Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (272)
- Business (264)
- Higher Education (193)
- Curriculum and Instruction (183)
- Teacher Education and Professional Development (172)
-
- Library and Information Science (155)
- Physical Sciences and Mathematics (129)
- Educational Assessment, Evaluation, and Research (112)
- Arts and Humanities (106)
- Educational Administration and Supervision (101)
- Educational Methods (78)
- Scholarship of Teaching and Learning (71)
- Higher Education and Teaching (69)
- Computer Sciences (68)
- Higher Education Administration (68)
- Educational Leadership (62)
- Medicine and Health Sciences (61)
- Management Information Systems (59)
- Science and Mathematics Education (59)
- Educational Technology (52)
- Technology and Innovation (52)
- Information Security (50)
- Language and Literacy Education (47)
- Engineering (45)
- Online and Distance Education (44)
- Architecture (42)
- Bilingual, Multilingual, and Multicultural Education (41)
- Elementary Education (40)
- Life Sciences (40)
- Keyword
-
- Higher education (56)
- Teaching (51)
- Technology (48)
- Computers (42)
- American education (40)
-
- Classroom philosophy (40)
- Teaching profession (40)
- Western world literature (40)
- Education (37)
- Interdisciplinary (30)
- Conference program (27)
- Libraries (27)
- Posters (27)
- Presentations (27)
- Undergraduate student research (27)
- Business education (25)
- Reading (20)
- Cybersecurity (18)
- Learning (17)
- Professional development (17)
- Literacy (16)
- Online learning (16)
- Pedagogy (16)
- Assessment (15)
- Information literacy (12)
- Self-efficacy (12)
- Higher Education (11)
- Student engagement (11)
- Theory (11)
- Collaboration (10)
- Publication Year
- Publication
-
- Faculty and Research Publications (169)
- Journal of Executive Education (78)
- Transforming Libraries for Graduate Students (73)
- Doctor of Education in Teacher Leadership Dissertations (63)
- Georgia Library Quarterly (44)
-
- Doctor of Education in Educational Leadership Dissertations (42)
- Reaching Through Teaching (40)
- The Southeastern Librarian (40)
- Journal of Cybersecurity Education, Research and Practice (39)
- Atlantic Marketing Journal (33)
- Symposium of Student Scholars (28)
- Symposium of Student Scholars Program Books (28)
- Journal of Global Initiatives: Policy, Pedagogy, Perspective (27)
- The African Journal of Information Systems (26)
- Doctor of Education in Instructional Technology Dissertations (23)
- Doctor of Education in Secondary and Middle Grades Education Dissertations (22)
- KSU Distinguished Course Repository (22)
- African Conference on Information Systems and Technology (19)
- Dissertations (19)
- Atlantic Marketing Association Proceedings (18)
- Georgia Journal of Literacy (18)
- KSU Proceedings on Cybersecurity Education, Research and Practice (13)
- Doctor of Education in Special Education Dissertations (12)
- Emerging Writers (11)
- Master of Arts in Professional Writing Capstones (10)
- The Georgia Journal of Reading Archive (10)
- Bachelor of Architecture Theses - 5th Year (8)
- All Things Open (7)
- Business Services Newsletters (6)
- The Kennesaw Journal of Undergraduate Research (5)
Articles 61 - 90 of 997
Full-Text Articles in Education
Fostering Critical Thinking Through Simulation: An Integrative Review, Sarah Knapp, Raymonta Green
Fostering Critical Thinking Through Simulation: An Integrative Review, Sarah Knapp, Raymonta Green
Master of Science in Nursing Final Projects
Over the past decade simulation has become a staple of nursing education with increasing use during the COVID-19 pandemic. Both manikin-based and virtual simulation are used to increase the preparedness of nursing students for their roles at the bedside. With the increasing experience-complexity gap, it is important that students enter the workforce prepared to effectively care for patients. Simulation allows students to work with a patient scenario without the possibility of injury; in simulation, mistakes are opportunities instead of harm. This integrative review searched the literature questioning if in pre-licensure Bachelor of Science in Nursing students, do virtual simulation and …
Origins Of Great Traditions, Joseph J. Reidy
Origins Of Great Traditions, Joseph J. Reidy
KSU Distinguished Course Repository
This course is a systematic examination of five centers of civilization in Afro-Eurasia during their defining moments. The course focuses on the historical contexts that gave rise to China’s classical philosophies, India’s transcendental world-view, the Judaeo-Christian-Islamic synthesis, African mythoreligious systems of thought, and Latin-European culture in the West. The course’s content emphasizes cross-cultural influences and connections.
