Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Kennesaw State University

Journal

2019

Discipline
Keyword
Publication

Articles 121 - 150 of 274

Full-Text Articles in Entire DC Network

They Do It Here: A Case Study Of How Public Space Is Used In A Research Library, Ashley S. Dees Jul 2019

They Do It Here: A Case Study Of How Public Space Is Used In A Research Library, Ashley S. Dees

The Southeastern Librarian

The evaluation of academic library space and its use is not a new concept within the world of academic libraries. For a number of years, librarians and libraries have been asked to prove their worth by documenting services and use within their physical library buildings. Space within the J.D. Williams Library, the main library at the University of Mississippi, became a concern due to consistent and, for several years, increasing freshman enrollment. Library staff reported hearing students complain about lack of space and electrical outlets. Much of the information available to library administration about the use of library space by …


Undergraduate Student Works In Institutional Repositories: An Analysis Of Coverage, Prominence And Discoverability, Angel Clemons, Tyler Goldberg Jul 2019

Undergraduate Student Works In Institutional Repositories: An Analysis Of Coverage, Prominence And Discoverability, Angel Clemons, Tyler Goldberg

The Southeastern Librarian

Institutional repositories (IRs) have evolved to showcase a wide-variety of authors and types of material. The early years of IR development focused on collecting and presenting faculty research, primarily in the form of research papers. Graduate theses and dissertations soon began to be incorporated into the scope of IR collection policies and have become as common in IRs as faculty research. Undergraduate research, however, appears to be much less common than faculty or graduate work. This paper examines the extent to which undergraduate student works (USW) are represented in the IRs of U.S. colleges and universities that use bepress’ Digital …


Seeking Eden: A Collection Of Georgia’S Historic Gardens, Melinda F. Matthews Jul 2019

Seeking Eden: A Collection Of Georgia’S Historic Gardens, Melinda F. Matthews

The Southeastern Librarian

Seeking Eden: A Collection of Georgia’s Historic Gardens. Staci L. Catron and Mary Ann Eaddy. Photograpy by James R. Lockhart. Athens: University of Georgia Press, 2018. ISBN: 978-0-8203-5300-5 (hardcover: alk. paper) $49.95. 471p.


How To Lead When You’Re Not In Charge: Leveraging Influence When You Lack Authority, Mark A. Kirkley Jul 2019

How To Lead When You’Re Not In Charge: Leveraging Influence When You Lack Authority, Mark A. Kirkley

The Southeastern Librarian

How to Lead When You’re not in Charge: Leveraging Influence When You Lack Authority. Clay Scroggins. Zondervan, 2017. ISBN: 978-0-310-53157-9 (hardcover), 978-0-310-53696-3 (paperback). $22.99 229 p.


Blackbeard’S Sunken Prize: The 300-Year Voyage Of Queen Anne’S Revenge, Melanie Dunn Jul 2019

Blackbeard’S Sunken Prize: The 300-Year Voyage Of Queen Anne’S Revenge, Melanie Dunn

The Southeastern Librarian

Blackbeard’s Sunken Prize: The 300-year voyage of Queen Anne’s Revenge. Mark U. Wilde-Ramsing, and Linda F. Carnes-McNaughton. Chapel Hill: The University of North Carolina Press, 2018. ISBN: 978-1-4696-4052-5 (Hard). $28.00. 224 p.


For Church And Confederacy: The Lynches Of South Carolina, Carol Walker Jordan Jul 2019

For Church And Confederacy: The Lynches Of South Carolina, Carol Walker Jordan

The Southeastern Librarian

For Church and Confederacy: The Lynches of South Carolina. Edited by Robert Emmett Curran. Columbia: The University of South Carolina Press, 2019. ISBN 978-1-61117-917-0 (Hard). $69.99. 456 p.


Trade, Politics, And Revolution: South Carolina And Britain’S Atlantic Commerce, 1730-1790, Carol Walker Jordan Jul 2019

Trade, Politics, And Revolution: South Carolina And Britain’S Atlantic Commerce, 1730-1790, Carol Walker Jordan

The Southeastern Librarian

Trade, Politics, and Revolution: South Carolina and Britain’s Atlantic Commerce, 1730-1790. Huw David. Columbia: The University of South Carolina Press, 2019. ISBN 978-1-61117-894-4 (hard). $59.99. 280 p.


