View
13 Jul 15The Value of Community Theatre: Hidden Costs of Play ProductionIdaho State University Arts & Letters TheatreUnknownUnknownGabrielle Kane1View
26 May 23The Color of Rain: Technical Direction of The Burial at Thebes: A Version of Sophocles’ AntigoneIdaho State University Arts & Letters TheatreUnknownUnknownElizabeth M. Christensen1View
24 Mar 15The Slam Community: Training Grounds of Oral PoetryIdaho State University Arts & Letters TheatreUnknownUnknownSam Hansen1View
10 Mar 15Conceptual Metaphor Theory and Its Applications to "A Midsummer Night's Dream"Idaho State University Arts & Letters TheatreUnknownUnknownJesse Arnold1View
14 Jun 16A Stage Adaptation of J.R.R. Tolkien's "The Hobbit": or, "There and Back Again"Idaho State University Arts & Letters TheatreUnknownUnknownLizarose Hansen1View
5 Mar 15A Phishing Layered Defense Framework: A Holistic Approach to the Phishing ProblemIdaho State University Business BusinessUnknownUnknownCade Kamachi1View
6 Mar 15An Evaluation of Motivational Factors for Information Security Policy Buy-inIdaho State University Business BusinessUnknownUnknownEliot Long1View
24 Mar 15What Women Want (and Don't Want) in the Cybersecurity Profession: An Examination of Why the Industry Lacks Women and How to Inspire Gender Diversity in the WorkplaceIdaho State University Business BusinessUnknownUnknownPrincess Young1View
5 Mar 15Fox 2014Idaho State University Business BusinessUnknownUnknownAlbert Fox, Jr.1View
24 Mar 15Covert Transmission Malware SystemIdaho State University Business BusinessUnknownUnknownMarshall Smith1View
24 Mar 15Establishing a Criteria for Collegiate Cyber Defense Competition Injects: A Qualitative AnalysisIdaho State University Business BusinessUnknownUnknownRyan Beckstead1View
10 Mar 15Visualizing Information Systems Risk Model Usage Among Professionals: An Analysis of Alternatives to ALEIdaho State University Business BusinessUnknownUnknownJeremy Brown1View
6 Jul 18The Effects of Using the Social Elements of Competition and Cooperation in a Transformational Play-based Educational Video GameIdaho State University EducationUnknownUnknownLuke Erickson1View
15 Feb 19EMPLOYEE WORK ENGAGEMENT: TO WHAT EXTENT DOES SELF-DETERMINATION THEORY (SDT) PROVIDE A THEORETICAL EXPLANATION OF EMPLOYEE LEVELS OF WORK ENGAGEMENT IN IDAHO HIGHER EDUCATIONIdaho State University EducationUnknownUnknownDan Woerner1View
2 Feb 18NAVIGATING BY TIME, TOPIC, OR TOOL: LOST IN THE LEARNING MANAGEMENT SYSTEM?Idaho State University Education Educational LeadershipUnknownUnknownLisa C. Kidder1View
10 Jul 15The Multidimensional Instructional Efficiency of Worked ExamplesIdaho State University Education Educational LeadershipUnknownUnknownDanae Romrell1View
2008 - 2016 Informatics Research Institute (IRI)
Version 0.6.1.5 | beta | 6 April 2016

Other Projects

//