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Integrity, Confidentiality, And Equity: Using Inquiry-Based Labs To Help Students Understand Ai And Cybersecurity, Richard C. Alexander, Liran Ma, Ze-Li Dou, Zhipeng Cai, Yan Huang
Journal of Cybersecurity Education, Research and Practice
Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality and promise, AI has inherent security risks that users should understand and programmers must be trained to address. The ICE (integrity, confidentiality, and equity) cybersecurity labs developed by a team of cybersecurity researchers addresses these vulnerabilities to AI models through a series of hands-on, inquiry-based labs. Through …
Sports Information And Media, Chad Goebert
Sports Information And Media, Chad Goebert
KSU Distinguished Course Repository
This class is designed to familiarize students with the field of sport information including mass communication, print media, broadcast media, sports news releases, interviewing, and public relations. Emphasis is placed upon the gathering, managing, and delivering information about sport organizations, teams, players, and coaches to the public.
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Building A Diverse Cybersecurity Workforce: A Study On Attracting Learners With Varied Educational Backgrounds, Mubashrah Saddiqa, Kristian Helmer Kjær Larsen1 Helmer Kjær Larsen, Robert Nedergaard Nielsen, Jens Myrup Pedersen
Journal of Cybersecurity Education, Research and Practice
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and ethics, cybersecurity can foster diversity among audiences with varying educational backgrounds, thereby cultivating a richer and more resilient security landscape. A more diverse cybersecurity workforce can provide a broader range of perspectives, experiences, and skills to address the complex and ever-evolving threats of the digital age. The research focuses on enhancing cybersecurity education …
Social Media Marketing, Tyra M. Burton
Social Media Marketing, Tyra M. Burton
KSU Distinguished Course Repository
This Social Media Marketing course explores the many realms of social media and includes case studies, discussions, interactive exercises as well as articles from the current literature. We will examine the changing role of social media in the promotional marketing mix, the role of the consumer in social media, online communities, how social media impacts both marketing and consumer lifestyles, how to measure the ROI of social media, and the metrics of social media.
Teaching Reading And Writing In The Elementary Grades 3-5, Debra J. Coffey
Teaching Reading And Writing In The Elementary Grades 3-5, Debra J. Coffey
KSU Distinguished Course Repository
Teacher candidates in this course will explore the relationship of reading, writing, speaking, and listening in the context of the diverse elementary classroom, grades 3-5, They will use practical, research-based strategies for assessment, instruction, management, and differentiation of reading comprehension and writing composition. Throughout literature circles with culturally responsive novels and field experience, they will use technology and a wide range of resources to extend literacy skills for all learners.
2023 - The Fourth Annual Fall Symposium Of Student Scholars
2023 - The Fourth Annual Fall Symposium Of Student Scholars
Symposium of Student Scholars Program Books
The full program book from the Fall 2023 Symposium of Student Scholars, held in November 2023. Includes abstracts from the presentations and posters.
Music In Society, Heather Hart
Music In Society, Heather Hart
KSU Distinguished Course Repository
This course examines the role of music in society through a study of musical works within their cultural and historical contexts. Course assignments develop skills in critical analysis and global perspectives as well as an understanding of the creative process.
