Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 48

Full-Text Articles in Entire DC Network

Black Business Owners Overcoming Barriers In Texas, Henry Williams Jan 2018

Black Business Owners Overcoming Barriers In Texas, Henry Williams

Walden Dissertations and Doctoral Studies

Black entrepreneurs in the state of Texas reported that they did not achieve the same level of success as nonminority enterprises. Many Black entrepreneurs have obtained education from top tier institutions and have the managerial experiences, skills, and working knowledge that facilitate business success, but they are not able to sustain business growth. The purpose of this phenomenological study was to explore the lived experiences of Black Texan entrepreneurs. This research was established using the conceptual framework of human capital. The overarching research question concerned the lived experiences of Black Texas entrepreneurs who were not as successful in business as …


Management Strategies For Adopting Agile Methods Of Software Development In Distributed Teams, Igor A. Schtein Jan 2018

Management Strategies For Adopting Agile Methods Of Software Development In Distributed Teams, Igor A. Schtein

Walden Dissertations and Doctoral Studies

Between 2003 and 2015, more than 61% of U.S. software development teams failed to satisfy project requirements, budgets, or timelines. Failed projects cost the software industry an estimated 60 billion dollars. Lost opportunities and misused resources are often the result of software development leaders failing to implement appropriate methods for managing software projects. The purpose of this qualitative multiple case study was to explore strategies software development managers use in adopting Agile methodology in the context of distributed teams. The tenets of Agile approach are individual interaction over tools, working software over documentation, and collaboration over a contract. The conceptual …


Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi Jan 2018

Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi

Walden Dissertations and Doctoral Studies

Productivity loss occurs in organizations that experience high levels of personal Internet use by employees on company time, which includes employees using smartphones to surf without needing the firm's Internet connection. The purpose of this qualitative phenomenological study was to explore reliable ways for organizational leaders to monitor or limit their employees' use of smartphone technology for personal use (cyberloafing) while on the job to minimize wasted work time. Social cognitive theory, which includes an emphasis on human behavioral changes based upon the environment, people, and behavior, served as the conceptual framework. The general research question was as follows: How …


Equity Trading Evaluation Strategies In Switzerland After The European Mifid Ii, Linn Kristina Karstadt Jan 2018

Equity Trading Evaluation Strategies In Switzerland After The European Mifid Ii, Linn Kristina Karstadt

Walden Dissertations and Doctoral Studies

Swiss bank traders are affected by technological and regulatory challenges, which may affect their broker voting process and may result in a change of trading and evaluation behavior in 2018. Compounded challenges exist when broker evaluation strategies are not effective or Markets in Financial Instruments Directive (MiFID) II compliant. This qualitative, single case study, built on efficient capital market hypothesis and innovative disruption theory, was focused on effective broker evaluation strategies after MiFID II in Switzerland. The sample consisted of 4 buy-side traders, who shared their unique perspectives. Methodological triangulation was achieved through semistructured interviews, a review of the institution's …


Information Technology Infrastructure: Global Economy And National Development In Haiti, Reynolds Alcena Jan 2018

Information Technology Infrastructure: Global Economy And National Development In Haiti, Reynolds Alcena

Walden Dissertations and Doctoral Studies

Political and environmental chaos recently experienced in Haiti has damaged the economic sector and telecommunication infrastructure. Developmental data from Haiti show 3 major trends: inadequate social and economic development, insufficient benefits from the global economy, and poorly planned information technology infrastructure (ITI). The specific problem addressed in this study is a knowledge gap in the views of stakeholders within Haiti's national culture on how the country's ITI can be developed to better engage Haiti in 21st century global and digital economy. The purpose of this qualitative case study was to explore the views of 48 expert participants regarding ITI development …


The Relationship Between Leadership Style And Cognitive Style To Software Project Success, Jacquelyne L. Wilson Jan 2018

The Relationship Between Leadership Style And Cognitive Style To Software Project Success, Jacquelyne L. Wilson

Walden Dissertations and Doctoral Studies

Project managers can be change agents providing direction and motivation for subordinates to meet and exceed goals; however, there is a lack of information about the soft skills needed to achieve project success. Understanding the relationship between cognitive style and transformational leadership to software project outcomes is important. This study describes the lived experiences of software project managers by focusing on their attitudes towards, perceptions of, and behaviors related to using transformational leadership and cognitive styles in agile software development environments. Husserlian phenomenological design was used to identify the structure of participants' experiences. The naturalistic decision-making model and the theory …


