Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (167)
- Library and Information Science (144)
- Arts and Humanities (62)
- Business (39)
- Management Information Systems (22)
-
- Education (17)
- Creative Writing (15)
- Race, Ethnicity and Post-Colonial Studies (14)
- Indigenous Studies (13)
- Technology and Innovation (13)
- Physical Sciences and Mathematics (12)
- Computer Sciences (11)
- Marketing (11)
- Rhetoric and Composition (9)
- Information Security (8)
- Advertising and Promotion Management (7)
- Archival Science (7)
- Poetry (7)
- Communication (6)
- International and Comparative Education (6)
- Other Business (6)
- E-Commerce (5)
- Nonfiction (5)
- Sales and Merchandising (5)
- Arts Management (4)
- Higher Education (4)
- International and Area Studies (4)
- Psychology (4)
- Business and Corporate Communications (3)
- Economics (3)
- Keyword
-
- Book review (15)
- MAPWriting (10)
- Morocco (6)
- Higher education (5)
- Sociology (5)
-
- Study abroad (5)
- International students (4)
- Librarianship (4)
- Social media (4)
- Archives (3)
- Cybersecurity (3)
- Digital libraries (3)
- Education (3)
- Poetry (3)
- Technology (3)
- Anthropology (2)
- Autoethnography (2)
- Charity (2)
- Climate change (2)
- Conference (2)
- Criminal justice (2)
- Digitization (2)
- Donating (2)
- Ebooks (2)
- Economically developing countries (2)
- Engagement (2)
- Ethnomusicology (2)
- Gender (2)
- Georgia (2)
- Information Systems (2)
- Publication
-
- Georgia Library Quarterly (70)
- The Southeastern Librarian (67)
- Journal of Global Initiatives: Policy, Pedagogy, Perspective (20)
- The African Journal of Information Systems (17)
- Emerging Writers (14)
-
- The Crambo (14)
- Maya America: Journal of Essays, Commentary, and Analysis (13)
- The Journal of Public and Professional Sociology (11)
- MAPWriting (10)
- The Kennesaw Journal of Undergraduate Research (10)
- Atlantic Marketing Journal (9)
- Journal of Cybersecurity Education, Research and Practice (9)
- Provenance, Journal of the Society of Georgia Archivists (7)
- Navigations: A First-Year College Composite (3)
Articles 121 - 150 of 274
Full-Text Articles in Entire DC Network
They Do It Here: A Case Study Of How Public Space Is Used In A Research Library, Ashley S. Dees
They Do It Here: A Case Study Of How Public Space Is Used In A Research Library, Ashley S. Dees
The Southeastern Librarian
The evaluation of academic library space and its use is not a new concept within the world of academic libraries. For a number of years, librarians and libraries have been asked to prove their worth by documenting services and use within their physical library buildings. Space within the J.D. Williams Library, the main library at the University of Mississippi, became a concern due to consistent and, for several years, increasing freshman enrollment. Library staff reported hearing students complain about lack of space and electrical outlets. Much of the information available to library administration about the use of library space by …
Undergraduate Student Works In Institutional Repositories: An Analysis Of Coverage, Prominence And Discoverability, Angel Clemons, Tyler Goldberg
Undergraduate Student Works In Institutional Repositories: An Analysis Of Coverage, Prominence And Discoverability, Angel Clemons, Tyler Goldberg
The Southeastern Librarian
Institutional repositories (IRs) have evolved to showcase a wide-variety of authors and types of material. The early years of IR development focused on collecting and presenting faculty research, primarily in the form of research papers. Graduate theses and dissertations soon began to be incorporated into the scope of IR collection policies and have become as common in IRs as faculty research. Undergraduate research, however, appears to be much less common than faculty or graduate work. This paper examines the extent to which undergraduate student works (USW) are represented in the IRs of U.S. colleges and universities that use bepress’ Digital …
Seeking Eden: A Collection Of Georgia’S Historic Gardens, Melinda F. Matthews
Seeking Eden: A Collection Of Georgia’S Historic Gardens, Melinda F. Matthews
The Southeastern Librarian
Seeking Eden: A Collection of Georgia’s Historic Gardens. Staci L. Catron and Mary Ann Eaddy. Photograpy by James R. Lockhart. Athens: University of Georgia Press, 2018. ISBN: 978-0-8203-5300-5 (hardcover: alk. paper) $49.95. 471p.
How To Lead When You’Re Not In Charge: Leveraging Influence When You Lack Authority, Mark A. Kirkley
How To Lead When You’Re Not In Charge: Leveraging Influence When You Lack Authority, Mark A. Kirkley
The Southeastern Librarian
How to Lead When You’re not in Charge: Leveraging Influence When You Lack Authority. Clay Scroggins. Zondervan, 2017. ISBN: 978-0-310-53157-9 (hardcover), 978-0-310-53696-3 (paperback). $22.99 229 p.