The Perfect Scout: A Soldier’S Memoir Of The Great March To The Sea And The Campaign Of The Carolinas: George W. Quimby, Carol Walker Jordan Jul 2019

The Perfect Scout: A Soldier’S Memoir Of The Great March To The Sea And The Campaign Of The Carolinas: George W. Quimby, Carol Walker Jordan

The Southeastern Librarian

The Perfect Scout: A Soldier’s Memoir of the Great March to the Sea and the Campaign of the Carolinas: George W. Quimby. Edited by Anne Sarah Rubin and Stephen Murphy. Tuscaloosa: The University of Alabama Press, 2018. ISBN 978-0-8173-1971-7. $29.95. 224 p.


A Dream And A Chisel: Louisiana Sculptor Angela Gregory In Paris: 1925-1928, Carol Walker Jordan Jul 2019

A Dream And A Chisel: Louisiana Sculptor Angela Gregory In Paris: 1925-1928, Carol Walker Jordan

The Southeastern Librarian

A Dream and a Chisel: Louisiana Sculptor Angela Gregory in Paris: 1925-1928. Angela Gregory and Nancy L. Penrose. Columbia: The University of South Carolina Press, 2019. ISBN 978-1-61117-977-4 (Hard). $39.99. 248 p.


Slaves, Slaveholders And A Kentucky Community’S Struggle Toward Freedom, Carol Walker Jordan Jul 2019

Slaves, Slaveholders And A Kentucky Community’S Struggle Toward Freedom, Carol Walker Jordan

The Southeastern Librarian

Slaves, Slaveholders and a Kentucky Community’s Struggle Toward Freedom. Elizabeth D. Leonard. Lexington: University Press of Kentucky, 2019. ISBN 978-0-8131-7666-6. $50. 196 p.


Guidelines For Submission And Author Instructions Jul 2019

Guidelines For Submission And Author Instructions

The Southeastern Librarian

Guidelines for article submission to The Southeastern Librarian.


Editorial Staff And State Representatives Jul 2019

Editorial Staff And State Representatives

The Southeastern Librarian

Listing of editorial board for The Southeastern Librarian and current SELA state representatives.


Maya America: Introduction To The Journal Of Essays, Commentary, And Analysis, James Loucky Jul 2019

Maya America: Introduction To The Journal Of Essays, Commentary, And Analysis, James Loucky

Maya America: Journal of Essays, Commentary, and Analysis

Twenty years ago, the first account of the emerging transnational scope of the Maya, The Maya Diaspora: Guatemalan Roots, New American Lives (2000), focused on the roots and emerging realities of Maya migration. Much has changed in a short time. While lives and identities continue to involve intergenerational connections to the south, they are also increasingly ones that reflect an intersection of indigenous, intercultural, and transnational experiences. Ultimately, it is hoped that Maya America will serve to reveal how greatly interconnected are the Americas, through processes of social and cultural evolution, history, and demography, and through assertions of rights of …


The Role Of Institutional Pressures In The Adoption Of E-Procurement In Public Institutions In Developing Countries: The Case Of Lesotho, Salah Kabanda, Nteboheleng Pitso, Meke Kapepo Jul 2019

The Role Of Institutional Pressures In The Adoption Of E-Procurement In Public Institutions In Developing Countries: The Case Of Lesotho, Salah Kabanda, Nteboheleng Pitso, Meke Kapepo

The African Journal of Information Systems

Benefits of E-Procurement are now well documented as experienced by both public and private organizations. Yet, in developing countries, and more so in Africa, few organizations have reported benefits of E-Procurement. Whilst institutional pressures are instrumental in shaping organization’s actions and outcomes with regard to technology adoption, few studies have examined their role in E-Procurement adoption in African public sector organizations. This study situated in Lesotho, seeks to examine the rational for E-procurement adoption in the public sector and identifies institutional pressures that affect successful adoption. Following an interpritivist approach, this study identifies (1) perceived benefits of efficiency and transparency …


Adoption Of Cloud Computing By Firms In Kenya: The Role Of Institutional Pressures, John Otieno Oredo, James Njihia, Xn Iraki Jul 2019