Staff Education Module For Bar Code Medication Administration, Francoise Juste Jan 2018

Staff Education Module For Bar Code Medication Administration, Francoise Juste

Walden Dissertations and Doctoral Studies

Bar Code Medication Administration (BCMA) is a technology-supported nursing tool that has become the standard of practice for medication administration. When used effectively and efficiently, this tool has the potential to reduce medication errors in acute care settings. In a pediatric unit at a major urban hospital in the northeast region of the United States, the absence of a BCMA nursing staff educational module affected the use of this safety tool leading to an increase of medication errors. The purpose of this DNP project was to develop a comprehensive educational module to promote BCMA in the pediatric unit of the …


User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim Jan 2018

User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim

Walden Dissertations and Doctoral Studies

The use of banking automated teller machine (ATM) technological innovations have significant importance and benefits in Nigeria, but numerous investigations have shown that illiterate and semiliterate Nigerians do not perceive them as useful or easy-to-use. Developing easy-to-use banking ATM system interfaces is essential to accommodate over 40% illiterate and semiliterate Nigerians, who are potential users of banking ATM systems. The purpose of this study was to identify strategies software developers of banking ATM systems in Nigeria use to create easy-to-use banking ATM system interfaces for a variety of people with varying abilities and literacy levels. The technology acceptance model was …


Social Media Policy To Support Employee Productivity In The Finance Industry, David Shaun Rogers Jan 2018

Social Media Policy To Support Employee Productivity In The Finance Industry, David Shaun Rogers

Walden Dissertations and Doctoral Studies

Business leaders may see social media as a distraction for their workers; however, blocking access could lead to a reduction in productivity. Using social media technologies with knowledge workers could achieve cost reductions for payroll of 30% to 35%. The purpose of this multiple case study was to explore how business leaders used a social media policy to support employee productivity. The conceptual framework for this study was social exchange theory, which supports the notion that dyad and small group interactions make up most interactions, and such interactions enhance employees' productivity. The research question was to explore how finance industry …


Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price Jan 2018

Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price

Walden Dissertations and Doctoral Studies

Telehealth and remote medical treatments have begun to be more commonly used in healthcare systems. Researchers have theorized that providers' abilities to treat patients are not directly tied to the proximity of the patient to the doctor, but by the identification and treatment of the patient's symptoms. Although the treatment and cure rates are being established within individual health systems and professional medical associations, empirical research is lacking regarding patient satisfaction with this remote treatment situation. The purpose of this quantitative study was to address this gap by examining satisfaction ratings of patients between virtual provider visits and face-to-face provider …


Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti Jan 2018

Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti

Walden Dissertations and Doctoral Studies

Despite the high rate of failure in merger and acquisition (M&A) transactions, many organizations continue to rely on M&As as their primary growth strategy and to address market competition. The purpose of this qualitative single case study was to explore strategies managers from a large healthcare payer in the midwestern United States used to achieve operational and strategic synergies during the postacquisition information technology (IT) integration phase. Haspeslagh and Jemison's acquisition integration approaches model was the conceptual framework for the study. Methodological triangulation was established by analyzing the data from the semistructured interviews of 6 senior executives and 6 IT …


Exploring Welfare Recipients' Self-Sufficiency Barriers Through Information Management Systems In Tennessee, Valenta Eunice Nichols Jan 2018

Exploring Welfare Recipients' Self-Sufficiency Barriers Through Information Management Systems In Tennessee, Valenta Eunice Nichols

Walden Dissertations and Doctoral Studies

Families living on welfare in low-income impoverished neighborhoods encounter multiple barriers that need mitigating before seeking work to reach self-sufficiency. Many welfare recipients' self-sufficiency barriers are unnoticeable to caseworkers due to lack of data sharing to assess clients' needs through information technology processes. The purpose of this exploratory descriptive phenomenological qualitative study was to understand welfare recipients' viewpoints on socioeconomic barriers to living self-sufficiently and gain perspectives from human services caseworkers and technical resources on data sharing issues that impact recipients' ability to live independently from government assistance. Data collection and observational field notes resulted from in-depth interviews of 11 …


