{"response":{"docs":[{"system_create_dtsi":"2018-08-21T17:13:47Z","system_modified_dtsi":"2019-06-06T15:05:26Z","has_model_ssim":["Article"],"id":"8336h280j","accessControl_ssim":["b1163735-415b-497a-981d-c769f24922e5"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Automated Reporting System for Funding and Grants Tracking for Juvenile Correctional Programs"],"date_uploaded_dtsi":"2018-08-21T17:13:47Z","date_modified_dtsi":"2019-05-23T18:37:11Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2S690"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Information Technology Research Symposium"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Evidence-Based IT","Information Technology"],"description_tesim":["Proceedings of the 2018 Information Technology Research Symposium"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-10"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["0p096768r"],"member_of_collections_ssim":["2018 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["f4752h512"],"file_set_ids_ssim":["0p096768r"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"AUTOMATED REPORTING SYSTEM FOR FUNDING AND GRANTS TRACKING FOR JUVENILE CORRECTIONAL PROGRAMS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["f4752h512"],"nesting_collection__parent_ids_ssim":["f4752h512"],"nesting_collection__pathnames_ssim":["f4752h512/8336h280j"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697107518674698240,"timestamp":"2021-04-15T11:57:32.740Z","score":0.00049999997},{"system_create_dtsi":"2018-05-25T11:19:52Z","system_modified_dtsi":"2019-06-06T15:15:25Z","has_model_ssim":["StudentWork"],"id":"8623hz13r","accessControl_ssim":["87a922cd-a1d3-491e-9740-5ae2382314ac"],"hasRelatedMediaFragment_ssim":["pv63g0609"],"hasRelatedImage_ssim":["pv63g0609"],"depositor_ssim":["nguye3tp@mail.uc.edu"],"depositor_tesim":["nguye3tp@mail.uc.edu"],"title_tesim":["How Society is Racialized in America: A Content Analysis on Sherman Alexie’s  The Absolutely True Diary of a Part-Time Indian"],"date_uploaded_dtsi":"2018-05-25T11:20:04Z","date_modified_dtsi":"2019-05-23T15:23:26Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C20D75"],"alternate_title_tesim":["Content Analysis of Young Adult Novel Inspires Strategy For Teaching Students About Racialization in America"],"geo_subject_tesim":["Cincinnati, Ohio"],"advisor_tesim":["Sulzer, Mark"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Secondary Education English Language Arts"],"genre_tesim":["Poster"],"required_software_tesim":["Microsoft Office"],"creator_tesim":["Nguyen, Thao"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Young Adult Literature","Racism","Race","Education"],"language_tesim":["English"],"description_tesim":["This research explores race related issues within Sherman Alexie's novel The Absolutely True Diary of a Part-Time Indian to generalize how race and racism is portrayed between different races within America, in this case Native Americans and white Americans. From there, the research presents the need to present these racial aspects through high school classroom instructions in order to raise awareness of race in secondary education. This research was presented at University of Cincinnati's 2018 Scholarly Showcase and was awarded in Top 25 poster presentation at the showcase."],"license_tesim":["http://creativecommons.org/licenses/by/4.0/"],"date_created_tesim":["2017-12-14"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["fj236245z","pv63g0609"],"file_set_ids_ssim":["fj236245z","pv63g0609"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"HOW SOCIETY IS RACIALIZED IN AMERICA A CONTENT ANALYSIS ON SHERMAN ALEXIES THE ABSOLUTELY TRUE DIARY OF A PARTTIME