Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 48

Full-Text Articles in Entire DC Network

Exploring The Integration Of Corporate Sustainability Into Small-Scale Business Activities, Olushola O. Odutola Jan 2022

Exploring The Integration Of Corporate Sustainability Into Small-Scale Business Activities, Olushola O. Odutola

Walden Dissertations and Doctoral Studies

Small and medium-scale enterprises contribute 49% of the gross domestic product in Nigeria. The lack of research studies on how small and medium-scale enterprises integrate corporate sustainability into their business operations might present challenges for policymakers in achieving Nigeria’s sustainable development goals (SDG). The purpose of this descriptive phenomenological study was to explore how managers of small and medium-scale enterprises integrate the corporate sustainability dimensions into their business operations based on the concepts of the corporate entity, corporate nature, and corporate obligations. The central research question of this study was how managers of small and medium-scale enterprises integrate the economic, …


Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger Jan 2022

Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger

Walden Dissertations and Doctoral Studies

AbstractRecent cyberattacks in hospitals show the urgency of the need to enhance secure information technology (IT) infrastructure. Hospitals are statistically more at cyber risk than all the multiple industries against ransomware, malware, hacking and internal threats. Guided by routine activity theory, the purpose of this exploratory multiple case study was to explore strategies utilized by hospitals' IT security managers to reduce cybersecurity breaches associated with sensitive data. The participants were nine IT security managers from hospitals in the eastern United States. Data were collected via semistructured interviews and supporting documentation from the consenting participants and hospitals' websites. Through thematic analysis, …


Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte Jan 2022

Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte

Walden Dissertations and Doctoral Studies

Small businesses are the foundation of an economy and spawn innovation, but small business owners fail at an alarming rate because they lack strategies to sustain business operations. Since 50% of small businesses fail within the first 5 years, small business sustainability research is critical to support small business owners. Grounded in entrepreneurial theory, the purpose of this multiple case study was to identify strategies information technology (IT) small business owners use to sustain operation beyond the first 5 years. The participants included four IT small business owners in the Southwestern United States who sustained operations beyond the first 5 …


Website Accessibility Strategies, Gary W. Hrezo Jan 2022

Website Accessibility Strategies, Gary W. Hrezo

Walden Dissertations and Doctoral Studies

Most websites cannot be readily used by people with disabilities, despite the internet being an essential component for people to be part of a community. Applying web accessibility strategies means that people with disabilities can better interact with the web. Grounded in Davis’s technology acceptance model, the purpose of this qualitative multiple case study was to examine strategies used by web designers to make websites accessible for people with disabilities. The participants were experienced web developers from organizations in Florida with websites that have a Web Content Accessibility Guidelines Level 2 of three levels, i.e., AA- rating. The data collection …


Social Media Analytics Use Among Small Business Owners, Melody White Jan 2022

Social Media Analytics Use Among Small Business Owners, Melody White

Walden Dissertations and Doctoral Studies

As of January 2018, small businesses created 47.5% of private jobs in the United States, but little is known about whether and why small business owners use social media analytics. This topic is important because social media analytics assist businesses in identifying social media effectiveness, gaining new customers, and staying connected with current customers. The purpose of this generic qualitative research study was to explore the use of social media analytics by small business owners, which can increase customer interaction and help monitor company perception and effectiveness. The conceptual foundation used in this study was the technology acceptance model. The …


Exploring Security Strategies To Protect Personally Identifiable Information In Small Businesses, Erin Banks Jan 2022

Exploring Security Strategies To Protect Personally Identifiable Information In Small Businesses, Erin Banks

Walden Dissertations and Doctoral Studies

Organizations that do not adequately protect sensitive data are at high risk of data breaches. Organization leaders must protect confidential information as failing to do so could result in irreparable reputation damage, severe financial implications, and legal consequences. This study used a multiple case study design to explore small businesses’ strategies for protecting their customers’ PII against phishing attacks. This study’s population comprised information technology (IT) managers in small businesses in Northern Virginia. The conceptual framework used in this study was the technology acceptance model. Data collection was performed using telephone interviews with IT managers (n = 6) as well …


Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham Jan 2022

Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham

Walden Dissertations and Doctoral Studies

AbstractAfter organizations successfully adopt the internet of things (IoT) technology, many corporate information technology (IT) leaders face challenges during the implementation phase. Corporate IT leaders' potential failures in implementing IoT devices may impede organizations from integrating IoT solutions and promoting business benefits. Grounded in technology-organization-environment (TOE) theory, the purpose of this qualitative, pragmatic inquiry study was to explore strategies that corporate IT leaders use to implement IoT technology in their organizations. The participants were six corporate healthcare IT leaders who successfully used implementation strategies for implementing IoT solutions for their organizations. Data were collected using semistructured interviews and industry security …


Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii Jan 2022

Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii

Walden Dissertations and Doctoral Studies

Supply chain inflexibility results in reduced efficiency and profitability. Without supply chain flexibility, supply chain managers in manufacturing firms risk the loss of competitive advantage due to reduced efficiency and profitability. Grounded in business process engineering conceptual framework, the purpose of this qualitative multiple case study was to explore strategies supply chain leaders in manufacturing organizations use to achieve supply chain flexibility. The participants were five supply chain leaders in the manufacturing industry in the midwestern United States and successfully implemented innovative solutions to achieve supply chain flexibility. Data were collected using semistructured interviews and a review of company documents …


Impact Of Internal Control, Cybersecurity Risk, And Competitive Advantage On Retail Cybersecurity Budget, Samuel William Pfanstiel Jan 2022

Impact Of Internal Control, Cybersecurity Risk, And Competitive Advantage On Retail Cybersecurity Budget, Samuel William Pfanstiel

Walden Dissertations and Doctoral Studies

Retail organizations are driven to improve security posture for many reasons, including meeting financial regulation requirements, mitigating threats of data breach, and differentiating themselves within markets affected by customer perception. The problem was that little was known about how these drivers of internal control, cybersecurity risk, and competitive advantage impact retail cybersecurity budgets within the retail sector. The purpose of this quantitative nonexperimental correlational study was to describe the relationship between cybersecurity budget and drivers of internal control, cybersecurity risk, and competitive advantage among U.S.-based retail merchant organizations. Real options theory provided a foundation for explaining this decision-making process. Data …


Information Communication And Technology Strategies For Improving Nonprofit Organizations’ Effectiveness, Richard T. Evans Jan 2022

Information Communication And Technology Strategies For Improving Nonprofit Organizations’ Effectiveness, Richard T. Evans

Walden Dissertations and Doctoral Studies

AbstractSome nonprofit organization leaders lack strategies to incorporate information communication and technology (ICT) into the business operations of organizations. A nonprofit organization lacking strategies involving integrating technology into their business operations decreases the likelihood of being efficient, productive, and effective. Grounded in the information technology (IT) competency model, the purpose of this qualitative single case study was to explore the ICT strategies of a nonprofit organization leader in the south suburbs of Chicago. Data were collected through semi-structured interviews, direct observations, and reviews of organizational documents. The Marshall and Rossman seven-step process was used to analyze data. Three themes emerged …


Using Agile Strategies To Improve Project Success Rates, Tim Kirkland Jan 2022

Using Agile Strategies To Improve Project Success Rates, Tim Kirkland

Walden Dissertations and Doctoral Studies

Project failures can be costly to businesses, but on average, program managers’ (PMs’) success rates for managing information technology (IT) projects is less than 35%. Organizational cultures struggle to adapt to agile project management (APM) that provides stakeholder flexibility for dynamic environments. Grounded by project management theory, the purpose of this qualitative multiple case study was to explore strategies project managers use to reduce IT project failures. The participants consisted of nine project managers in the northeastern United States with APM experience managing successful IT projects. Data were collected from virtual semi-structured interviews and journal notes. Ten open-ended interview questions …


Challenges Of Digital Privacy In Banking Organizations, Okechukwu Innocent Ogudebe Jan 2022

Challenges Of Digital Privacy In Banking Organizations, Okechukwu Innocent Ogudebe

Walden Dissertations and Doctoral Studies

As the information and technology age becomes more advanced, digital privacy flaws have become more challenging. Information technology (IT) security managers, chief information security officers, and other stakeholders in banks are concerned with identity-based authentication attacks because identity-theft attacks cause data breaches. Grounded in the protection motivation theory, the purpose of this qualitative pragmatic study was to examine strategies IT security professionals working on internet banking platforms use to mitigate identity-based authentication attacks. The study participants comprised five IT security professionals currently working in the online banking industry from the northeastern United States with at least 5 years of experience …


Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem Jan 2022

Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem

Walden Dissertations and Doctoral Studies

Since 2001, most government organizations’ IT modernization programs had failed because of ineffective implementation strategies from IT leaders. The research problem was the absence of effective strategies to modernize IT legacy systems. The purpose of this qualitative single case study was to explore effective IT modernization strategies to revolutionize IT legacy systems. The researcher sought to answer how organizations create effective strategies to modernize IT legacy systems. The study used purposeful sampling, including 13 IT leaders, IT technicians, and customers based on their experience in implementing successful IT modernization programs’ strategies. Data were collected using semi-structured interviews and agency documentation. …


Equipment Rental Companies Leaders’ Customer Retention Strategies, Katrell Shalaine Mcneil Jan 2022

Equipment Rental Companies Leaders’ Customer Retention Strategies, Katrell Shalaine Mcneil

Walden Dissertations and Doctoral Studies

Equipment rental business leaders that employ inadequate customer retention strategies negatively impact organizations’ performance and profitability. Improved customer retention strategies might improve key customer retention and increase market share. Grounded in the customer retention management theory, the purpose of this qualitative multiple case study was to explore strategies rental leaders use to retain customers. Participants were 10 equipment rental leaders from the Southwest Region of the United States that successfully retained their key customers through effective customer retention strategies. Data were collected using semistructured interviews and a review of materials from organizational websites regarding customer order fulfillment and technology. Through …


Optimal Domotic Systems Based On Archival Data Trend Analysis, Bettina Yvette Moore Jan 2022

Optimal Domotic Systems Based On Archival Data Trend Analysis, Bettina Yvette Moore

Walden Dissertations and Doctoral Studies

Domotics is the integration of technology into building systems. Due to the rapid growth in the use of domotic systems in recent years, the industry is struggling to establish consistency and standardization. The purpose of this archival-based qualitative case study was to identify current trends and patterns in scholarly domotic research to create an instrument to evaluate domotic systems and domotic interrelationships using bibliometric searches. The facilities management and modeling system provided the framework for the study. Archival research data were examined to identify trends and patterns in domotic research and provide visualization of domotic relationships through technology trajectory mapping …


Use Of Human–Computer Interaction Devices And Web 3.0 Skills Among Engineers, Dr. Robbie L. Walker Jan 2022

Use Of Human–Computer Interaction Devices And Web 3.0 Skills Among Engineers, Dr. Robbie L. Walker

Walden Dissertations and Doctoral Studies

Despite massive company investments in human–computer interaction devices and software, such as Web 3.0 technologies, engineers are not demonstrating measurable performance and productivity increases. There is a lack of knowledge and understanding related to the motivation of engineers to use Web 3.0 technologies including the semantic web and cloud applications for increased performance. The purpose of this quantitative correlational study was to investigate whether the use of human–computer interaction devices predict Web 3.0 skills among engineers. Solow’s information technology productivity paradox was the theoretical foundation for this study. Convenience sampling was used for a sample of 214 participants from metropolitan …


Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson Jan 2022

Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson

Walden Dissertations and Doctoral Studies

Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …


Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao Jan 2022

Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao

Walden Dissertations and Doctoral Studies

User Experience (UX) design improvement can alter business results. Information technology (IT) company leaders are concerned with UX design improvement, as it is the number one indication of product innovation success and user satisfaction. Grounded in Christensen’s disruptive innovation theory, the purpose of the qualitative single case study was to explore strategies IT company leaders and UX designers used to identify critical UX design elements that lead to improved product innovations. The participants were five IT company leaders and a focus group of four UX designers employed by a sizeable telecom organization in Beijing, China. The data were collected from …


Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith Jan 2022

Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith

Walden Dissertations and Doctoral Studies

Business leaders do not often consider investing in informational technology (IT) to increase performance. These business leaders lack knowledge of innovative IT adoption strategies to expand their revenue and reduce costs to sustain a competitive advantage. Grounded in the technology-organization-environment (TOE) theory, the purpose of this qualitative multiple case study was to explore IT innovation adoption strategies business leaders use to increase performance. The participants were four successful business leaders selected from finalists for international entrepreneurial awards presented annually in the Mid-Atlantic region of the United States. The data were collected using semistructured telephone interviews, media releases, and online publications. …


Information Systems Management And Sustainable Urban Development: A Case Study, Endris A. Suraj Jan 2022

Information Systems Management And Sustainable Urban Development: A Case Study, Endris A. Suraj