Overcoming Data Breaches And Human Factors In Minimizing Threats To Cyber-Security Ecosystems, Manouan Pierre-Marius Ayereby Jan 2018

Overcoming Data Breaches And Human Factors In Minimizing Threats To Cyber-Security Ecosystems, Manouan Pierre-Marius Ayereby

Walden Dissertations and Doctoral Studies

This mixed-methods study focused on the internal human factors responsible for data breaches that could cause adverse impacts on organizations. Based on the Swiss cheese theory, the study was designed to examine preventative measures that managers could implement to minimize potential data breaches resulting from internal employees' behaviors. The purpose of this study was to provide insight to managers about developing strategies that could prevent data breaches from cyber-threats by focusing on the specific internal human factors responsible for data breaches, the root causes, and the preventive measures that could minimize threats from internal employees. Data were collected from 10 …


Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan Jan 2018

Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan

Walden Dissertations and Doctoral Studies

From 2006 to 2016, an estimated average of 50% of big data analytics and decision support projects failed to deliver acceptable and actionable outputs to business users. The resulting management inefficiency came with high cost, and wasted investments estimated at $2.7 trillion in 2016 for companies in the United States. The purpose of this quantitative descriptive study was to examine the data model of a typical data analytics project in a big data environment for opportunities to improve the information created for management problem-solving. The research questions focused on finding artifacts within enterprise data to model key business scenarios for …


Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii Jan 2018

Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii

Walden Dissertations and Doctoral Studies

The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The …


Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster Jan 2018

Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster

Walden Dissertations and Doctoral Studies

Every year, several documented data breaches happen in the United States, resulting in the exposure of millions of electronic records. The purpose of this single-case study was to explore strategies some information technology managers used to monitor employees and reduce internal theft and loss. The population for this study consisted of 5 information technology managers who work within the field of technology in the southwestern region of the United States. Participants were selected using purposeful sampling. The conceptual framework for this study included elements from information and communication boundary theories. Data were collected from semistructured interviews, company standard operating procedures, …


Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez Jan 2018

Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez

Walden Dissertations and Doctoral Studies

Project managers who fail to apply strategies to prevent counterproductive work behavior in information technology projects could negatively affect users, budget costs, timelines, or projects. The purpose of this multiple case study was to explore strategies that project managers used to prevent counterproductive work behavior that put project success at risk. Social learning theory was the conceptual framework for this study. Data were collected through document review of published Project Management Institute (PMI) material as well as semistructured interviews with 10 project managers who were members of a PMI chapter in the southeastern United States, and who held a project …


Technology Acceptance And Compliance In Obstructive Sleep Apnea Patients, Asif Kidwai Jan 2018

Technology Acceptance And Compliance In Obstructive Sleep Apnea Patients, Asif Kidwai

Walden Dissertations and Doctoral Studies

The focus of this study is the problem of declining trend in obstructive sleep apnea (OSA) patient compliance. Studies reported improved compliance in patients with chronic diseases due to technology-based interventions. However, researchers have not investigated the advantages of technology to improve the compliance of OSA patients in detail. The specific problem was the lack of engagement between patients and healthcare managers, resulting in low compliance within OSA patients. The purpose of this qualitative study was to evaluate how technology-based interventions can improve OSA patient engagement with the healthcare managers resulting in improved compliance with treatment procedures. In this study, …


Leadership Skills To Sustain High-Tech Entrepreneurial Ventures, Zoaib Z. Rangwala Jan 2018

Leadership Skills To Sustain High-Tech Entrepreneurial Ventures, Zoaib Z. Rangwala

Walden Dissertations and Doctoral Studies

High-tech (HT) innovation-oriented entrepreneurs start 35% more ventures and create 10% more jobs in the first 5 years of operation than the rest of the private sector and drive significant economic growth across all industries; however, more than 50% of the entrepreneurial HT ventures fail during the first 5 years of operations. Guided by the conceptual framework of transformational leadership theory, the purpose of this multicase study was to explore skills used by successful entrepreneurial leaders to sustain their HT ventures in Silicon Valley, California. Data collection was from 8 participants in semistructured 1-on-1 interviews and 3 participants in a …


