Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Walden Dissertations and Doctoral Studies

Theses/Dissertations

Strategies

Articles 1 - 20 of 20

Full-Text Articles in Entire DC Network

Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger Jan 2022

Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger

Walden Dissertations and Doctoral Studies

AbstractRecent cyberattacks in hospitals show the urgency of the need to enhance secure information technology (IT) infrastructure. Hospitals are statistically more at cyber risk than all the multiple industries against ransomware, malware, hacking and internal threats. Guided by routine activity theory, the purpose of this exploratory multiple case study was to explore strategies utilized by hospitals' IT security managers to reduce cybersecurity breaches associated with sensitive data. The participants were nine IT security managers from hospitals in the eastern United States. Data were collected via semistructured interviews and supporting documentation from the consenting participants and hospitals' websites. Through thematic analysis, …


Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith Jan 2022

Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith

Walden Dissertations and Doctoral Studies

Business leaders do not often consider investing in informational technology (IT) to increase performance. These business leaders lack knowledge of innovative IT adoption strategies to expand their revenue and reduce costs to sustain a competitive advantage. Grounded in the technology-organization-environment (TOE) theory, the purpose of this qualitative multiple case study was to explore IT innovation adoption strategies business leaders use to increase performance. The participants were four successful business leaders selected from finalists for international entrepreneurial awards presented annually in the Mid-Atlantic region of the United States. The data were collected using semistructured telephone interviews, media releases, and online publications. …


The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo Jan 2021

The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo

Walden Dissertations and Doctoral Studies

Despite information technology (IT) officers’ multiple efforts to develop reliable and efficient electronic justice (e-justice) systems, digitizing court processes still presents several quality challenges associated with IT infrastructure and literacy issues. Grounded in the principles of total quality management, the purpose of this qualitative multiple case study was to identify strategies and best practices IT officers in African regional economic communities (REC) use for digitizing regional and subregional court processes to improve African e-justice systems. The participants included four IT officers working as assistant computer system analysts (ACSA), computer system analysts (CSA), and heads of IT (HIT) in regional and …


Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa Jan 2021

Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa

Walden Dissertations and Doctoral Studies

Small business owners employ over half the U.S. labor force, yet only 50% of small businesses survive beyond 5 years. When small business owners understand the factors that lead to their business failure, they can develop strategies to remain sustainable and profitable within the first 5 years, thus reducing the potential of business failure. Grounded in the resource-based theory, the purpose of this qualitative multiple case study was to explore strategies five small construction owners in central Georgia used to remain in business beyond 5 years. Data were collected from semi structured interviews, a review of organization income statements and …


Exploring Strategies To Transition To Big Data Technologies From Dw Technologies, Mbah Johnas Fortem Jan 2020

Exploring Strategies To Transition To Big Data Technologies From Dw Technologies, Mbah Johnas Fortem

Walden Dissertations and Doctoral Studies

As a result of innovation and technological improvements, organizations are now capable of capturing and storing massive amounts of data from various sources and domains. This increase in the volume of data resulted in traditional tools used for processing, storing, and analyzing large amounts of data becoming increasingly inefficient. Grounded in the extended technology acceptance model, the purpose of this qualitative multiple case study was to explore the strategies data managers use to transition from traditional data warehousing technologies to big data technologies. The participants included data managers from 6 organizations (medium and large size) based in Munich, Germany, who …


Strategies To Implement Big Data Analytics In Telecommunications Organizations, Delton Aneato Jan 2020

Strategies To Implement Big Data Analytics In Telecommunications Organizations, Delton Aneato

Walden Dissertations and Doctoral Studies

Information Technology (IT) leaders who do not invest in big data projects may struggle to gain a competitive advantage and business insights to improve performance. Grounded in the Kotter’s change and Six Sigma models, the purpose of this qualitative multiple case study was to explore strategies IT leaders used to implement big data analytics successfully. The participants comprised 4 IT leaders from 2 telecommunication organizations in the United States of America, who effectively used strategies to promote and maximize competitive advantage using big data analytics. Data were collected from semistructured interviews, company documents, and project-related documents and were analyzed using …


Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch Jan 2020

Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch

Walden Dissertations and Doctoral Studies

AbstractElectronic health record system implementations have a high failure rate when properly developed strategies are not used. These implementation failures affect healthcare workers and practitioners core roles through a lack of documentation practices, which decreases the quality of the care of the patients. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore the strategies information technology systems engineers use for the implementation of Health Information Management Systems. The participants were 10 information technology systems engineers from three healthcare organizations in the greater Tennessee area. The data were collected through recorded participant interviews …


Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna Jan 2020

Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna

Walden Dissertations and Doctoral Studies

Healthcare organizations generate massive amounts of data through their databases that may be vulnerable to data breaches due to extensive user privileges, unpatched databases, standardized query language injections, weak passwords/usernames, and system weaknesses. The purpose of this qualitative multiple case study was to explore technical strategies database managers in Southeast/North Texas used to protect database systems from data breaches. The target population consisted of database managers from 2 healthcare organizations in this region. The integrated system theory of information security management was the conceptual framework. The data collection process included semistructured interviews with 9 database managers, including a review of …


The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo Jan 2020

The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo

Walden Dissertations and Doctoral Studies

As consumers increase the use of smart technologies, the lack of or improper implementation of Internet of Things (IoT) systems may affect the profitability of hotel businesses. For this qualitative single case study, Porter’s value chain model was the conceptual framework. The data collection process also included direct observations, participant observations, company performance documents, and reflective journaling. Data analysis from multiple sources of data was triangulated to hoteliers revealing that the implementation of IoT systems strategies may increase profit through the use of IoT system technology. Using Yin’s 5-step process, data were coded and analyzed and produced 3 themes: offer …


Strategies Used In Ehealth Systems Adoption, Joshua Adams Jan 2020

Strategies Used In Ehealth Systems Adoption, Joshua Adams

Walden Dissertations and Doctoral Studies

Failure to adopt an interoperable eHealth system limits the accurate communication exchange of pertinent health-care-related data for diagnosis and treatment. Patient data are located in disparate health information systems, and the adoption of an interoperable eHealth system is complex and requires strategic planning by senior health care IT leaders. Grounded in DeLone and McLean’s information system success model, the purpose of this qualitative case study was to explore strategies used by some senior information technology (IT) health care leaders in the successful adoption of an eHealth system. The participants were 8 senior health care IT leaders in the eastern United …


Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen Jan 2019

Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen

Walden Dissertations and Doctoral Studies

The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study's conceptual framework. …


Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen Jan 2019

Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen

Walden Dissertations and Doctoral Studies

The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study's conceptual framework. …


Strategies For Using Information And Communication Technologies To Improve Profitability, Rodney Mciver Jan 2019

Strategies For Using Information And Communication Technologies To Improve Profitability, Rodney Mciver

Walden Dissertations and Doctoral Studies

Small business owners in a range of industries continually adapt to take advantage of technological developments in accounting, marketing, and communication. The purpose of this multiple case study was to explore strategies that small business owners operating in the central region of North Carolina used to implement information and communication technology (ICT). Roger's diffusion of innovation theory grounded the study. Data collection included face-to-face semistructured interviews with 6 owners of small businesses who successfully implemented ICT, field notes from site observations, and reviews of participant websites. Interviews were transcribed and participants were engaged in member checking. Data were analyzed using …


Cybersecurity Strategies To Protect Information Systems In Small Financial Institutions, Johnny Fadel Rawass Jan 2019

Cybersecurity Strategies To Protect Information Systems In Small Financial Institutions, Johnny Fadel Rawass

Walden Dissertations and Doctoral Studies

Leaders of financial institutions face challenges in protecting data because of the increased use of computer networks in the commerce and governance aspects of their businesses. The purpose of this single case study was to explore the strategies that leaders of a small financial institution used to protect information systems from cyber threats. The actor-network theory was the conceptual framework for this study. Data were collected through face-to-face, semistructured interviews with 5 leaders of a small financial institution in Qatar and a review of company documents relevant to information security, cybersecurity, and risk management. Using thematic analysis and Yin'€™s 5-€step …


Strategies For Applying Electronic Health Records To Achieve Cost Saving Benefits, Daniel Kanyi Ngunyu Jan 2018

Strategies For Applying Electronic Health Records To Achieve Cost Saving Benefits, Daniel Kanyi Ngunyu