INDIAN","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["nguye3tp@mail.uc.edu"],"nesting_collection__pathnames_ssim":["8623hz13r"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697089809488543744,"timestamp":"2021-04-15T07:16:03.943Z","score":0.00049999997},{"system_create_dtsi":"2018-04-26T20:01:57Z","system_modified_dtsi":"2019-06-06T15:15:16Z","has_model_ssim":["Article"],"id":"cf95jb826","accessControl_ssim":["ae090cbb-3308-497d-8ea3-2e13740a636b"],"hasRelatedMediaFragment_ssim":["1r66j162z"],"hasRelatedImage_ssim":["1r66j162z"],"depositor_ssim":["fengbn@mail.uc.edu"],"depositor_tesim":["fengbn@mail.uc.edu"],"title_tesim":["Developing Standardized Guidelines for Medical Virtual Reality Training"],"date_uploaded_dtsi":"2018-04-26T20:01:57Z","date_modified_dtsi":"2019-05-23T18:38:00Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C20Q3R"],"time_period_tesim":["21st Century"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Feng, Bowen"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Medical Training","Information Technology","Standardized Guideline","Virtual Reality"],"language_tesim":["English"],"description_tesim":["In the field of information technology, virtual reality and simulation learning have become huge trends, not only in gaming and entertainment, but also in academic fields such as medicine. In the past, medical training has always been costly in providing tools and resources for entry-level medical students to acquire proper training. Medical training conducted in a virtual environment has not only yielded higher success rates, but has also reduced resource costs overall. However, with no standardized guidelines for conducting certain training regimens and learning skills, there are still studies that show some medical training programs do not produce the best results. This research focuses on analyzing the usage of virtual reality in current medical training programs to design a medical, virtual reality, training program. This program will revolve around entry-level medical students who will be attending the University of Cincinnati’s College of Medicine. This research proposal will not only examine previous research on the utilization of virtual reality in various types of medical training, but also discuss the potential benefits of developing this training program at UC."],"license_tesim":["http://creativecommons.org/publicdomain/mark/1.0/"],"date_created_tesim":["2017-12-07"],"thumbnail_path_ss":"/downloads/1r66j162z?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["1r66j162z"],"file_set_ids_ssim":["1r66j162z"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DEVELOPING STANDARDIZED GUIDELINES FOR MEDICAL VIRTUAL REALITY TRAINING","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["fengbn@mail.uc.edu"],"nesting_collection__pathnames_ssim":["cf95jb826"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697106823269580800,"timestamp":"2021-04-15T11:46:29.550Z","score":0.00049999997},{"system_create_dtsi":"2018-02-22T20:25:38Z","system_modified_dtsi":"2019-06-06T15:04:00Z","has_model_ssim":["Article"],"id":"v979v3079","accessControl_ssim":["d50ac0f8-6346-4728-ab9e-05a0907d7e12"],"hasRelatedMediaFragment_ssim":["1r66j1174"],"hasRelatedImage_ssim":["1r66j1174"],"depositor_ssim":["lindsabn@mail.uc.edu"],"depositor_tesim":["lindsabn@mail.uc.edu"],"title_tesim":["Cyber Threats and Security for Small Business"],"date_uploaded_dtsi":"2018-02-22T20:25:37Z","date_modified_dtsi":"2018-02-22T20:25:37Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2W40T"],"required_software_tesim":[""],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"note_tesim":[""],"creator_tesim":["Lindsay, Brandon"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information Security","Information Technology"],"language_tesim":["English"],"description_tesim":["Currently, there are many threats to small businesses, from simple employee mishandling of sensitive data to hackers attempting to breach systems for consumer data. In this paper, I attempt to review what threats businesses are currently facing, current challenges to implementing a security program, and possible ways to implement a security solution.