Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Krimet Kibernetike, Dua Gjyshinca Sep 2018

Krimet Kibernetike, Dua Gjyshinca

Theses and Dissertations

Në ditët e sotme moderne ku po mbizotëron e ashtëquajtura Epoka e Internet-it shumë nga punët e përditshme si pagesat, komunikimi në mes njerëzve, ndjekja e kurseve mësimore, shkarkimi dhe ngarkimi i dokumenteve të ndryshme, njoftimet rreth ngjarjeve në botë apo edhe përdorimi i aplikacioneve të ndryshme për argëtim ndodhin online me anë të pajisjeve të ndryshme si kompjuterët personal, telefonat e mençur dhe pajisjet tjera.

Njëra ndër gjërat më të rëndësishme që është e mundur falë internetit është mundësia që çdo kush në botë pavarësisht vendndodhjes i jepet mundësia që të lexojë dhe të njoftohet për ngjarjet nga e …


Web Technologies (Ggc), Shuting Xu, Shuhua Lai Jul 2018

Web Technologies (Ggc), Shuting Xu, Shuhua Lai

Computer Science and Information Technology Ancillary Materials

This complete set of course materials contains all files used for in-class activities and labs, a full set of lecture slides, project assignments, and a test bank. Topics covered include:

  • HTML Basics
  • CSS
  • Images
  • Page Layout
  • Tables
  • Forms
  • Multimedia
  • JavaScript

This course materials set was created under a Round Nine Textbook Transformation Grant.


Ksugo, Chase Godwin May 2018

Ksugo, Chase Godwin

KSU Journey Honors College Capstones and Theses

KSUGo seeks to better enable students to interact with their community, maintain a level of safety on and off campus, improve their course management skills, and increase information propagation among students and campus officials. Currently, Kennesaw State does not have a dedicated general purpose native application on any mobile device platform for students, faculty, or staff to use for improving their everyday Kennesaw State experience. This project seeks to rectify that need by providing a native application with support for the Android platform.


Foundations Of Health Information Technology (Undergraduate) Course Materials, Chi Zhang Apr 2018

Foundations Of Health Information Technology (Undergraduate) Course Materials, Chi Zhang

Computer Science and Information Technology Ancillary Materials

This is a collection of all materials used in Health Information Technology by Dr. Chi Zhang at Kennesaw State University, including lecture slides, assignments, and assessments, including a question bank.

Topics covered include:

  • Clinical Financial Records
  • Evidence-Based Medicine
  • e-Prescribing
  • Patient Bedside Systems
  • Telemedicine
  • Health Information Networks
  • Cryptography
  • Accreditation
  • HIPAA Privacy and Security


Open Source Classroom Polling (Interactive Response) Facility, Ronald I. Greenberg Jan 2018

Open Source Classroom Polling (Interactive Response) Facility, Ronald I. Greenberg

Ronald Greenberg

The contents of the UNIX directory resulting from unzipping the .zip file provide a demonstration of a simple polling facililty that instructors can use in class any time that students have access to a web browser. This is a good way to have students work problems and see to what extent they are converging towards correct answers. Unlike other polling facilities, this one is completely free without any restrictions on number of simultaneous users, etc. It also allows a feature most polling facilities do not in that it may be used for completely free-form answers, and the instructor can still …


Can Ego Defense Mechanism Help Explain Is Security Dysfunctional Behavior, Abhijit Chaudhury, Debasish Mallick Jan 2018

Can Ego Defense Mechanism Help Explain Is Security Dysfunctional Behavior, Abhijit Chaudhury, Debasish Mallick

Information Systems and Analytics Department Faculty Conference Proceedings

IS security behavior studies are becoming popular. To date, much of the research has been based on theories such as the Theory of Planned Behavior, Technology Adoption Model, Rational Choice theory and Theory of Reasoned Action. They view users as rational individuals making conscious utilitarian decisions when there is increasing evidence that security breaches are the result of human behavior such as carelessness, malicious intent, bad habits, and hostility. We propose the ego defense mechanism model, taken from the psychoanalytical world. This model makes no assumption of rationality and has been developed to help understand the roots of dysfunctional behavior …


Informing Students About Academic Integrity In Programming., Simple Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, Jane Sinclair Dec 2017

Informing Students About Academic Integrity In Programming., Simple Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, Jane Sinclair

Amber Settle

In recent years academic integrity has come to be seen as a major concern across the full educational spectrum. The case has been made that in certain ways academic integrity is not the same in computing education as in education more generally, and that as a consequence it is the responsibility of computing educators to explicitly advise their students of the academic integrity requirements of their assessments. As part of a larger project, computing academics around the world were asked a number of questions regarding how they advise their students about academic integrity in programming assessments. Almost all respondents indicated …