Blackbeard’S Sunken Prize: The 300-Year Voyage Of Queen Anne’S Revenge, Melanie Dunn
Blackbeard’S Sunken Prize: The 300-Year Voyage Of Queen Anne’S Revenge, Melanie Dunn
The Southeastern Librarian
Blackbeard’s Sunken Prize: The 300-year voyage of Queen Anne’s Revenge. Mark U. Wilde-Ramsing, and Linda F. Carnes-McNaughton. Chapel Hill: The University of North Carolina Press, 2018. ISBN: 978-1-4696-4052-5 (Hard). $28.00. 224 p.
For Church And Confederacy: The Lynches Of South Carolina, Carol Walker Jordan
For Church And Confederacy: The Lynches Of South Carolina, Carol Walker Jordan
The Southeastern Librarian
For Church and Confederacy: The Lynches of South Carolina. Edited by Robert Emmett Curran. Columbia: The University of South Carolina Press, 2019. ISBN 978-1-61117-917-0 (Hard). $69.99. 456 p.
Trade, Politics, And Revolution: South Carolina And Britain’S Atlantic Commerce, 1730-1790, Carol Walker Jordan
Trade, Politics, And Revolution: South Carolina And Britain’S Atlantic Commerce, 1730-1790, Carol Walker Jordan
The Southeastern Librarian
Trade, Politics, and Revolution: South Carolina and Britain’s Atlantic Commerce, 1730-1790. Huw David. Columbia: The University of South Carolina Press, 2019. ISBN 978-1-61117-894-4 (hard). $59.99. 280 p.
The Perfect Scout: A Soldier’S Memoir Of The Great March To The Sea And The Campaign Of The Carolinas: George W. Quimby, Carol Walker Jordan
The Perfect Scout: A Soldier’S Memoir Of The Great March To The Sea And The Campaign Of The Carolinas: George W. Quimby, Carol Walker Jordan
The Southeastern Librarian
The Perfect Scout: A Soldier’s Memoir of the Great March to the Sea and the Campaign of the Carolinas: George W. Quimby. Edited by Anne Sarah Rubin and Stephen Murphy. Tuscaloosa: The University of Alabama Press, 2018. ISBN 978-0-8173-1971-7. $29.95. 224 p.
A Dream And A Chisel: Louisiana Sculptor Angela Gregory In Paris: 1925-1928, Carol Walker Jordan
A Dream And A Chisel: Louisiana Sculptor Angela Gregory In Paris: 1925-1928, Carol Walker Jordan
The Southeastern Librarian
A Dream and a Chisel: Louisiana Sculptor Angela Gregory in Paris: 1925-1928. Angela Gregory and Nancy L. Penrose. Columbia: The University of South Carolina Press, 2019. ISBN 978-1-61117-977-4 (Hard). $39.99. 248 p.
Slaves, Slaveholders And A Kentucky Community’S Struggle Toward Freedom, Carol Walker Jordan
Slaves, Slaveholders And A Kentucky Community’S Struggle Toward Freedom, Carol Walker Jordan
The Southeastern Librarian
Slaves, Slaveholders and a Kentucky Community’s Struggle Toward Freedom. Elizabeth D. Leonard. Lexington: University Press of Kentucky, 2019. ISBN 978-0-8131-7666-6. $50. 196 p.
Guidelines For Submission And Author Instructions
Guidelines For Submission And Author Instructions
The Southeastern Librarian
Guidelines for article submission to The Southeastern Librarian.
Editorial Staff And State Representatives
Editorial Staff And State Representatives
The Southeastern Librarian
Listing of editorial board for The Southeastern Librarian and current SELA state representatives.