Walden Dissertations and Doctoral Studies

The American Recovery and Reinvestment Act (ARRA) of 2009 authorized the distribution of about $30 billion incentive funds to accelerate electronic health record (EHR) applications to improve the quality of care, safety, privacy, care coordination, and patients' involvement in healthcare. EHR use has the potential of saving $731 in costs for hospitals per patient admission; however, most hospitals are not applying EHR to reach the level at which cost savings are possible. The purpose of this single case study was to explore strategies that IT leaders in hospitals can use to apply EHR to achieve the cost saving benefits. The …


Strategies For Successfully Managing Organizational It Projects, Joseph Rathbun Jan 2018

Strategies For Successfully Managing Organizational It Projects, Joseph Rathbun

Walden Dissertations and Doctoral Studies

Over 70% of information technology (IT) projects in large organizations in the United States run over budget or fail to reach completion primarily due to a lack of effective strategies. The purpose of this single case study was to explore strategies that IT project managers used to successfully complete IT projects. Hersey and Blanchard's situational leadership theory was the conceptual framework. Purposive sampling method was used to identify 2 successful IT project managers in Central Texas. Data gathered from semistructed interviews and collected from publicly available documents were analyzed using coding techniques, constant comparison, and key word phrases. Member checking …


Strategies To Manage Cloud Computing Operational Costs, Frankie Nii A Sackey Jan 2018

Strategies To Manage Cloud Computing Operational Costs, Frankie Nii A Sackey

Walden Dissertations and Doctoral Studies

Information technology (IT) managers worldwide have adopted cloud computing because of its potential to improve reliability, scalability, security, business agility, and cost savings; however, the rapid adoption of cloud computing has created challenges for IT managers, who have reported an estimated 30% wastage of cloud resources. The purpose of this single case study was to explore successful strategies and processes for managing infrastructure operations costs in cloud computing. The sociotechnical systems (STS) approach was the conceptual framework for the study. Semistructured interviews were conducted with 6 IT managers directly involved in cloud cost management. The data were analyzed using a …


Effective Competitive Strategies Of U.S. In Vitro Device Manufacturers, Sofia M. Beglari Jan 2017

Effective Competitive Strategies Of U.S. In Vitro Device Manufacturers, Sofia M. Beglari

Walden Dissertations and Doctoral Studies

Medical manufacturing leaders struggle to maintain their competitive position due to inefficient business strategies. The purpose of this multiple case study was to explore strategies that in vitro diagnostics (IVD) medical manufacturing's leaders have used to gain and maintain a competitive advantage in the global marketplace. Porter's competitive advantage theory was used to understand how IVD medical business leaders maintain their competitive edge. Data were gathered through interviews with a purposive sample of 3 IVD medical device leaders from companies in California, Connecticut, and New York who had run IVD medical businesses for at least 10 years and who attended …


Social Media Strategies For Increasing Sales, Loretta N. Ezeife Jan 2017

Social Media Strategies For Increasing Sales, Loretta N. Ezeife

Walden Dissertations and Doctoral Studies

Social media have transformed business commerce and consumer communication, yet organizational leaders lack clear strategies for using social media platforms to their advantage. The purpose of this qualitative multicase study was to explore social media marketing strategies for increasing sales. The relationship marketing conceptual framework grounded this study. Data collection included semistructured interviews with 5 organizational leaders from 5 different organizations in the San Francisco, California, Bay Area and a review of participants’ documents including marketing materials, social media posts, and published sales reports. Data analysis included coding, categorization, and identification of major themes. The thematic assessment approach revealed 5 …


Exploring Strategies For Successful Implementation Of Electronic Health Records, Richard Alton Warren Jan 2017

Exploring Strategies For Successful Implementation Of Electronic Health Records, Richard Alton Warren

Walden Dissertations and Doctoral Studies

Adoption of electronic health records (EHR) systems in nonfederal acute care hospitals has increased, with adoption rates across the United States reaching as high as 94%. Of the 330 plus acute care hospital EHR implementations in Texas, only 31% have completed attestation to Stage 2 of the meaningful use (MU) criteria. The purpose of this multiple case study was to explore strategies that hospital chief information officers (CIOs) used for the successful implementation of EHR. The target population consists of 3 hospitals CIOs from a multi-county region in North Central Texas who successfully implemented EHRs meeting Stage 2 MU criteria. …