Search
Now showing items 141-150 of 153
GOAL SETTING AND UNETHICAL BEHAVIOR: IMPLICATIONS FOR OCCUPATIONAL SAFETY AND HEALTH AND THE SAFETY INCENTIVE PROGRAM
(East Carolina University, 2020-06-22)
Goal setting is a popular and often beneficial tool used to motivate workers worldwide. Recent research has revealed that negative side-effects including unethical behavior are associated with goal setting. In occupational ...
ESTIMATING EFFORT FOR LOW-CODE APPLICATIONS
(East Carolina University, 2020-06-22)
Two issues continually plaguing the software industry are software size calculation and project effort estimation. Incorrect estimates may lead to inappropriate allocation of resources (people), shortage of time, insufficient ...
MVC EDUCATION 3D : A FRAMEWORK FOR DISTANCE EDUCATION VIRTUAL REALITY APPLICATIONS
(East Carolina University, 2020-06-22)
Recent advancements in the online course delivery for Distance Education(DE) pro- gram is evolving from day-to-day. Though DE programs cost less and also provide exibility to students depending on their pace of learning, ...
Knowledge-Based Competencies Necessary for the Frontline Construction Supervisor : Improving Safety through Knowledge
(East Carolina University, 2012)
Evaluating supervisor competency levels has been a management challenge since the beginning of supervisory roles in the construction process. Supervisors perform a critical role in the workplace with respect to workplace ...
Data in Depth: Web 3-D Technologies Provide New Approaches to the Presentation of Course Content
(2010)
For nearly two decades, the Web has provided the
classroom with vast, ever-expanding volumes of browseraccessible
information. As the web has evolved so too has
our desire to become more involved with the process ...
Small Business Information Security
(East Carolina University, 2012)
Small businesses account for over fifty percent of the Gross National Product of the U.S. economy; and the security of their information systems is critical for them to operate, compete, and remain profitable. While many ...
MODELLING [sic] AND SIMULATION OF JAMMING ATTACKS IN WLAN
(East Carolina University, 2012)
Wireless local area networks (WLAN) are one of the most widely used technologies in our daily lives. Instead of being limited to the range of wired equipment, users can communicate freely. However, since wireless networks ...
Overhauling Legacy Enterprise Software Applications with a Concept Refinement Process Model
(East Carolina University, 2013)
Currently, there are many legacy enterprise software applications in active deployment that are outdated. These large legacy applications are rapidly becoming less practical for both the organizations they service, and for ...
Using n-grams to identify time periods of cultural influence
(East Carolina University, 2012)
An author's literary style is influenced by the cultural time period in which the author lives. The author's ideas, and the words chosen to express them, can help identify the cultural time period that most influenced the ...