Adoption Of Cloud Computing By Firms In Kenya: The Role Of Institutional Pressures, John Otieno Oredo, James Njihia, Xn Iraki

The African Journal of Information Systems

While there is substantial literature on the adoption of IT innovations based on utility computing, there is a dearth of studies on cloud computing adoption by business organizations. Given that cloud computing adoption has been steadily increasing in Kenya, this study aim to investigate the determinants of cloud computing adoption from an institutional perspective. The relationship between institutional pressures and cloud computing adoption was evaluated and tested using structural equation modelling (PLS SEM). A firm level cross sectional survey was conducted on a sample of 93 firms in the financial, manufacturing, and ICT sectors. The results indicate that coercive and …


Modeling Green Ebusiness Adoption Among Small And Medium Tourism Enterprises In Tanzania, Juma James Masele Jul 2019

Modeling Green Ebusiness Adoption Among Small And Medium Tourism Enterprises In Tanzania, Juma James Masele

The African Journal of Information Systems

This study was set to model Green eBusiness adoption among SMTEs in Tanzania, right from sourcing, operations, and to end-of-life-management. The study employed the use of Structural Equation Modeling (SEM) to analyze quantitative data collected from 240 respondents selected from 80 SMTEs in Dar es Salaam, Kilimanjaro, Arusha, and Zanzibar, who were in operations for at least three years. Although there were twelve hypotheses formulated, only seven hypotheses (with constructs Self-Efficacy, Effort Expectancy, Facilitating Conditions, Coercive Pressures, Intention to Use both to commitment and to Green eBusiness, and Commitment towards Green eBusiness adoption) were revealed significant. Others (with constructs Performance …


A Naturalistic Methodology For Assessing Susceptibility To Social Engineering Through Phishing, Paula Musuva, Christopher Chepken, Katherine Getao Jul 2019

A Naturalistic Methodology For Assessing Susceptibility To Social Engineering Through Phishing, Paula Musuva, Christopher Chepken, Katherine Getao

The African Journal of Information Systems

Phishing continues to be a prevalent social engineering attack. Attacks are relatively easy to setup and can target many people at low cost. This study presents a naturalistic field experiment that can be staged by organisations to determine their exposure. This exercise provides results with high ecological validity and can give organisations the information they need to craft countermeasures to social engineering risks. The study was conducted at a university campus in Kenya where 241 valid system users, also known as “insiders,” are targeted in a staged phishing experiment. The results show that 31.12% of the insiders are susceptible to …


Development Of Research Administration And Management System For Higher Education Institutions In Developing Countries: Case Study Of Durban University Of Technology, Misheck Nyirenda, Oludayo Olufolorunsho Olugbara, Sibusiso Moyo Jul 2019

Development Of Research Administration And Management System For Higher Education Institutions In Developing Countries: Case Study Of Durban University Of Technology, Misheck Nyirenda, Oludayo Olufolorunsho Olugbara, Sibusiso Moyo

The African Journal of Information Systems

Research information management has become an essential activity for higher education institutions (HEIs) worldwide as a mechanism to aggregate, curate, utilize and improve the transparency of information about research. It has led to the evolution of proprietary software systems for administering and managing research information in HEIs. However, the literature reveals that most proprietary software systems are usually inflexible, costly to maintain and do not adequately satisfy the dynamic requirements of HEIs in developing countries. Consequently, the demand for current information systems is to incorporate a high degree of formalism into software development processes to produce correct, flexible, usable and …


From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth Jun 2019

From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth

Journal of Cybersecurity Education, Research and Practice

No abstract provided.


Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne Jun 2019

Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne

Journal of Cybersecurity Education, Research and Practice

With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semi-autonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety, and the cybersecurity of these “data centers on wheels” is of greater concern than ever.

However, up to this point there has been a …


A Design Case: Assessing The Functional Needs For A Multi-Faceted Cybersecurity Learning Space, Charles J. Lesko Jr. Jun 2019

A Design Case: Assessing The Functional Needs For A Multi-Faceted Cybersecurity Learning Space, Charles J. Lesko Jr.