\r\n\tKeywords: Information Security, Cyber Security, Least Privilege, Risk Mitigation, Small Business, Trojan, Phishing, Malware, Ransomware, Skimmers, Security Program"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2017-12-04"],"thumbnail_path_ss":"/downloads/1r66j1174?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["1r66j1174"],"file_set_ids_ssim":["1r66j1174"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CYBER THREATS AND SECURITY FOR SMALL BUSINESS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["lindsabn@mail.uc.edu"],"nesting_collection__pathnames_ssim":["v979v3079"],"nesting_collection__deepest_nested_depth_isi":1,"_version_":1697096074763698176,"timestamp":"2021-04-15T08:55:38.976Z","score":0.00049999997},{"system_create_dtsi":"2017-10-27T03:48:07Z","system_modified_dtsi":"2019-06-06T15:09:24Z","has_model_ssim":["StudentWork"],"id":"bc387g050","accessControl_ssim":["8c9ab285-e5de-4bfb-8ec1-1baba1931605"],"hasRelatedMediaFragment_ssim":["bc387g068"],"hasRelatedImage_ssim":["bc387g068"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Development of a Database Program and Networking System For Seven Hills Neighborhood Houses"],"date_uploaded_dtsi":"2017-03-09T00:00:00Z","date_modified_dtsi":"2019-05-23T18:58:39Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2GG6T"],"advisor_tesim":["Stockman, Mark"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Engineering Technology"],"genre_tesim":["Report"],"note_tesim":["This work was originally published in the University of Cincinnati Digital Resouce Commons on 2014-07-31.\r\n36 pages\r\nLegacy Identifier: http://hdl.handle.net/2374.UC/733141.\r\nDevelopment of a Database Program and Networking System For Seven Hills Neighborhood Houses by Morrison, Matthew Edward was migrated from the University of Cincinnati Digital Resource Commons (Dspace 1.8.2) to Scholar@UC (Hydra/Fedora) in December 2016 by the Scholar@UC development team.\r\nThis work was originally submitted to the University of Cincinnati Digital Resource Commons: Submitted by Alphonzo Early (alphonzo.early@uc.edu) on 2014-07-31T18:52:00Z\r\n\r\nNo. of bitstreams: 2\r\n\r\nMorrison, M._B.S.I.E.T._2003.pdf: 1176525 bytes, checksum: 4d9928d343f489e3ac04522789340cdc (MD5)\r\n\r\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)--Made available in DSpace on 2014-07-31T18:52:00Z (GMT). No. of bitstreams: 2\r\n\r\nMorrison, M._B.S.I.E.T._2003.pdf: 1176525 bytes, checksum: 4d9928d343f489e3ac04522789340cdc (MD5)\r\n\r\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5). Submitted by Alphonzo Early (alphonzo.early@uc.edu) on 2014-07-31T18:52:00Z\r\n\r\nNo. of bitstreams: 2\r\n\r\nMorrison, M._B.S.I.E.T._2003.pdf: 1176525 bytes, checksum: 4d9928d343f489e3ac04522789340cdc (MD5)\r\n\r\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)--Made available in DSpace on 2014-07-31T18:52:00Z (GMT). No. of bitstreams: 2\r\n\r\nMorrison, M._B.S.I.E.T._2003.pdf: 1176525 bytes, checksum: 4d9928d343f489e3ac04522789340cdc (MD5)\r\n\r\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)"],"creator_tesim":["Morrison, Matthew Edward"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information technology"],"language_tesim":["English"],"description_tesim":["Submitted to the Faculty of the Information Engineering Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Information Engineering Technology  "],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2003-03-14"],"thumbnail_path_ss":"/downloads/bc387g068?