Leading Online Professional Development For Instructional Technology Coaches With Effective Design Elements, Janet Cowart
Leading Online Professional Development For Instructional Technology Coaches With Effective Design Elements, Janet Cowart
Doctor of Education in Instructional Technology Dissertations
Online professional development became a necessity during the pandemic for educators, including Instructional Technology Coaches, to continue to gain knowledge to improve instruction. In this study, Instructional Technology Coaches participated in an online professional development series of synchronous and asynchronous sessions called Pathways. Two theoretical frameworks were used to support the research: Adult Learning Theory with an emphasis on the Theory of Computer-based Instruction for Adults, and TPACK. The seven characteristics of effective professional development created by Darling-Hammond et al. (2017) provided a foundation on which design elements to include in Pathways. There were 10 design elements that were implemented …
“I Was Told There’D Be Homebrew”: Using Open Resources To Build No Cost/Low Cost Ttrpg Events, Nathaniel Bareford
“I Was Told There’D Be Homebrew”: Using Open Resources To Build No Cost/Low Cost Ttrpg Events, Nathaniel Bareford
All Things Open
While tabletop role-playing games (TTRPG) like Dungeons and Dragons 5e are more popular than they have ever been, access barriers still exist for some players hoping to get into the game. The cost of game materials such as rule books, dice, and miniatures (or "minis") can prevent some people from playing. This presentation gives an overview of open resources and low-cost/no-cost materials that librarians, educators, community event planners and others can use to eliminate barriers and welcome all gamers to the table. We will describe how Wizards of the Coast’s open gaming license and System Reference Document, virtual tabletop systems, …
Open Access Scholarship: Amplifying Reach, Enhancing Collaboration, And Empowering Education, Yvonne Earnshaw, Matthew Schmidt
Open Access Scholarship: Amplifying Reach, Enhancing Collaboration, And Empowering Education, Yvonne Earnshaw, Matthew Schmidt
All Things Open
In this presentation, we highlight three benefits of leveraging open educational resources in academia. Our experiences as open access advocates and key contributors to OER projects will be supported by compelling analytics, highlighting the potential of open access publishing. We will first discuss how OER increases impact and visibility in that it liberates research from paywalls, granting unrestricted global access. This wider reach leads to greater readership, amplifying the influence of research within and beyond academia. Next, we will discuss enhanced citations and collaboration, highlighting how open access fosters a culture of knowledge-sharing and community across disciplines, thereby reducing the …
Characterizing The Adolescent Male Reader: A Narrative Inquiry Into The Reading Lives Of 12th Grade Boys Enrolled In Ib Language A: Literature, Marsha French
Doctor of Education in Secondary and Middle Grades Education Dissertations
The problem this research seeks to understand is the intersection of the gender achievement gap in reading and the gendered practices of “the school” as a powerful social institution. This project draws upon the studies of the 1990s-2000s in order to discover the potential impact of the social, cultural, and political movements and shifts that began in 2017. Most earlier research into adolescent male readers was conducted from a deficit perspective. This study explores the reading lives of boys who are positioned at the end of their K-12 public schooling career and are finishing their second year in IB (International …
What Should Professors Know About Expensive Textbooks?, Charlene Martoni
What Should Professors Know About Expensive Textbooks?, Charlene Martoni
All Things Open
Last year during Open Access Week, Georgia State University Library asked its students, "What should professors know about expensive textbooks?" and "What have you done when a textbook was too expensive?" Applying open pedagogical approaches, these questions were displayed on white boards at library service desks on each campus. Students were encouraged to respond to the first question in their own words, and they were asked to respond to the second question by selecting one of five responses. Responses were analyzed and anonymized, and they were then used in faculty professional development to demonstrate the local impact of expensive textbooks. …
A Framework For Teaching Computational Thinking In Primary Schools: A Namibian Case Study, Maria M. Ausiku, Machdel C. Matthee
A Framework For Teaching Computational Thinking In Primary Schools: A Namibian Case Study, Maria M. Ausiku, Machdel C. Matthee
The African Journal of Information Systems
Several professional development programs have been designed to train in-service teachers on a computational thinking (CT) curriculum, but few researchers have examined how these affect primary school teachers' self-efficacy and knowledge of CT in emerging economies. This study's objective was to create a framework for the professional development of primary school in-service teachers for the teaching of CT (referred to as professional development for primary computational thinking - PD4PCT) to be integrated into teachers' professional development programs. An initial framework was refined after implementing it at a Namibian school with a group of 14 teachers from five different disciplines (social …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Upper Elementary Teacher, Instructional Technology Coach, And Administrator Experiences With Technology Integration During Covid-19 Related School Closures: A Phenomenography, Amber Gravitt
Doctor of Education in Instructional Technology Dissertations
The purpose of this phenomenographic research was to qualitatively examine the experiences of teachers, instructional technology coaches, and administrators of technology integration during the emergency remote teaching (ERT) phase of the COVID-19 related school closures. Twelve participants were interviewed using a semi-structured interview approach to gather information about their experiences of ERT using Moorhouse and Wong’s Phases to Innovation in Response to Crisis framework. An adapted phenomenographic data analysis approach was used to analyze the unique experiences of each participant group. Initially, teachers only used the technologies they were comfortable with and had used prior to school closures, but as …
Introduction To International Business, Rajaram Veliyath
Introduction To International Business, Rajaram Veliyath
KSU Distinguished Course Repository
An introduction to the global business environment, this course examines the discrete and interactive effects of the geographic, historical, sociocultural, political/legal, economic and technological forces that shape business activities across borders and their consequences.
