Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Entire DC Network

Successful Strategies Of Small Business Owners To Recruit Veterans, Michelle Duncan Jan 2018

Successful Strategies Of Small Business Owners To Recruit Veterans, Michelle Duncan

Walden Dissertations and Doctoral Studies

Approximately 300,000 highly skilled veterans leave military service every year, yet some small business owners lack strategies to recruit these skilled workers. The specific business problem addressed in this multiple case study was that some small information technology business leaders lack strategies to recruit military veterans. The research sample included 3 owners of small businesses serving the information technology industry in the mid-Atlantic region of the United States who developed and implemented successful strategies for recruiting veterans. Data were collected from interviews and review of documents. Data analysis resulted in the identification of 3 major themes: understanding of veterans as …


Managerial Strategies Small Businesses Use To Prevent Cybercrime, Doreen Lynn Maahs Jan 2018

Managerial Strategies Small Businesses Use To Prevent Cybercrime, Doreen Lynn Maahs

Walden Dissertations and Doctoral Studies

Estimated worldwide losses due to cybercrime are approximately $375-575 billion annually, affecting governments, business organizations, economies, and society. With globalization on the rise, even small businesses conduct transactions worldwide through the use of information technology (IT), leaving these small businesses vulnerable to the intrusion of their networks. The purpose of this multiple case study was to explore the managerial strategies of small manufacturing business owners to protect their financial assets, data, and intellectual property from cybercrime. The conceptual framework was systems thinking and action theory. Participants included 4 small manufacturing business owners in the midwestern region of the United States. …


Risk Management Strategies To Prevent And Mitigate Emerging Operational Security Threats, Nancy Page Larrimore Jan 2018

Risk Management Strategies To Prevent And Mitigate Emerging Operational Security Threats, Nancy Page Larrimore

Walden Dissertations and Doctoral Studies

Dependence on technology brings security compromises that have become a global threat that costs businesses millions of dollars. More than 7.6 million South Carolinians incurred effects from the 162 security breaches reported in 2011-2015. The purpose of this multiple case study was to explore the risk management strategies small business leaders use to prevent and mitigate operational security threats that produce financial losses. The population for this study consisted of 6 business leaders in South Carolina who have demonstrated successful experience in preventing and mitigating operational security threats. Transformational leadership theory provided the conceptual framework for exploring the overreaching research …


Strategies For Hiring Skilled Furniture Manufacturing Workers, Michael L. Simmons Jan 2018

Strategies For Hiring Skilled Furniture Manufacturing Workers, Michael L. Simmons

Walden Dissertations and Doctoral Studies

In April 2013, the U.S. unemployment rate was 7.6% and did not drop as quickly in the recent recession as in past recessions. The Unemployment and Job Creation Program study informed readers that many employers could not find qualified workers. The purpose of this qualitative multiple case study was to explore hiring managers' strategies to locate and hire skilled workers in the furniture manufacturing industry. The target sample included 3 furniture manufacturers located in Huntsville, Alabama who have successfully developed and implemented strategies for hiring skilled workers. The skill shortage theory was the conceptual framework for this study. In the …


Strategies For Improving Contractors' Defense Acquisition Cost Estimates, Kenneth Peters Jan 2018

Strategies For Improving Contractors' Defense Acquisition Cost Estimates, Kenneth Peters

Walden Dissertations and Doctoral Studies

In 2015, private sector Department of Defense (DoD) contractors experienced decreasing profit margins by approximately 8% and an increase in estimated costs of approximately 250%. The purpose of this multicase study was to explore strategies used by business leaders of private sector contractors for DoD capacity-building projects to accurately estimate program costs to improve profitability. The target population for this study was business leaders of DoD capacity-building program contractors with successful experience improving cost-estimation processes and strategies in Southeast Asia and the former Soviet Union. The conceptual framework for this study was business process quality management with a supporting framework …


An Autoethnographic Examination Of Personal And Organizational Transformation In The U.S. Military, Marjon K. John Jan 2018

An Autoethnographic Examination Of Personal And Organizational Transformation In The U.S. Military, Marjon K. John

Walden Dissertations and Doctoral Studies

Large-scale transformational change, such as the integration and acceptance of gays in the U.S. military, necessitates a long-term effort by management to mitigate unanticipated consequences. Suboptimal implementation may not account for damaging consequences among individuals expected to live the change. The purpose of this autoethnographic study was to examine the individual experiences of a closeted gay personnel member living through a transformational change in identity, which paralleled an organizational change in the U.S. Department of Defense (DoD). The conceptual framework included elements of general systems theory, Kotter's theory of change management, Ostroff's change management for government, and Maslow's self-actualization theory. …


Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi Jan 2018

Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi

Walden Dissertations and Doctoral Studies

Productivity loss occurs in organizations that experience high levels of personal Internet use by employees on company time, which includes employees using smartphones to surf without needing the firm's Internet connection. The purpose of this qualitative phenomenological study was to explore reliable ways for organizational leaders to monitor or limit their employees' use of smartphone technology for personal use (cyberloafing) while on the job to minimize wasted work time. Social cognitive theory, which includes an emphasis on human behavioral changes based upon the environment, people, and behavior, served as the conceptual framework. The general research question was as follows: How …


Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii Jan 2018

Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii

Walden Dissertations and Doctoral Studies

The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The …


Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster Jan 2018

Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster

Walden Dissertations and Doctoral Studies

Every year, several documented data breaches happen in the United States, resulting in the exposure of millions of electronic records. The purpose of this single-case study was to explore strategies some information technology managers used to monitor employees and reduce internal theft and loss. The population for this study consisted of 5 information technology managers who work within the field of technology in the southwestern region of the United States. Participants were selected using purposeful sampling. The conceptual framework for this study included elements from information and communication boundary theories. Data were collected from semistructured interviews, company standard operating procedures, …


Customer Relationship Management In The E-Retailing Environment, Nikki R. Hicks Jan 2018

Customer Relationship Management In The E-Retailing Environment, Nikki R. Hicks

Walden Dissertations and Doctoral Studies

Small business enterprise (SBE) managers often lack resources, expertise, and impact when selling in an online environment. SBEs can overcome increased competition by adopting customer relationship management (CRM) into their business model for survival and longevity. Using the conceptual framework technology, organization, environment (TOE), this multiple case study explored effective marketing strategies that small store retail managers use to successfully sell apparel and accessories in online markets. The study population included leaders from independent small online retail enterprises with brick-and-mortar stores located in the Central, Tri-Cities, or Southside areas in Virginia. The data collection process included semistructured, on-site interviews of …