Employee Retention Strategies In The Information Technology Industry, Corey Harris Jan 2018

Employee Retention Strategies In The Information Technology Industry, Corey Harris

Walden Dissertations and Doctoral Studies

Productivity declines when employees voluntarily leave an organization. The purpose of this case study was to explore strategies that business leaders use to reduce turnover among their skilled information technology (IT) professionals in the Dallas-Fort Worth area. Six business leaders were selected because they had implemented strategies to retain skilled IT professionals. Herzberg's 2-factor theory was the conceptual framework for this doctoral study. Data were collected from semistructured interviews and review of the organization's policies, procedures, and personnel handbook. Data analysis consisted of assembling the data, organizing the data into codes, compiling the data into themes, and interpreting and disclosing …


Exploring The Implementation Of Cloud Security To Minimize Electronic Health Records Cyberattacks, Lamonte Bryant Tyler Jan 2018

Exploring The Implementation Of Cloud Security To Minimize Electronic Health Records Cyberattacks, Lamonte Bryant Tyler

Walden Dissertations and Doctoral Studies

Health care leaders lack the strategies to implement cloud security for electronic medical records to prevent a breach of patient data. The purpose of this qualitative case study was to explore strategies senior information technology leaders in the healthcare industry use to implement cloud security to minimize electronic health record cyberattacks. The theory supporting this study was routine activities theory. Routine activities theory is a theory of criminal events that can be applied to technology. The study's population consisted of senior information technology leaders from a medical facility in a large northeastern city. Data collection included semistructured interviews, phone interviews, …


Educational Manager Perceptions Towards Integrated Management Information System Implementation In Yemen, Mahfood Hussain Alkaabi Jan 2018

Educational Manager Perceptions Towards Integrated Management Information System Implementation In Yemen, Mahfood Hussain Alkaabi

Walden Dissertations and Doctoral Studies

The government of Yemen has been developing government offered services designed to improve the quality of education management. Yemen's managers of education and managers of higher education in the Ministry of Education (MOE) and the Ministry of Higher Education (MOHE) have sought to improve quality of education, reduce costs, and provide timely information for decision-making processes by implementing an integrated management information system (IMIS). The problem was the lack of understanding the barriers that hinder successful IMIS implementation by the MOE and MOHE, and the role that lack of collaboration has played in prior unsuccessful attempts. The purpose of this …


Leveraging Artificial Intelligence To Improve Provider Documentation In Patient Medical Records, Evangeline C. Ozurigbo Jan 2018

Leveraging Artificial Intelligence To Improve Provider Documentation In Patient Medical Records, Evangeline C. Ozurigbo

Walden Dissertations and Doctoral Studies

Clinical documentation is at the center of a patient's medical record; this record contains all the information applicable to the care a patient receives in the hospital. The practice problem addressed in this project was the lack of clear, consistent, accurate, and complete patient medical records in a pediatric hospital. Although the occurrence of incomplete medical records has been a known issue for the project hospital, the issue was further intensified following the implementation of the 10th revision of International Classification of Diseases (ICD-10) standard for documentation, which resulted in gaps in provider documentation that needed to be filled. Based …


Exploring Sme Vulnerabilities To Cyber-Criminal Activities Through Employee Behavior And Internet Access, Jerry Allen Twisdale Jan 2018

Exploring Sme Vulnerabilities To Cyber-Criminal Activities Through Employee Behavior And Internet Access, Jerry Allen Twisdale

Walden Dissertations and Doctoral Studies

Cybercriminal activity may be a relatively new concern to small and medium enterprises (SMEs), but it has the potential to create financial and liability issues for SME organizations. The problem is that SMEs are a future growth target for cybercrime activity as larger corporations begin to address security issues to reduce cybercriminal risks and vulnerabilities. The purpose of this study was to explore a small business owner's knowledge about to the principal elements of decision making for SME investment into cybersecurity education for employees with respect to internet access and employee vulnerabilities. The theoretical framework consisted of the psychological studies …


Effective Strategies For Managing The Outsourcing Of Information Technology, Marsha N. Hopwood Jan 2018

Effective Strategies For Managing The Outsourcing Of Information Technology, Marsha N. Hopwood

