Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
A Secure And Strategic Approach To Keep Iot Devices Safe From Malware Attack, Christopher Ray Murray
A Secure And Strategic Approach To Keep Iot Devices Safe From Malware Attack, Christopher Ray Murray
Walden Dissertations and Doctoral Studies
Through the advances in technology, businesses can now utilize the Internet of Things (IoT) devices to improve workflow and provide better services to customers. However, without a strategy to secure these devices, Information Technology (IT) security professionals are left with vulnerable equipment. Grounded in routine activities theory, the purpose of this qualitative multiple case study was to determine strategies IT security professionals used to protect IoT devices in their environment. The participants were 6 IT professionals from 2 medium to large size healthcare facilities based in the Buffalo, New York, and the Washington D.C. area, who possessed strategies to protect …
Relationship Between Risk Identification, Risk Response, And Project Success, Marsha Marinich
Relationship Between Risk Identification, Risk Response, And Project Success, Marsha Marinich
Walden Dissertations and Doctoral Studies
AbstractProjects are used to implement the organization's strategic goals, but high failure rates reduce projects' effectiveness in successfully achieving goals. High failure rates reduce project managers’ effectiveness of projects in successfully achieving goals. Senior leaders and project managers are unable to deliver successful projects due to unmanaged risks. Grounded in expected utility theory, the purpose of this quantitative correlational study was to examine the relationship between risk identification, risk responses, and project success. A survey was created in SurveyMonkey® and distributed on LinkedIn. Survey responses were analyzed from 71 project managers with at least five years of experience in Washington, …