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["bc387g08t","bc387g068","bc387g07j"],"member_of_collections_ssim":["CECH Information Engineering Technology Senior Design Projects"],"member_of_collection_ids_ssim":["bc3871882"],"file_set_ids_ssim":["bc387g08t","bc387g068","bc387g07j"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DEVELOPMENT OF A DATABASE PROGRAM AND NETWORKING SYSTEM FOR SEVEN HILLS NEIGHBORHOOD HOUSES","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["bc3871882"],"nesting_collection__parent_ids_ssim":["bc3871882"],"nesting_collection__pathnames_ssim":["bc3871882/bc387g050"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697128278798630912,"timestamp":"2021-04-15T17:27:31.137Z","score":0.00049999997},{"system_create_dtsi":"2017-10-27T03:47:57Z","system_modified_dtsi":"2019-06-06T15:07:43Z","has_model_ssim":["StudentWork"],"id":"bc387g01w","accessControl_ssim":["be836177-3664-4647-a457-2c583921bd63"],"hasRelatedMediaFragment_ssim":["bc387g025"],"hasRelatedImage_ssim":["bc387g025"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Make Education Fun!"],"date_uploaded_dtsi":"2017-03-09T00:00:00Z","date_modified_dtsi":"2017-03-10T00:00:00Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2M894"],"advisor_tesim":["Geonetta, Sam"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Engineering Technology"],"genre_tesim":["Report"],"note_tesim":["This work was originally published in the University of Cincinnati Digital Resouce Commons on 2014-07-30.\n37 pages\nLegacy Identifier: http://hdl.handle.net/2374.UC/733138.\nMake Education Fun! by Hufford, Jennifer M. was migrated from the University of Cincinnati Digital Resource Commons (Dspace 1.8.2) to Scholar@UC (Hydra/Fedora) in December 2016 by the Scholar@UC development team.\nThis work was originally submitted to the University of Cincinnati Digital Resource Commons: Submitted by Alphonzo Early (alphonzo.early@uc.edu) on 2014-07-30T18:43:53Z\n\nNo. of bitstreams: 2\n\nHufford.J_B.S.I.E.T_2006.pdf: 5860426 bytes, checksum: d67b8ee11aa440d68fb832ca7ea52cff (MD5)\n\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)--Made available in DSpace on 2014-07-30T18:43:53Z (GMT). No. of bitstreams: 2\n\nHufford.J_B.S.I.E.T_2006.pdf: 5860426 bytes, checksum: d67b8ee11aa440d68fb832ca7ea52cff (MD5)\n\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5). Submitted by Alphonzo Early (alphonzo.early@uc.edu) on 2014-07-30T18:43:53Z\n\nNo. of bitstreams: 2\n\nHufford.J_B.S.I.E.T_2006.pdf: 5860426 bytes, checksum: d67b8ee11aa440d68fb832ca7ea52cff (MD5)\n\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)--Made available in DSpace on 2014-07-30T18:43:53Z (GMT). No. of bitstreams: 2\n\nHufford.J_B.S.I.E.T_2006.pdf: 5860426 bytes, checksum: d67b8ee11aa440d68fb832ca7ea52cff (MD5)\n\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)"],"creator_tesim":["Hufford, Jennifer M."],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information technology"],"language_tesim":["en_US"],"description_tesim":["Submitted to the Faculty of the Information Engineering Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Information Engineering Technology  "],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2006-07-19"],"thumbnail_path_ss":"/downloads/bc387g025?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["bc387g03f","bc387g04q","bc387g025"],"member_of_collections_ssim":["CECH Information Engineering Technology Senior Design Projects"],"member_of_collection_ids_ssim":["bc3871882"],"file_set_ids_ssim":["bc387g03f","bc387g04q","bc387g025"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"MAKE EDUCATION FUN","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["bc3871882"],"nesting_collection__parent_ids_ssim":["bc3871882"],"nesting_collection__pathnames_ssim":["bc3871882/bc387g01w"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697128203675500544,"timestamp":"2021-04-15T17:26:19.494Z","score":0.00049999997},{"system_create_dtsi":"2017-10-27T03:47:47Z","system_modified_dtsi":"2019-06-06T15:06:05Z","has_model_ssim":["StudentWork"],"id":"bc387f97h","accessControl_ssim":["00ae7530-d6aa-477d-aee0-ac58036aa223"],"hasRelatedMediaFragment_ssim":["bc387f98s"],"hasRelatedImage_ssim":["bc387f98s"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Vietnam Tourism Promoting Web-site"],"date_uploaded_dtsi":"2017-03-09T00:00:00Z","date_modified_dtsi":"2017-03-10T00:00:00Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2R01K"],"advisor_tesim":["Wulf, Tom"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Engineering Technology"],"genre_tesim":["Report"],"note_tesim":["This work was originally published in the University of Cincinnati Digital Resouce Commons on 2014-07-30.