Maya America: Introduction To The Journal Of Essays, Commentary, And Analysis, James Loucky
Maya America: Introduction To The Journal Of Essays, Commentary, And Analysis, James Loucky
Maya America: Journal of Essays, Commentary, and Analysis
Twenty years ago, the first account of the emerging transnational scope of the Maya, The Maya Diaspora: Guatemalan Roots, New American Lives (2000), focused on the roots and emerging realities of Maya migration. Much has changed in a short time. While lives and identities continue to involve intergenerational connections to the south, they are also increasingly ones that reflect an intersection of indigenous, intercultural, and transnational experiences. Ultimately, it is hoped that Maya America will serve to reveal how greatly interconnected are the Americas, through processes of social and cultural evolution, history, and demography, and through assertions of rights of …
The Role Of Institutional Pressures In The Adoption Of E-Procurement In Public Institutions In Developing Countries: The Case Of Lesotho, Salah Kabanda, Nteboheleng Pitso, Meke Kapepo
The Role Of Institutional Pressures In The Adoption Of E-Procurement In Public Institutions In Developing Countries: The Case Of Lesotho, Salah Kabanda, Nteboheleng Pitso, Meke Kapepo
The African Journal of Information Systems
Benefits of E-Procurement are now well documented as experienced by both public and private organizations. Yet, in developing countries, and more so in Africa, few organizations have reported benefits of E-Procurement. Whilst institutional pressures are instrumental in shaping organization’s actions and outcomes with regard to technology adoption, few studies have examined their role in E-Procurement adoption in African public sector organizations. This study situated in Lesotho, seeks to examine the rational for E-procurement adoption in the public sector and identifies institutional pressures that affect successful adoption. Following an interpritivist approach, this study identifies (1) perceived benefits of efficiency and transparency …
Adoption Of Cloud Computing By Firms In Kenya: The Role Of Institutional Pressures, John Otieno Oredo, James Njihia, Xn Iraki
Adoption Of Cloud Computing By Firms In Kenya: The Role Of Institutional Pressures, John Otieno Oredo, James Njihia, Xn Iraki
The African Journal of Information Systems
While there is substantial literature on the adoption of IT innovations based on utility computing, there is a dearth of studies on cloud computing adoption by business organizations. Given that cloud computing adoption has been steadily increasing in Kenya, this study aim to investigate the determinants of cloud computing adoption from an institutional perspective. The relationship between institutional pressures and cloud computing adoption was evaluated and tested using structural equation modelling (PLS SEM). A firm level cross sectional survey was conducted on a sample of 93 firms in the financial, manufacturing, and ICT sectors. The results indicate that coercive and …
Modeling Green Ebusiness Adoption Among Small And Medium Tourism Enterprises In Tanzania, Juma James Masele
Modeling Green Ebusiness Adoption Among Small And Medium Tourism Enterprises In Tanzania, Juma James Masele
The African Journal of Information Systems
This study was set to model Green eBusiness adoption among SMTEs in Tanzania, right from sourcing, operations, and to end-of-life-management. The study employed the use of Structural Equation Modeling (SEM) to analyze quantitative data collected from 240 respondents selected from 80 SMTEs in Dar es Salaam, Kilimanjaro, Arusha, and Zanzibar, who were in operations for at least three years. Although there were twelve hypotheses formulated, only seven hypotheses (with constructs Self-Efficacy, Effort Expectancy, Facilitating Conditions, Coercive Pressures, Intention to Use both to commitment and to Green eBusiness, and Commitment towards Green eBusiness adoption) were revealed significant. Others (with constructs Performance …
A Naturalistic Methodology For Assessing Susceptibility To Social Engineering Through Phishing, Paula Musuva, Christopher Chepken, Katherine Getao
A Naturalistic Methodology For Assessing Susceptibility To Social Engineering Through Phishing, Paula Musuva, Christopher Chepken, Katherine Getao
The African Journal of Information Systems
Phishing continues to be a prevalent social engineering attack. Attacks are relatively easy to setup and can target many people at low cost. This study presents a naturalistic field experiment that can be staged by organisations to determine their exposure. This exercise provides results with high ecological validity and can give organisations the information they need to craft countermeasures to social engineering risks. The study was conducted at a university campus in Kenya where 241 valid system users, also known as “insiders,” are targeted in a staged phishing experiment. The results show that 31.12% of the insiders are susceptible to …
Development Of Research Administration And Management System For Higher Education Institutions In Developing Countries: Case Study Of Durban University Of Technology, Misheck Nyirenda, Oludayo Olufolorunsho Olugbara, Sibusiso Moyo
Development Of Research Administration And Management System For Higher Education Institutions In Developing Countries: Case Study Of Durban University Of Technology, Misheck Nyirenda, Oludayo Olufolorunsho Olugbara, Sibusiso Moyo
The African Journal of Information Systems
Research information management has become an essential activity for higher education institutions (HEIs) worldwide as a mechanism to aggregate, curate, utilize and improve the transparency of information about research. It has led to the evolution of proprietary software systems for administering and managing research information in HEIs. However, the literature reveals that most proprietary software systems are usually inflexible, costly to maintain and do not adequately satisfy the dynamic requirements of HEIs in developing countries. Consequently, the demand for current information systems is to incorporate a high degree of formalism into software development processes to produce correct, flexible, usable and …
From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth
From The Editors, Michael E. Whitman, Herbert J. Mattord, Carole L. Hollingsworth
Journal of Cybersecurity Education, Research and Practice
No abstract provided.
Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne
Car Hacking: Accessing And Exploiting The Can Bus Protocol, Bryson R. Payne
Journal of Cybersecurity Education, Research and Practice
With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semi-autonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety, and the cybersecurity of these “data centers on wheels” is of greater concern than ever.