Journal of Cybersecurity Education, Research and Practice

Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequently allocated. This effort briefly describes the structure and scope of the current cybersecurity program being supported and then draws out the functional requirements that were identified for the center based on the needs of the institution’s cybersecurity program. It also highlights the physical and logical design specifications of the center, as well as, the many external program …


Adopting The Cybersecurity Curriculum Guidelines To Develop A Secondary And Primary Academic Discipline In Cybersecurity Postsecondary Education, Wasim A. Alhamdani Jun 2019

Adopting The Cybersecurity Curriculum Guidelines To Develop A Secondary And Primary Academic Discipline In Cybersecurity Postsecondary Education, Wasim A. Alhamdani

Journal of Cybersecurity Education, Research and Practice

A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.


Next Generation Of Evidence Collecting: The Need For Digital Forensics In Criminal Justice Education, Scott H. Belshaw Jun 2019

Next Generation Of Evidence Collecting: The Need For Digital Forensics In Criminal Justice Education, Scott H. Belshaw

Journal of Cybersecurity Education, Research and Practice

Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes. Law enforcement is increasingly identifying the need to be able to process their evidence internally warranting the exploration of the need for digital forensics training as part of a broader study of criminal justice for future law enforcement practitioners. This paper uses telephone surveys of …


Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado Jun 2019

Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado

Journal of Cybersecurity Education, Research and Practice

The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not sufficient to meet the shortfall in the industry. The DHS has clearly mapped out knowledge areas for cybersecurity education for both technical and non-technical disciplines; it is therefore possible for institutions not yet designated CAEs to generate cybersecurity experts, with the long-term goal of attaining the CAE designation. The purpose of this …


Editorial Staff And State Representatives May 2019

Editorial Staff And State Representatives

The Southeastern Librarian

Listing of editorial board for The Southeastern Librarian and current SELA state representatives.


Guidelines For Submission And Author Instructions May 2019

Guidelines For Submission And Author Instructions

The Southeastern Librarian

Guidelines for article submission to The Southeastern Librarian.


Lethal State: A History Of The Death Penalty In North Carolina, Carol Walker Jordan May 2019

Lethal State: A History Of The Death Penalty In North Carolina, Carol Walker Jordan

The Southeastern Librarian

Lethal State: A History of the Death Penalty in North Carolina. Seth Kotch. Chapel Hill: The University of North Carolina Press, 2019. ISBN 978-1-4696-4987-0 (pbk: $27.95); ISBN 978-1-4696-4986-3 (Hard: $90); ISBN 978-1-4696-4988-7 (EBook: $21.99). 320 p.


Mothers And Strangers: Essays On Motherhood From The New South, Carol Walker Jordan May 2019

Mothers And Strangers: Essays On Motherhood From The New South, Carol Walker Jordan

The Southeastern Librarian

Mothers and Strangers: Essays On Motherhood From The New South. Samia Serageldin and Lee Smith, eds. Chapel Hill: The University of North Carolina Press, 2019. ISBN 978-1-4696-5767-5 (pbk: $22); 978-1-4696-5168-2 (EBook: $16.99). 264 p.


Order And Ardor: The Revival Spirituality Of Oliver Hart And The Regular Baptists In Eighteenth-Century South Carolina, Carol Walker Jordan May 2019

Order And Ardor: The Revival Spirituality Of Oliver Hart And The Regular Baptists In Eighteenth-Century South Carolina, Carol Walker Jordan

The Southeastern Librarian

Order and Ardor: The Revival Spirituality of Oliver Hart and the Regular Baptists in Eighteenth-Century South Carolina. Eric C. Smith. Columbia: The University of South Carolina Press, 2019. ISBN 978-1-61117-878-4 (Hard); 978-1-1117-879-1 (Ebook). Both formats $44.99. 168 p.


A South Carolina Upcountry Saga: The Civil War Letters Of Barham Bobo Foster And His Family, 1860-1863, Tim Dodge May 2019

A South Carolina Upcountry Saga: The Civil War Letters Of Barham Bobo Foster And His Family, 1860-1863, Tim Dodge

The Southeastern Librarian

A South Carolina Upcountry Saga: The Civil War Letters of Barham Bobo Foster and his Family 1860-1863. A. Gibert Kennedy, ed. Columbia: The University of South Carolina Press, 2019. ISBN: 978-1-61117-924-8 (cloth), ISBN: 9768-1-64336-02205 (ebook), $49.99 both formats. 360 p.