\n28 pages\nLegacy Identifier: http://hdl.handle.net/2374.UC/733137.\nVietnam Tourism Promoting Web-site by Nguyen, Phuong was migrated from the University of Cincinnati Digital Resource Commons (Dspace 1.8.2) to Scholar@UC (Hydra/Fedora) in December 2016 by the Scholar@UC development team.\nThis work was originally submitted to the University of Cincinnati Digital Resource Commons: Submitted by Alphonzo Early (alphonzo.early@uc.edu) on 2014-07-30T18:40:13Z\n\nNo. of bitstreams: 2\n\nNguyen.P_B.S.I.E.T_2007.pdf: 4389427 bytes, checksum: 1be4dbe3ca12b4f10ba0a2165efde0db (MD5)\n\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)--Made available in DSpace on 2014-07-30T18:40:13Z (GMT). No. of bitstreams: 2\n\nNguyen.P_B.S.I.E.T_2007.pdf: 4389427 bytes, checksum: 1be4dbe3ca12b4f10ba0a2165efde0db (MD5)\n\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5). Submitted by Alphonzo Early (alphonzo.early@uc.edu) on 2014-07-30T18:40:13Z\n\nNo. of bitstreams: 2\n\nNguyen.P_B.S.I.E.T_2007.pdf: 4389427 bytes, checksum: 1be4dbe3ca12b4f10ba0a2165efde0db (MD5)\n\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)--Made available in DSpace on 2014-07-30T18:40:13Z (GMT). No. of bitstreams: 2\n\nNguyen.P_B.S.I.E.T_2007.pdf: 4389427 bytes, checksum: 1be4dbe3ca12b4f10ba0a2165efde0db (MD5)\n\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)"],"creator_tesim":["Nguyen, Phuong"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information technology"],"language_tesim":["en_US"],"description_tesim":["Submitted to the Faculty of the Information Engineering Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Information Engineering Technology  "],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2007-07-17"],"thumbnail_path_ss":"/downloads/bc387f98s?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["bc387f98s","bc387f992","bc387g00m"],"member_of_collections_ssim":["CECH Information Engineering Technology Senior Design Projects"],"member_of_collection_ids_ssim":["bc3871882"],"file_set_ids_ssim":["bc387f98s","bc387f992","bc387g00m"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"VIETNAM TOURISM PROMOTING WEBSITE","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["bc3871882"],"nesting_collection__parent_ids_ssim":["bc3871882"],"nesting_collection__pathnames_ssim":["bc3871882/bc387f97h"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697128270926970880,"timestamp":"2021-04-15T17:27:23.630Z","score":0.00049999997},{"system_create_dtsi":"2017-10-27T03:47:37Z","system_modified_dtsi":"2019-06-06T15:04:18Z","has_model_ssim":["StudentWork"],"id":"bc387f93d","accessControl_ssim":["bfae333c-9807-4fb7-b7e1-529aa64b5b7e"],"hasRelatedMediaFragment_ssim":["bc387f94p"],"hasRelatedImage_ssim":["bc387f94p"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["ADVANCE Informal Website"],"date_uploaded_dtsi":"2017-03-09T00:00:00Z","date_modified_dtsi":"2017-03-10T00:00:00Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2VP5X"],"advisor_tesim":["Said, Hazem"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Engineering Technology"],"genre_tesim":["Report"],"note_tesim":["This work was originally published in the University of Cincinnati Digital Resouce Commons on 2014-07-30.\n28 pages\nLegacy Identifier: http://hdl.handle.net/2374.UC/733136.\nADVANCE Informal Website by Bloodworth, Michael was migrated from the University of Cincinnati Digital Resource Commons (Dspace 1.8.2) to Scholar@UC (Hydra/Fedora) in December 2016 by the Scholar@UC development team.