Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
used to fill adjunct vacancies as they occur. Until you hear from a representative of the Department of Mathematics and Statistics or the Office of HR Faculty, please continue to also apply directly to
-
information (e.g., job postings, events, updates) to be highlighted in reports and digital communications. Create simple data visualizations (charts, graphs, dashboards) to support reporting efforts. Research
-
. Essential Functions: 1.) Leadership Development Develop and implement leadership development cohort programs in line with inclusive leadership development theories and Engagement leadership competencies
-
to understand how Black undergraduate STEM students understand and engage Blackness in relationship to their STEM engagement and perspectives of racial equity in STEM. This project engages critical theories
-
. Presentations may include formal meetings with funders, academic conferences, PERIL workshops, and training. Contributes to innovations in research theory and methodology, ensuring PERIL’s work remains at
-
platforms. You'll build a core knowledge and bolster that with solid fundamentals in communication and media theory and research, writing, editing, and media production. Our graduate programs will build your
-
the practice and theory of clinical legal education. Many graduates of the Practitioner-in-Residence program (over 25) have gone on to tenure-track teaching positions at other law schools. Practitioners
-
hone your professional skills for audio, video, mobile, and online platforms. You'll build a core knowledge and bolster that with solid fundamentals in communication and media theory and research
-
theory and methodology, ensuring PERIL’s work remains at the forefront of the field. Responds to media inquiries and requests related to PERIL research, effectively communicating findings to the public and
-
offline content including conspiracy theories, mis/disinformation, propaganda, and supremacist ideologies. As an alternative to security-based approaches that rely on surveillance, censorship, and