{"response":{"docs":[{"system_create_dtsi":"2018-08-21T17:31:06Z","system_modified_dtsi":"2019-05-23T18:31:56Z","has_model_ssim":["Article"],"id":"z603qz33r","accessControl_ssim":["d7ec4f0b-f18f-46f4-9318-977571c0dae5"],"hasRelatedMediaFragment_ssim":["s7526d34d"],"hasRelatedImage_ssim":["s7526d34d"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["To Post, Or Not To Post? Exploring Adjunct Faculty And Staff Social Media Use Among Collapsed Audiences"],"date_uploaded_dtsi":"2018-08-21T17:31:04Z","date_modified_dtsi":"2019-05-23T18:31:56Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Information Technology Research Symposium"],"description_tesim":["Proceedings of the 2018 Information Technology Research Symposium"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-10"],"thumbnail_path_ss":"/downloads/s7526d34d?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["s7526d34d"],"member_of_collections_ssim":["2018 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["f4752h512"],"file_set_ids_ssim":["s7526d34d"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"TO POST OR NOT TO POST EXPLORING ADJUNCT FACULTY AND STAFF SOCIAL MEDIA USE AMONG COLLAPSED AUDIENCES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["f4752h512"],"nesting_collection__parent_ids_ssim":["f4752h512"],"nesting_collection__pathnames_ssim":["f4752h512/z603qz33r"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697107519467421696,"timestamp":"2021-04-15T11:57:33.496Z","score":0.00049999997},{"system_create_dtsi":"2018-08-21T17:31:05Z","system_modified_dtsi":"2019-05-23T18:33:27Z","has_model_ssim":["Article"],"id":"9p290b11q","accessControl_ssim":["2c5ee55b-97d5-4006-9115-76c6f6c546d9"],"hasRelatedMediaFragment_ssim":["ws859g54r"],"hasRelatedImage_ssim":["ws859g54r"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Guidelines for Establishing A Software Support Practice"],"date_uploaded_dtsi":"2018-08-21T17:31:04Z","date_modified_dtsi":"2019-05-23T18:33:27Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Information Technology Research Symposium"],"description_tesim":["Proceedings of the 2018 Information Technology Research Symposium"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-10"],"thumbnail_path_ss":"/downloads/ws859g54r?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["ws859g54r"],"member_of_collections_ssim":["2018 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["f4752h512"],"file_set_ids_ssim":["ws859g54r"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"GUIDELINES FOR ESTABLISHING A SOFTWARE SUPPORT PRACTICE","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["f4752h512"],"nesting_collection__parent_ids_ssim":["f4752h512"],"nesting_collection__pathnames_ssim":["f4752h512/9p290b11q"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697107519882657792,"timestamp":"2021-04-15T11:57:33.892Z","score":0.00049999997},{"system_create_dtsi":"2018-08-21T17:31:04Z","system_modified_dtsi":"2019-05-23T18:35:32Z","has_model_ssim":["Article"],"id":"8k71nh914","accessControl_ssim":["2c9da20c-c5b7-4c1d-af13-e0bcf597a3aa"],"hasRelatedMediaFragment_ssim":["5d86p105p"],"hasRelatedImage_ssim":["5d86p105p"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Virtual Reality, Children, and Dinosaurs"],"date_uploaded_dtsi":"2018-08-21T17:31:04Z","date_modified_dtsi":"2019-05-23T18:35:32Z","isPartOf_ssim":["admin_set/default"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Information Technology Research Symposium"],"description_tesim":["Proceedings of the 2018 Information Technology Research Symposium"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-10"],"thumbnail_path_ss":"/downloads/5d86p105p?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["5d86p105p"],"member_of_collections_ssim":["2018 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["f4752h512"],"file_set_ids_ssim":["5d86p105p"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"VIRTUAL REALITY CHILDREN AND DINOSAURS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["f4752h512"],"nesting_collection__parent_ids_ssim":["f4752h512"],"nesting_collection__pathnames_ssim":["f4752h512/8k71nh914"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697107520289505280,"timestamp":"2021-04-15T11:57:34.280Z","score":0.00049999997},{"system_create_dtsi":"2018-08-21T17:13:49Z","system_modified_dtsi":"2019-06-06T15:14:54Z","has_model_ssim":["Article"],"id":"9z9030736","accessControl_ssim":["73b4650a-ac58-4a14-b4d7-c166a6d2c267"],"hasRelatedMediaFragment_ssim":["kd17ct67q"],"hasRelatedImage_ssim":["kd17ct67q"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["A Virtual Wisdom Mining ‘Pan’ For Connecting Retired Experts With Currently Active Professionals"],"date_uploaded_dtsi":"2018-08-21T17:13:47Z","date_modified_dtsi":"2019-05-23T18:36:00Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C21Q32"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Information Technology Research Symposium"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Evidence-Based IT","Information Technology"],"description_tesim":["Proceedings of the 2018 Information Technology Research Symposium"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-10"],"thumbnail_path_ss":"/downloads/kd17ct67q?