\nThis work was originally submitted to the University of Cincinnati Digital Resource Commons: Submitted by Alphonzo Early (alphonzo.early@uc.edu) on 2014-07-30T18:36:43Z\n\nNo. of bitstreams: 2\n\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)\n\nBloodworth.M_B.S.I.E.T_2008.pdf: 4271999 bytes, checksum: 0cef979aa82ad7beecb42f73e74a7f2b (MD5)--Made available in DSpace on 2014-07-30T18:36:43Z (GMT). No. of bitstreams: 2\n\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)\n\nBloodworth.M_B.S.I.E.T_2008.pdf: 4271999 bytes, checksum: 0cef979aa82ad7beecb42f73e74a7f2b (MD5). Submitted by Alphonzo Early (alphonzo.early@uc.edu) on 2014-07-30T18:36:43Z\n\nNo. of bitstreams: 2\n\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)\n\nBloodworth.M_B.S.I.E.T_2008.pdf: 4271999 bytes, checksum: 0cef979aa82ad7beecb42f73e74a7f2b (MD5)--Made available in DSpace on 2014-07-30T18:36:43Z (GMT). No. of bitstreams: 2\n\nlicense_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)\n\nBloodworth.M_B.S.I.E.T_2008.pdf: 4271999 bytes, checksum: 0cef979aa82ad7beecb42f73e74a7f2b (MD5)"],"creator_tesim":["Bloodworth, Michael"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information technology"],"language_tesim":["en_US"],"description_tesim":["Submitted to the Faculty of the Information Engineering Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Information Engineering Technology  "],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2008-06-08"],"thumbnail_path_ss":"/downloads/bc387f94p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["bc387f967","bc387f94p","bc387f95z"],"member_of_collections_ssim":["CECH Information Engineering Technology Senior Design Projects"],"member_of_collection_ids_ssim":["bc3871882"],"file_set_ids_ssim":["bc387f967","bc387f94p","bc387f95z"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"ADVANCE INFORMAL WEBSITE","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["bc3871882"],"nesting_collection__parent_ids_ssim":["bc3871882"],"nesting_collection__pathnames_ssim":["bc3871882/bc387f93d"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697128348658958336,"timestamp":"2021-04-15T17:28:37.761Z","score":0.00049999997},{"system_create_dtsi":"2017-10-27T03:47:27Z","system_modified_dtsi":"2019-06-06T15:15:23Z","has_model_ssim":["StudentWork"],"id":"bc387f89t","accessControl_ssim":["fbac5950-e8a4-4ae8-8f6c-c63a4de21c79"],"hasRelatedMediaFragment_ssim":["bc387f90k"],"hasRelatedImage_ssim":["bc387f90k"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Development of an Internet Jukebox System"],"date_uploaded_dtsi":"2017-03-09T00:00:00Z","date_modified_dtsi":"2017-03-09T00:00:00Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C20G6G"],"advisor_tesim":["McMahon, Russell E."],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Engineering Technology"],"genre_tesim":["Report"],"note_tesim":["This work was originally published in the University of Cincinnati Digital Resouce Commons on 2014-07-28. 29 pages Legacy Identifier: http://hdl.handle.net/2374.UC/733120. Development of an Internet Jukebox System by Mitchell, Keith was migrated from the University of Cincinnati Digital Resource Commons (Dspace 1.8.2) to Scholar@UC (Hydra/Fedora) in December 2016 by the Scholar@UC development team. This work was originally submitted to the University of Cincinnati Digital Resource Commons: Submitted by Alphonzo Early (alphonzo.early@uc.edu) on 2014-07-28T17:57:36Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5) Mitchell.K_B.S.I.E.T_2003.pdf: 9785709 bytes, checksum: ec1deab73172bc5df95ab8f5943658d8 (MD5)--Made available in DSpace on 2014-07-28T17:57:36Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5) Mitchell.K_B.S.I.E.T_2003.pdf: 9785709 bytes, checksum: ec1deab73172bc5df95ab8f5943658d8 (MD5). Submitted by Alphonzo Early (alphonzo.early@uc.edu) on 2014-07-28T17:57:36Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5) Mitchell.K_B.S.I.E.T_2003.pdf: 9785709 bytes, checksum: ec1deab73172bc5df95ab8f5943658d8 (MD5)--Made available in DSpace on 2014-07-28T17:57:36Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5) Mitchell.K_B.S.I.E.T_2003.pdf: 9785709 bytes, checksum: ec1deab73172bc5df95ab8f5943658d8 (MD5)"],"creator_tesim":["Mitchell, Keith"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information technology"],"language_tesim":["en_US"],"description_tesim":["Submitted to the Faculty of the Information Engineering Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Information Engineering Technology  "],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2003-06-11"],"thumbnail_path_ss":"/downloads/bc387f90k?