Walden Dissertations and Doctoral Studies

Sustainable Urban Development of Ethiopia lacks strategies to implement information systems management (ISM). Lacking appropriate ISM implementation has influenced the government’s plan on the four indicators of urban sustainability - Water, Air, Climate Change, and Population Growth. Grounded in the conceptual frameworks of Technology Acceptance Model (TAM) and Diffusion Of Innovation (DOI), the purpose of this qualitative single case study aims to explore ISM for sustainable urban development in Ethiopia. The participants were 12 Development Associates (DAs) who have been participating in implementing of ISM. Data was collected through a one-to-one interview, National documents, the Environmental Protection Office of Ethiopia, …


Successful Information Technology Project Process Management Best Practices, Jude Oderaa Orazulike Jan 2022

Successful Information Technology Project Process Management Best Practices, Jude Oderaa Orazulike

Walden Dissertations and Doctoral Studies

Globally, most information technology projects (ITPs) are reported as unsuccessful. Poor project management practices have consistently been identified as the leading cause of ITP failures. However, ITP practitioners manage project processes in diverse ways without clear guiding principles in terms of what does or does not work in practice for success. Process management practices in projects were explored in this grounded theory qualitative study from a systems theory perspective. The purpose was to understand from project practitioners' experiences what guiding principles potentially influenced ITPs to success. These experiences were then analyzed to develop a theory describing how to best use …


Analyzing Secure Access Strategies To Protect Clinical-Information Systems In The Healthcare Industry, Manjit S. Kang Jan 2022

Analyzing Secure Access Strategies To Protect Clinical-Information Systems In The Healthcare Industry, Manjit S. Kang

Walden Dissertations and Doctoral Studies

Securing patient health records within cloud-based health records is a critical security challenge for hospitals and healthcare organizations. Some information technology (IT) leaders working in the U.S. healthcare industry or hospitals are concerned with their patient cloud-based health records due to data breaches in their healthcare systems. Grounded in the task technology fit theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies healthcare information leaders use to implement security procedures to protect patient health records on private cloud-based clinical information systems (CIS). The participants were six IT managers in metropolitan San Francisco Bay healthcare facilities. The …


Strategies To Secure A Voice Over Internet Protocol Telephone System, Sherese Bernard Jan 2022

Strategies To Secure A Voice Over Internet Protocol Telephone System, Sherese Bernard

Walden Dissertations and Doctoral Studies

Voice over internet protocol (VoIP) provides cost-effective phone service over a broadband internet connection rather than analog telephone services. While VoIP is a fast-growing technology, there are issues with intercepting and misusing transmissions, which are security concerns within telecommunication organizations and for customers. Grounded in the routine activity theory, the purpose of this multiple case study was to explore strategies information technology (IT) security managers used to secure VoIP telephone systems in telecommunication organizations. The participants consisted of nine IT security managers from three telecommunication organizations in New York who possessed the knowledge and expertise to secure a VoIP telephone …


Strategies For Attracting And Retaining Highly Skilled It Professionals For The High-Tech Workforce, Mia Gyjuan Moore Jan 2022

Strategies For Attracting And Retaining Highly Skilled It Professionals For The High-Tech Workforce, Mia Gyjuan Moore

Walden Dissertations and Doctoral Studies

Many information technology (IT) managers have experienced challenges retaining high-tech professionals. Organization leaders lose investments of time and money when essential personnel leave. Grounded in the task-technology fit theory and the technology acceptance model, the purpose of this qualitative multiple-case study was to explore technology-focused strategies IT managers use to attract and retain IT professionals. The participants included five IT managers from five high-tech organizations who implemented strategies to attract and retain IT professionals. Data were collected from semistructured interviews and online resources. Thematic analysis revealed four themes: (a) using high-tech tools and alternative methods, (b) employing talent management techniques, …


Individual Contributor Experiences Of Task Uncertainty And Task Interdependence Under Different Structures, Andrew R. Barbeau Jan 2022

Individual Contributor Experiences Of Task Uncertainty And Task Interdependence Under Different Structures, Andrew R. Barbeau

Walden Dissertations and Doctoral Studies

Approximately 84% of North American individual contributors work in organizations with functionally specialized structures where task uncertainty (TU) and task interdependence (TI) undermine cross-functional task execution. However, there is a lack of research into the TU and TI experiences of individual contributors under different organizational structures. It is important that senior leaders have this missing knowledge to inform structural decisions. The purpose of this generic qualitative, exploratory, snowball sampling study is to explore how individual contributors experience TU and TI following a reorganization from a functional to a horizontal organizational structure. In the current study, the research questions explored were …


