Advanced Search
Display options
Filter resources
Text Availability
Article type
Publication date
Species
Language
Sex
Age
Showing 1 to 12 of 1320 entries
Sorted by: Best Match Show Resources per page
# ILookLikeAnEngineer: Using social media based hashtag activism campaigns as a lens to better understand engineering diversity issues

Broadening participation informal stem education

Handa R, Johri A, Karbasian H, Malik A.
GSID: TtbuLslYj4QJ
A Malik, A Johri, R Handa, H Karbasian… - arXiv preprint arXiv …, 2018 - arxiv.org

Each year, significant investment of time and resources is made to improve diversity within engineering across a range of federal and state agencies, private/not-for-profit organizations, and foundations. In spite of decades of investments, efforts have not yielded desired returns-participation...

Do birds of a feather shop together? The effects on performance of employees' similarity with one another and with customers

diversity

Joshi A, Leonard JS, Levine DI.
GSID: J9j5-UbuODMJ
JS Leonard, DI Levine, A Joshi - Journal of Organizational …, 2004 - Wiley Online Library

Theories have suggested that employee diversity can affect business performance both as a result of customer preferences and through changes of relations within the workplace. We …

Exploring framing and social learning in demonstration projects of carbon capture and storage

demonstration projects

Stephens JC, Markusson N, Ishii A.
GSID: moeF0KD5vfEJ
JC Stephens, N Markusson, A Ishii - Energy Procedia, 2011 - Elsevier

… Through a comparison of the structure, framing and socio-political context of three different CCS demonstration projects, this paper explores the complexity of social learning associated with demonstration projects. Variety in expectations of the demonstration projects' objectives, …

Reflecting on the impact of a course on inclusive strategies for teaching computer science

Science and "broadening participation"

Joshi A.
GSID: JCaFMJQodNoJ
A Joshi, A Jain - 2018 IEEE Frontiers in Education Conference …, 2018 - ieeexplore.ieee.org

… to broadening participation in computer science. Through our program, we have trained over 50 teachers in the greater Boise Metropolitan region, who have in turn taught over 1400 …

Helping Academically Talented STEM Students with Financial Need Succeed

NSF Scholarships in Science, Technology, Engineering, and Mathematics AND Program Evaluation

Doyle M, Joshi A, Kumar AN.
GSID: DnTMuYWuBMgJ
AN Kumar, M Doyle, V Hong, A Joshi… - 2021 IEEE Frontiers …, 2021 - ieeexplore.ieee.org

This Research to Practice Full Paper presents the experiences and lessons learned from five programs that provide financial awards and a holistic student support structure to low-income, academically talented students in Science, Technology, Engineering, and Mathematics (STEM). This report...

Adverse childhood experiences, family functioning, and resilience in military families: A pattern‐based approach

Asset based approaches STEM training

Lucier‐Greer M, O'neal CW, Oshri A.
GSID: ynlnXHY7k-IJ
A Oshri, M Lucier‐Greer, CW O'neal, AL Arnold… - Family …, 2015 - Wiley Online Library

… types (ie, a pattern-based approach), referring to a general systems … -based approach with the family as the main unit of analysis remain less common than individual-based approaches…

Situated engineering learning: Bridging engineering education research and the learning sciences

engineering education

Johri A.
GSID: au7nyqZX73cJ
A Johri, BM Olds - Journal of Engineering Education, 2011 - Wiley Online Library

… We begin with a brief review of the history of engineering education research. We then review research on learning more … engineering learning. Next, we discuss how learning sciences and engineering learning can mutually inform each other, in...

The social and political complexities of learning in carbon capture and storage demonstration projects

demonstration projects

Markusson N, Ishii A, Stephens JC.
GSID: I1QFRcUK1KMJ
N Markusson, A Ishii, JC Stephens - Global Environmental Change, 2011 - Elsevier

… -political context of three very different CCS demonstration projects in different places and contexts, this paper explores the complexity of social learning associated with demonstration projects. Variety in expectations of the demonstration projects’ objectives, learning processes, …

Managing workforce diversity to enhance cooperation in organizations

workforce diversity

Joshi A, Jackson SE.
GSID: R28dYUBuozcJ
A Joshi, SE Jackson - International handbook of organizational …, 2003 - books.google.com

… Based on social psychological theory, we argue that diversity in teams will be manifested in cooperative behaviors between teams in organizations. A second contribution of this chapter is to provide a framework for understanding how the demographic composition...

Learning in CCS demonstration projects

demonstration projects

Markusson N, Ishii A, Stephens JC.
GSID: gGzUrNsh6eAJ
N Markusson, A Ishii, JC Stephens - The social dynamics of …, 2012 - books.google.com

… This chapter first provides theoretical background on technology demonstration, social learning and framing relevant to CCS demonstration projects and describes the methodology of the comparative approach. Detailed descriptions of the three cases are followed by a …

Middleware for mobile information access

STEM education

Chakraborty D, Joshi A.
GSID: i1UWknA6wAoJ
D Chakraborty, F Perich, A Joshi… - … on Database and …, 2002 - ieeexplore.ieee.org

Mobile information access involves retrieving information from wired service providers. Often there are situations where the information is not available from a single service provider but …

Mining threat intelligence about open-source projects and libraries from code repository issues and bug reports

Louis Stokes Alliances for Minority Participation AND Program Evaluation

Joshi A, Mittal S.
GSID: 1ExXOpcp30sJ
L Neil, S Mittal, A Joshi - 2018 IEEE International Conference …, 2018 - ieeexplore.ieee.org

Open-Source Projects and Libraries are being used in software development while also bearing multiple security vulnerabilities. This use of third party ecosystem creates a new kind of attack surface for a product in development. An intelligent attacker can attack...

Showing 1 to 12 of 1320 entries