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["bc387f90k","bc387f91v","bc387f924"],"member_of_collections_ssim":["CECH Information Engineering Technology Senior Design Projects"],"member_of_collection_ids_ssim":["bc3871882"],"file_set_ids_ssim":["bc387f90k","bc387f91v","bc387f924"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DEVELOPMENT OF AN INTERNET JUKEBOX SYSTEM","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["bc3871882"],"nesting_collection__parent_ids_ssim":["bc3871882"],"nesting_collection__pathnames_ssim":["bc3871882/bc387f89t"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697128304702652416,"timestamp":"2021-04-15T17:27:55.841Z","score":0.00049999997},{"system_create_dtsi":"2017-10-27T03:47:17Z","system_modified_dtsi":"2019-06-06T15:14:01Z","has_model_ssim":["StudentWork"],"id":"bc387f85q","accessControl_ssim":["dc8b3c1f-1030-482d-bfbd-c9a33b269428"],"hasRelatedMediaFragment_ssim":["bc387f88j"],"hasRelatedImage_ssim":["bc387f860"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["The Network Sniffer Database and Web Interface"],"date_uploaded_dtsi":"2017-03-09T00:00:00Z","date_modified_dtsi":"2017-03-09T00:00:00Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2460P"],"advisor_tesim":["McMahon, Russell E."],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Engineering Technology"],"genre_tesim":["Report"],"note_tesim":["This work was originally published in the University of Cincinnati Digital Resouce Commons on 2014-07-28. 41 pages Legacy Identifier: http://hdl.handle.net/2374.UC/733119. The Network Sniffer Database and Web Interface by Boehm, Anthony M. was migrated from the University of Cincinnati Digital Resource Commons (Dspace 1.8.2) to Scholar@UC (Hydra/Fedora) in December 2016 by the Scholar@UC development team. This work was originally submitted to the University of Cincinnati Digital Resource Commons: Submitted by Alphonzo Early (alphonzo.early@uc.edu) on 2014-07-28T17:54:05Z No. of bitstreams: 2 Boehm.A_B.S.I.E.T_2003.pdf: 6552505 bytes, checksum: 096d95317d01d12284353879e8c0f38c (MD5) license_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)--Made available in DSpace on 2014-07-28T17:54:06Z (GMT). No. of bitstreams: 2 Boehm.A_B.S.I.E.T_2003.pdf: 6552505 bytes, checksum: 096d95317d01d12284353879e8c0f38c (MD5) license_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5). Submitted by Alphonzo Early (alphonzo.early@uc.edu) on 2014-07-28T17:54:05Z No. of bitstreams: 2 Boehm.A_B.S.I.E.T_2003.pdf: 6552505 bytes, checksum: 096d95317d01d12284353879e8c0f38c (MD5) license_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)--Made available in DSpace on 2014-07-28T17:54:06Z (GMT). No. of bitstreams: 2 Boehm.A_B.S.I.E.T_2003.pdf: 6552505 bytes, checksum: 096d95317d01d12284353879e8c0f38c (MD5) license_rdf: 1232 bytes, checksum: bb87e2fb4674c76d0d2e9ed07fbb9c86 (MD5)"],"creator_tesim":["Boehm, Anthony M."],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Information technology"],"language_tesim":["en_US"],"description_tesim":["Submitted to the Faculty of the Information Engineering Technology Program in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Information Engineering Technology  "],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2003-06-05"],"thumbnail_path_ss":"/downloads/bc387f860?