Adoption Of It Governance Strategies For Multiproduct Devops Teams: A Correlational Quantitative Study, Russell Camilleri Jan 2022

Adoption Of It Governance Strategies For Multiproduct Devops Teams: A Correlational Quantitative Study, Russell Camilleri

Walden Dissertations and Doctoral Studies

Many multiproduct delivery organizations have difficulty adopting Information Technology (IT) governance practices within their Development and Operations (DevOps) teams. IT leaders who are managing DevOps teams, need to understand the factors influencing IT governance (ITG) adoption; otherwise this may impact DevOps maturity, resulting in reduced product delivery capabilities. Grounded in the technology acceptance model, the purpose of this quantitative correlational study was to examine the relationship between performance expectancy (PE), effort expectancy (EE), social influence (SI), and facilitating conditions (FC), as moderated by experience (EXP), gender (GND), age (AGE), and voluntariness of use (VOL) with behavioral intention (BI) to adopt …


Strategies Using Threat Intelligence To Detect Advanced Persistent Threats: A Qualitative Case Study, Melisa A. Joyner Jan 2022

Strategies Using Threat Intelligence To Detect Advanced Persistent Threats: A Qualitative Case Study, Melisa A. Joyner

Walden Dissertations and Doctoral Studies

Advanced persistent threats (APTs) targeting critical infrastructures can adversely impact human lives. Cyber security analysts are concerned with APT attacks because they make it challenging to defend critical infrastructures. Grounded in routines activity theory (RAT), the purpose of this qualitative exploratory multiple case study was to explore strategies cybersecurity analysts use to defend critical infrastructures from APT attacks. Data were collected through interviews with 8 participants and documents from two organizations. Participants were required to have experience analyzing network traffic on a critical infrastructure network, one year of cyber threat hunting experience, prior or current knowledge of cyber threat intelligence …


Examination Of Strategies To Implementing Chip-And-Personal Identification Number Credit Card Authentication Infrastructures, Neville Arthur Gallimore Jan 2022

Examination Of Strategies To Implementing Chip-And-Personal Identification Number Credit Card Authentication Infrastructures, Neville Arthur Gallimore

Walden Dissertations and Doctoral Studies

Chip-and-Personal Identification Number (PIN) technology is seen as a game changer in many e-commerce industries and a transformational technology in the 21st century. However, security concerns have made chip-and-PIN adoption relatively slow. Massive unauthorized card payment transactions in the United States (U.S.) cost victims an estimate totaling billions of dollars. Information Technology (IT) managers are concerned with credit card fraud's financial loss and liability cost. Grounded in Rogers’s diffusion of innovation theory, the purpose of this qualitative pragmatic study was to explore strategies used by IT managers to transition their e-commerce organizations to chip-and-PIN credit card authentication infrastructures. The participants …


Relationship Between Information System Success Model Dimensions And Electronic Health Records Use, Gloria Oshegbo Jan 2022

Relationship Between Information System Success Model Dimensions And Electronic Health Records Use, Gloria Oshegbo

Walden Dissertations and Doctoral Studies

The rise in the use of electronic health records (EHRs) in health care facilities necessitates a standardized tool for evaluating their effectiveness. Delone and McLean’s information system success model (ISSM) was the theoretical foundation, which consists of seven dimensions namely system, information, service qualities, user satisfaction, use, system usefulness, and net benefits. The purpose of this study was to examine EHRs’ efficiency and identify ISSM dimensions that influenced net benefits, the dependent variable. The research questions examined the relationship between dimensions of ISSM and the dimensions that affect net benefits. Participants were recruited using purposeful sampling via social media and …


Digital Strategies To Improve The Performance Of Pharmaceutical Supply Chains, Manish Shashi Jan 2022

Digital Strategies To Improve The Performance Of Pharmaceutical Supply Chains, Manish Shashi

Walden Dissertations and Doctoral Studies

Some supply chain managers at pharmaceutical companies lack strategies to digitalize integrated supply chain systems impacting their profitability. Digitalized supply chain management in a pharmaceutical company can help reduce operation costs, improve assets, enhance shareholders’ value, positively respond to customer demand, and generate profits. Guided by the theory of constraints, the purpose of this qualitative multiple case study was to explore strategies some pharmaceutical managers use to digitalize integrated supply chain systems to increase their profitability. The participants were five managers from four pharmaceutical companies in New Jersey with strategies to digitalize their integrated supply chain systems. Data collection included …