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
An Interdisciplinary Approach To Experiential Learning In Cyberbiosecurity And Agriculture Through Workforce Development, Kellie Johnson, Tiffany Drape, Joseph Oakes, Joseph Simpson, Ann Brown, Donna M. Westfall-Rudd, Susan Duncan
Journal of Cybersecurity Education, Research and Practice
Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often do not include training in cyber-related concepts or expose the ‘hidden curriculum’ of seeking internships and jobs. Exposing students through workforce development training and hands-on engagement with industry professionals can provide learning opportunities to bridge the two and is an area of growth and demand as the workforce evolves. The objectives of this work were 1) to learn key concepts in cybersecurity, including data security, visualization, and analysis, to …
Fin4260 Short-Term Financial Management, Yannick J. Roger Post
Fin4260 Short-Term Financial Management, Yannick J. Roger Post
KSU Distinguished Course Repository
This short-term financial management course is an elective for upper level, undergraduate finance majors. It focuses on working capital and treasury management topics that are vital for anyone interested in a career in corporate finance.
Short-term financial management refers to the utilization of the firm’s current assets and liabilities in order to maximize shareholder wealth and reduce financial risk. This course begins by reviewing the time value of money concepts, and the basics of financial statement analysis. The focus then shifts to short-term operating assets and short-term operating liabilities, and a discussion of the cash conversion cycle and the importance …
Understanding How To Diversify The Cybersecurity Workforce: A Qualitative Analysis, Maria Chaparro Osman Dr., Maureen Namukasa, Cherrise Ficke, Isabella Piasecki, Tj Oconnor Dr., Meredith Carroll Dr.
Understanding How To Diversify The Cybersecurity Workforce: A Qualitative Analysis, Maria Chaparro Osman Dr., Maureen Namukasa, Cherrise Ficke, Isabella Piasecki, Tj Oconnor Dr., Meredith Carroll Dr.
Journal of Cybersecurity Education, Research and Practice
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African Americans, and Hispanics remaining underrepresented in educational and professional settings. Using a qualitative approach, this work sought to investigate what led underrepresented minorities currently involved in cybersecurity to the industry, with the goal of determining methods to attract and diversify the workforce. A thematic analysis was conducted using …
Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd
Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd
Journal of Cybersecurity Education, Research and Practice
This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are “general purpose” units (i.e., municipalities, counties, towns and townships). On average, these governments do not practice cybersecurity effectively (Norris, et al., 2019 and 2020). One possible reason is that they do not adopt and/or implement highly recommended cybersecurity policies. In this paper, we examine local government adoption or lack of adoption of cybersecurity policies using data from three surveys. …
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen
Integrating Certifications Into The Cybersecurity College Curriculum: The Efficacy Of Education With Certifications To Increase The Cybersecurity Workforce, Binh Tran, Karen C. Benson, Lorraine Jonassen
Journal of Cybersecurity Education, Research and Practice
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An un-tapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education is a 3-tiered approach to quickly escalate the student into a workplace-ready graduate. The analogy used is a three-legged-stool, where curriculum content, hands-on skills, and certifications are equal instruments in the edification of the cybersecurity student. This paper endeavors to delve into the 3rd leg of …
Exploring Network Security Educator Knowledge, Jennifer B. Chauvot, Deniz Gurkan, Cathy Horn
Exploring Network Security Educator Knowledge, Jennifer B. Chauvot, Deniz Gurkan, Cathy Horn
Journal of Cybersecurity Education, Research and Practice
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's levels in higher education. Network security units are components of computer science curricula in high school contexts as well. Educators who teach these concepts play a significant role in developing a skilled workforce of network security experts for both governmental and non-governmental organizations. Understanding the necessary knowledge and skills of network …
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Journal of Cybersecurity Education, Research and Practice
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …
Cybersecurity Challenges And Awareness Of The Multi-Generational Learners In Nepal, Raj Kumar Dhungana, Lina Gurung Dr, Hem Poudyal
Cybersecurity Challenges And Awareness Of The Multi-Generational Learners In Nepal, Raj Kumar Dhungana, Lina Gurung Dr, Hem Poudyal
Journal of Cybersecurity Education, Research and Practice
Increased exposure to technologies has lately emerged as one of the everyday realities of digital natives, especially K-12 students, and teachers, the digital immigrants. Protection from cybersecurity risks in digital learning spaces is a human right, but students are increasingly exposed to high-risk cyberspace without time to cope with cybersecurity risks. This study, using a survey (N-891 students and 157 teachers) and in-depth interviews (27 students and 14 teachers), described the students' cybersecurity-related experiences and challenges in Nepal. This study revealed that the school’s cybersecurity support system is poor and teachers has very low awareness and competencies to protect students …
A Mixed-Method Study Exploring Cyber Ranges And Educator Motivation, Cheryl Beauchamp, Holly M. Matusovich
A Mixed-Method Study Exploring Cyber Ranges And Educator Motivation, Cheryl Beauchamp, Holly M. Matusovich
Journal of Cybersecurity Education, Research and Practice
A growing number of academic institutions have invested resources to integrate cyber ranges for applying and developing cybersecurity-related knowledge and skills. Cyber range developers and administrators provided much of what is known about cyber range resources and possible educational applications; however, the educator provides valuable understanding of the cyber range resources they use, how they use them, what they value, and what they do not value. This study provides the cyber range user perspective of cyber ranges in cybersecurity education by describing how K-12 educators are motivated using cyber ranges. Using mixed methods, this study explored educator motivation associated with …
Trauma-Informed Educational Leadership: A Case Study, Robyn Scott
Trauma-Informed Educational Leadership: A Case Study, Robyn Scott
Doctor of Education in Educational Leadership Dissertations
This research study offers an exploratory examination into the lived experiences of educational leaders managing the implementation and facilitation of Trauma-Skilled Schools (TSS) in the post-COVID-19 pandemic context. This study details the unique challenges and opportunities experienced while planning and executing TSS, aiming to equip school staff to better address trauma-affected behaviors. Utilizing case study methods, including in-depth interviews and document analysis, this research uncovers practices, strategies, and challenges, offering an insider's perspective on leading TSS initiatives. Findings indicate a necessity for comprehensive, job-embedded professional learning, continuous support from educational leadership, and organizational change in school policy, practice, and mindset, …
Cue The Paralinguistics: A Qualitative Case Study Of Teacher Social Presence, Molly R. Bowden
Cue The Paralinguistics: A Qualitative Case Study Of Teacher Social Presence, Molly R. Bowden
Doctor of Education in Instructional Technology Dissertations
The purpose of this qualitative case study was to understand teachers’ rationale and practices as they establish a social presence in a 100% online learning environment in a high school setting, with a specific emphasis on paralinguistic cues and symbols, such as emoji, emoticons, and Bitmoji. This case study focused on the meaning and understanding of teacher social presence in the virtual setting, utilizing a variety of data collection methods. In-depth interviews were conducted, followed by digital document collection and a focus group interview; transcripts of both interviews and the focus group were analyzed in order to establish the specific …
A Case Study Of Shifting To A Four-Day Student School Week As A Response To The Covid-19 Pandemic And Its Impact On Teacher Job Satisfaction And Retention, Melanie Hyde
Doctor of Education in Educational Leadership Dissertations
This study examines the lived experiences of elementary teachers in a rural school district in Northwest Georgia that shifted to a four-day student week, Tuesday-Friday, as a response to the COVID-19 pandemic. When schools shut down due to COVID-19 in March 2020, it launched a new wave of educators walking out the door nationwide, further impacting an already existing problem of teacher shortages. Situated literature has traditionally pointed to a four-day student schedule due to budget cuts and financial gain. This study provides insight from teacher and school leader perceptions through interviews on how shifting to a modified calendar impacted …