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["bc387f860","bc387f878","bc387f88j"],"member_of_collections_ssim":["CECH Information Engineering Technology Senior Design Projects"],"member_of_collection_ids_ssim":["bc3871882"],"file_set_ids_ssim":["bc387f860","bc387f878","bc387f88j"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"NETWORK SNIFFER DATABASE AND WEB INTERFACE","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["bc3871882"],"nesting_collection__parent_ids_ssim":["bc3871882"],"nesting_collection__pathnames_ssim":["bc3871882/bc387f85q"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697128256578256896,"timestamp":"2021-04-15T17:27:09.946Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Student Work","hits":485,"label":"Student Work"},{"value":"Article","hits":40,"label":"Article"},{"value":"Document","hits":11,"label":"Document"},{"value":"Image","hits":2,"label":"Image"},{"value":"Media","hits":2,"label":"Media"},{"value":"Dataset","hits":1,"label":"Dataset"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Library Service, CECH","hits":57,"label":"Library Service, CECH"},{"value":"Green-Schwartz, Clair","hits":8,"label":"Green-Schwartz, Clair"},{"value":"Information Technology Research Symposium","hits":6,"label":"Information Technology Research Symposium"},{"value":"Turner, Grant","hits":5,"label":"Turner, Grant"},{"value":"Gonen, Bilal","hits":4,"label":"Gonen, Bilal"},{"value":"DenBleyker, Emma","hits":3,"label":"DenBleyker, Emma"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Information technology","hits":225,"label":"Information technology"},{"value":"Information Technology","hits":32,"label":"Information Technology"},{"value":"Cyber Security","hits":4,"label":"Cyber Security"},{"value":"Economics","hits":3,"label":"Economics"},{"value":"Evidence-Based IT","hits":3,"label":"Evidence-Based IT"},{"value":"Black Market","hits":2,"label":"Black Market"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":541,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Information Engineering Technology","hits":225,"label":"Information Engineering Technology"},{"value":"Information Technology","hits":171,"label":"Information Technology"},{"value":"CECH Library","hits":91,"label":"CECH Library"},{"value":"- School of Information Technology","hits":24,"label":"- School of Information Technology"},{"value":"School of Information Technology","hits":11,"label":"School of Information Technology"},{"value":"Impact Accelerator","hits":8,"label":"Impact Accelerator"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"en_US","hits":224,"label":"en_US"},{"value":"English","hits":40,"label":"English"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":469,"label":"University of Cincinnati"},{"value":"University of Cincinnnati","hits":2,"label":"University of Cincinnnati"},{"value":"Action Research","hits":1,"label":"Action Research"},{"value":"Grant W. Turner","hits":1,"label":"Grant W. Turner"},{"value":"IEEE","hits":1,"label":"IEEE"},{"value":"Le 'Wanda M. LaBoy","hits":1,"label":"Le 'Wanda M. LaBoy"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2020-04","hits":55,"label":"2020-04"},{"value":"2021-04","hits":44,"label":"2021-04"},{"value":"2019-04","hits":33,"label":"2019-04"},{"value":"2022-04","hits":30,"label":"2022-04"},{"value":"2020-04-14","hits":14,"label":"2020-04-14"},{"value":"2005-06-02","hits":13,"label":"2005-06-02"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"bc3871882","hits":225,"label":"bc3871882"},{"value":"7d278v66w","hits":52,"label":"7d278v66w"},{"value":"bc3888732","hits":42,"label":"bc3888732"},{"value":"xw42n9511","hits":41,"label":"xw42n9511"},{"value":"1r66j276h","hits":38,"label":"1r66j276h"},{"value":"vq27zp836","hits":37,"label":"vq27zp836"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":541,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":24,"next_page":25,"prev_page":23,"total_pages":55,"limit_value":10,"offset_value":230,"total_count":541,"first_page?":false,"last_page?":false}}}