However, up to this point there has been a …
A Design Case: Assessing The Functional Needs For A Multi-Faceted Cybersecurity Learning Space, Charles J. Lesko Jr.
A Design Case: Assessing The Functional Needs For A Multi-Faceted Cybersecurity Learning Space, Charles J. Lesko Jr.
Journal of Cybersecurity Education, Research and Practice
Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequently allocated. This effort briefly describes the structure and scope of the current cybersecurity program being supported and then draws out the functional requirements that were identified for the center based on the needs of the institution’s cybersecurity program. It also highlights the physical and logical design specifications of the center, as well as, the many external program …
Adopting The Cybersecurity Curriculum Guidelines To Develop A Secondary And Primary Academic Discipline In Cybersecurity Postsecondary Education, Wasim A. Alhamdani
Adopting The Cybersecurity Curriculum Guidelines To Develop A Secondary And Primary Academic Discipline In Cybersecurity Postsecondary Education, Wasim A. Alhamdani
Journal of Cybersecurity Education, Research and Practice
A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.
Next Generation Of Evidence Collecting: The Need For Digital Forensics In Criminal Justice Education, Scott H. Belshaw
Next Generation Of Evidence Collecting: The Need For Digital Forensics In Criminal Justice Education, Scott H. Belshaw
Journal of Cybersecurity Education, Research and Practice
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes. Law enforcement is increasingly identifying the need to be able to process their evidence internally warranting the exploration of the need for digital forensics training as part of a broader study of criminal justice for future law enforcement practitioners. This paper uses telephone surveys of …
Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado
Cybersecurity Education: The Need For A Top-Driven, Multidisciplinary, School-Wide Approach, Lucy Tsado
Journal of Cybersecurity Education, Research and Practice
The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not sufficient to meet the shortfall in the industry. The DHS has clearly mapped out knowledge areas for cybersecurity education for both technical and non-technical disciplines; it is therefore possible for institutions not yet designated CAEs to generate cybersecurity experts, with the long-term goal of attaining the CAE designation. The purpose of this …
Editorial Staff And State Representatives
Editorial Staff And State Representatives
The Southeastern Librarian
Listing of editorial board for The Southeastern Librarian and current SELA state representatives.
Guidelines For Submission And Author Instructions
Guidelines For Submission And Author Instructions
The Southeastern Librarian
Guidelines for article submission to The Southeastern Librarian.
Lethal State: A History Of The Death Penalty In North Carolina, Carol Walker Jordan
Lethal State: A History Of The Death Penalty In North Carolina, Carol Walker Jordan
The Southeastern Librarian
Lethal State: A History of the Death Penalty in North Carolina. Seth Kotch. Chapel Hill: The University of North Carolina Press, 2019. ISBN 978-1-4696-4987-0 (pbk: $27.95); ISBN 978-1-4696-4986-3 (Hard: $90); ISBN 978-1-4696-4988-7 (EBook: $21.99). 320 p.
Mothers And Strangers: Essays On Motherhood From The New South, Carol Walker Jordan
Mothers And Strangers: Essays On Motherhood From The New South, Carol Walker Jordan
The Southeastern Librarian
Mothers and Strangers: Essays On Motherhood From The New South. Samia Serageldin and Lee Smith, eds. Chapel Hill: The University of North Carolina Press, 2019. ISBN 978-1-4696-5767-5 (pbk: $22); 978-1-4696-5168-2 (EBook: $16.99). 264 p.
Order And Ardor: The Revival Spirituality Of Oliver Hart And The Regular Baptists In Eighteenth-Century South Carolina, Carol Walker Jordan
Order And Ardor: The Revival Spirituality Of Oliver Hart And The Regular Baptists In Eighteenth-Century South Carolina, Carol Walker Jordan
The Southeastern Librarian
Order and Ardor: The Revival Spirituality of Oliver Hart and the Regular Baptists in Eighteenth-Century South Carolina. Eric C. Smith. Columbia: The University of South Carolina Press, 2019. ISBN 978-1-61117-878-4 (Hard); 978-1-1117-879-1 (Ebook). Both formats $44.99. 168 p.
A South Carolina Upcountry Saga: The Civil War Letters Of Barham Bobo Foster And His Family, 1860-1863, Tim Dodge
The Southeastern Librarian
A South Carolina Upcountry Saga: The Civil War Letters of Barham Bobo Foster and his Family 1860-1863. A. Gibert Kennedy, ed. Columbia: The University of South Carolina Press, 2019. ISBN: 978-1-61117-924-8 (cloth), ISBN: 9768-1-64336-02205 (ebook), $49.99 both formats. 360 p.