Walden Dissertations and Doctoral Studies

More than half of information technology (IT) outsourced projects fail, primarily due to a lack of effective management practices surrounding the outsourcing end-to-end process. Ineffective management of the IT outsourcing (ITO) process affects organizations in the form of higher than expected project costs, including greater vendor switching or reintegration costs, poor quality, and loss of profits. These effects indicate that some business leaders lack the strategies to effectively manage the ITO process. The purpose of this single-case study was to apply the transaction cost economics (TCE) theory to explore strategies 5 business professionals use to manage an ITO project in …


Strategies For Achieving Profitability In The Music Streaming Service Business Model, James Bennett Jan 2018

Strategies For Achieving Profitability In The Music Streaming Service Business Model, James Bennett

Walden Dissertations and Doctoral Studies

Although the rapid growth of the music streaming industry has led to record levels of global music consumption, many leaders in the music streaming industry have not developed a financially sustainable business model for music streaming. This descriptive single case study focused on strategies that some global music streaming service leaders used to generate sustainable profits through their business models. Christensen's theory of disruptive innovation served as the conceptual framework for this study. Semistructured interviews with the chief executive officer and 4 senior managers of a leading music streaming service in southeastern Asia were analyzed to identify themes. Secondary data …


Risk Management Strategies To Prevent And Mitigate Emerging Operational Security Threats, Nancy Page Larrimore Jan 2018

Risk Management Strategies To Prevent And Mitigate Emerging Operational Security Threats, Nancy Page Larrimore

Walden Dissertations and Doctoral Studies

Dependence on technology brings security compromises that have become a global threat that costs businesses millions of dollars. More than 7.6 million South Carolinians incurred effects from the 162 security breaches reported in 2011-2015. The purpose of this multiple case study was to explore the risk management strategies small business leaders use to prevent and mitigate operational security threats that produce financial losses. The population for this study consisted of 6 business leaders in South Carolina who have demonstrated successful experience in preventing and mitigating operational security threats. Transformational leadership theory provided the conceptual framework for exploring the overreaching research …


Public Health Providers' Perceptions Of Electronic Health Records In A Disaster, Sherhonda Yvette Harper Jan 2018

Public Health Providers' Perceptions Of Electronic Health Records In A Disaster, Sherhonda Yvette Harper

Walden Dissertations and Doctoral Studies

The introduction of federal initiatives and incentives regarding health information technology fostered a movement towards the adoption of electronic health records (EHR). Implementation of EHRs sparked discussions among healthcare providers, patients, and others about the benefits or challenges of the move from the traditional paper method to the electronic version in healthcare settings. A knowledge gap in research involving the usefulness of EHRs and their impact to the delivery of care in other settings exists. The purpose of this qualitative study was to explore public health providers' perceptions of the meaningful use of EHRs in a disaster setting. Study participants …


Aligning Social Media, Mobile, Analytics, And Cloud Computing Technologies And Disaster Response, William Tuley Worthy Jan 2018

Aligning Social Media, Mobile, Analytics, And Cloud Computing Technologies And Disaster Response, William Tuley Worthy

Walden Dissertations and Doctoral Studies

After nearly 2 decades of advances in information and communications technologies (ICT) including social media, mobile, analytics, and cloud computing, disaster response agencies in the United States have not been able to improve alignment between ICT-based information and disaster response actions. This grounded theory study explored emergency response ICT managers' understanding of how social media, mobile, analytics, and cloud computing technologies (SMAC) are related to and can inform disaster response strategies. Sociotechnical theory served as the conceptual framework to ground the study. Data were collected from document reviews and semistructured interviews with 9 ICT managers from emergency management agencies in …


Initiating Factors Affecting Information Systems Project Success, Jonathan Olubunmi Afolabi Jan 2018

Initiating Factors Affecting Information Systems Project Success, Jonathan Olubunmi Afolabi

Walden Dissertations and Doctoral Studies

Information systems (IS) projects are complex and costly, but only a 3rd of IS projects are successful; the Standish Group reported that 32% of IS projects were successful in 2012. Although investments in research have led to improvements in practice, there is a general perception that management failures are responsible for the low rate of IS project success. The effects of initiating factors on project outcome had not been sufficiently explored; few IS researchers have explored the initiation phase. The purpose of this grounded theory study was to explore project initiation factors, including relational, as well as decision-making aspects, and …