Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Physical Sciences and Mathematics
Krimet Kibernetike, Dua Gjyshinca
Krimet Kibernetike, Dua Gjyshinca
Theses and Dissertations
Në ditët e sotme moderne ku po mbizotëron e ashtëquajtura Epoka e Internet-it shumë nga punët e përditshme si pagesat, komunikimi në mes njerëzve, ndjekja e kurseve mësimore, shkarkimi dhe ngarkimi i dokumenteve të ndryshme, njoftimet rreth ngjarjeve në botë apo edhe përdorimi i aplikacioneve të ndryshme për argëtim ndodhin online me anë të pajisjeve të ndryshme si kompjuterët personal, telefonat e mençur dhe pajisjet tjera.
Njëra ndër gjërat më të rëndësishme që është e mundur falë internetit është mundësia që çdo kush në botë pavarësisht vendndodhjes i jepet mundësia që të lexojë dhe të njoftohet për ngjarjet nga e …
Web Technologies (Ggc), Shuting Xu, Shuhua Lai
Web Technologies (Ggc), Shuting Xu, Shuhua Lai
Computer Science and Information Technology Ancillary Materials
This complete set of course materials contains all files used for in-class activities and labs, a full set of lecture slides, project assignments, and a test bank. Topics covered include:
- HTML Basics
- CSS
- Images
- Page Layout
- Tables
- Forms
- Multimedia
- JavaScript
This course materials set was created under a Round Nine Textbook Transformation Grant.
Ksugo, Chase Godwin
Ksugo, Chase Godwin
KSU Journey Honors College Capstones and Theses
KSUGo seeks to better enable students to interact with their community, maintain a level of safety on and off campus, improve their course management skills, and increase information propagation among students and campus officials. Currently, Kennesaw State does not have a dedicated general purpose native application on any mobile device platform for students, faculty, or staff to use for improving their everyday Kennesaw State experience. This project seeks to rectify that need by providing a native application with support for the Android platform.
Foundations Of Health Information Technology (Undergraduate) Course Materials, Chi Zhang
Foundations Of Health Information Technology (Undergraduate) Course Materials, Chi Zhang
Computer Science and Information Technology Ancillary Materials
This is a collection of all materials used in Health Information Technology by Dr. Chi Zhang at Kennesaw State University, including lecture slides, assignments, and assessments, including a question bank.
Topics covered include:
- Clinical Financial Records
- Evidence-Based Medicine
- e-Prescribing
- Patient Bedside Systems
- Telemedicine
- Health Information Networks
- Cryptography
- Accreditation
- HIPAA Privacy and Security
Open Source Classroom Polling (Interactive Response) Facility, Ronald I. Greenberg
Open Source Classroom Polling (Interactive Response) Facility, Ronald I. Greenberg
Ronald Greenberg
The contents of the UNIX directory resulting from unzipping the .zip file provide a demonstration of a simple polling facililty that instructors can use in class any time that students have access to a web browser. This is a good way to have students work problems and see to what extent they are converging towards correct answers. Unlike other polling facilities, this one is completely free without any restrictions on number of simultaneous users, etc. It also allows a feature most polling facilities do not in that it may be used for completely free-form answers, and the instructor can still …
Can Ego Defense Mechanism Help Explain Is Security Dysfunctional Behavior, Abhijit Chaudhury, Debasish Mallick
Can Ego Defense Mechanism Help Explain Is Security Dysfunctional Behavior, Abhijit Chaudhury, Debasish Mallick
Information Systems and Analytics Department Faculty Conference Proceedings
IS security behavior studies are becoming popular. To date, much of the research has been based on theories such as the Theory of Planned Behavior, Technology Adoption Model, Rational Choice theory and Theory of Reasoned Action. They view users as rational individuals making conscious utilitarian decisions when there is increasing evidence that security breaches are the result of human behavior such as carelessness, malicious intent, bad habits, and hostility. We propose the ego defense mechanism model, taken from the psychoanalytical world. This model makes no assumption of rationality and has been developed to help understand the roots of dysfunctional behavior …
Informing Students About Academic Integrity In Programming., Simple Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, Jane Sinclair
Informing Students About Academic Integrity In Programming., Simple Simon, Judy Sheard, Michael Morgan, Andrew Petersen, Amber Settle, Jane Sinclair
Amber Settle