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["kd17ct67q"],"member_of_collections_ssim":["2018 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["f4752h512"],"file_set_ids_ssim":["kd17ct67q"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"VIRTUAL WISDOM MINING PAN FOR CONNECTING RETIRED EXPERTS WITH CURRENTLY ACTIVE PROFESSIONALS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["f4752h512"],"nesting_collection__parent_ids_ssim":["f4752h512"],"nesting_collection__pathnames_ssim":["f4752h512/9z9030736"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697107518332862464,"timestamp":"2021-04-15T11:57:32.414Z","score":0.00049999997},{"system_create_dtsi":"2018-08-21T17:13:48Z","system_modified_dtsi":"2019-06-06T15:03:30Z","has_model_ssim":["Article"],"id":"th83m0384","accessControl_ssim":["3714120a-b195-42d4-bc18-351e9565d28c"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["DoD Requirements Toolkit for Manufactures"],"date_uploaded_dtsi":"2018-08-21T17:13:47Z","date_modified_dtsi":"2019-05-23T18:36:45Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2X12V"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Information Technology Research Symposium"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Evidence-Based IT","Information Technology"],"description_tesim":["Proceedings of the 2018 Information Technology Research Symposium"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-10"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["pr76f434n"],"member_of_collections_ssim":["2018 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["f4752h512"],"file_set_ids_ssim":["pr76f434n"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"DOD REQUIREMENTS TOOLKIT FOR MANUFACTURES","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["f4752h512"],"nesting_collection__parent_ids_ssim":["f4752h512"],"nesting_collection__pathnames_ssim":["f4752h512/th83m0384"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697107518998708224,"timestamp":"2021-04-15T11:57:33.049Z","score":0.00049999997},{"system_create_dtsi":"2018-08-21T17:13:47Z","system_modified_dtsi":"2019-06-06T15:05:26Z","has_model_ssim":["Article"],"id":"8336h280j","accessControl_ssim":["b1163735-415b-497a-981d-c769f24922e5"],"depositor_ssim":["kropczjn@ucmail.uc.edu"],"depositor_tesim":["kropczjn@ucmail.uc.edu"],"title_tesim":["Automated Reporting System for Funding and Grants Tracking for Juvenile Correctional Programs"],"date_uploaded_dtsi":"2018-08-21T17:13:47Z","date_modified_dtsi":"2019-05-23T18:37:11Z","isPartOf_ssim":["admin_set/default"],"doi_tesim":["doi:10.7945/C2S690"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["School of Information Technology"],"creator_tesim":["Information Technology Research Symposium"],"publisher_tesim":["University of Cincinnati"],"subject_tesim":["Evidence-Based IT","Information Technology"],"description_tesim":["Proceedings of the 2018 Information Technology Research Symposium"],"license_tesim":["http://rightsstatements.org/vocab/InC/1.0/"],"date_created_tesim":["2018-04-10"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["0p096768r"],"member_of_collections_ssim":["2018 Information Technology Research Symposium"],"member_of_collection_ids_ssim":["f4752h512"],"file_set_ids_ssim":["0p096768r"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"AUTOMATED REPORTING SYSTEM FOR FUNDING AND GRANTS TRACKING FOR JUVENILE CORRECTIONAL PROGRAMS","human_readable_type_tesim":["Article"],"read_access_group_ssim":["public"],"edit_access_person_ssim":["kropczjn@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["f4752h512"],"nesting_collection__parent_ids_ssim":["f4752h512"],"nesting_collection__pathnames_ssim":["f4752h512/8336h280j"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697107518674698240,"timestamp":"2021-04-15T11:57:32.740Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Article","hits":6,"label":"Article"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Information Technology Research Symposium","hits":6,"label":"Information Technology Research Symposium"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Evidence-Based IT","hits":3,"label":"Evidence-Based IT"},{"value":"Information Technology","hits":3,"label":"Information Technology"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":6,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"School of Information Technology","hits":6,"label":"School of Information Technology"}],"label":"Department Sim"},{"name":"language_sim","items":[],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":3,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2018-04-10","hits":6,"label":"2018-04-10"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"f4752h512","hits":6,"label":"f4752h512"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":6,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":6,"first_page?":true,"last_page?":true}}}