Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Strategies (7)
- Information Technology (6)
- Cybersecurity (5)
- Leadership (4)
- Sustainability (4)
-
- Artificial Intelligence (3)
- Cloud (3)
- Cloud Computing (3)
- E-government (3)
- Technology Acceptance Model (3)
- Training (3)
- Burnout (2)
- Business Administration (2)
- Cloud computing (2)
- Commercial identity theft (2)
- Criminal Justice Reform (2)
- Cyber Security (2)
- Cyber attacks (2)
- Data analytics (2)
- Data breaches (2)
- Data security (2)
- Employee retention strategies (2)
- Environment (2)
- Government (2)
- Higher education (2)
- IT employee needs (2)
- IT employee retention (2)
- IT manager strategies (2)
- Identity fraud (2)
- Identity theft (2)
Articles 31 - 60 of 106
Full-Text Articles in Entire DC Network
Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii
Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii
Walden Dissertations and Doctoral Studies
Many data scientists are struggling to adopt effective data governance practices as they transition from traditional data analysis to big data analytics. Data governance of big data requires new strategies to deal with the volume, variety, and velocity attributes of big data. The purpose of this qualitative multiple case study was to explore big data governance strategies employed by data scientists to provide a holistic perspective of those data for making decisions. The participants were 10 data scientists employed in multiple mid-market companies in the greater Salt Lake City, Utah area who have strategies to govern big data. This studyâs …
Strategies To Implement A Material Management Information System For Medical Device Recalls, Paul Leo Lafrance
Strategies To Implement A Material Management Information System For Medical Device Recalls, Paul Leo Lafrance
Walden Dissertations and Doctoral Studies
Health care business executives lack strategies to implement material management information systems (MMIS) related to medical device recalls. Lacking sufficient MMIS, health care business executives face insufficient product tracking related to medical devices affecting operational efficiency. Grounded in the conceptual frameworks of the technology acceptance model and diffusion of innovation, the purpose of this qualitative single case study was to explore health care business executives’ strategies for implementing an MMIS related to medical device recalls. The participants were 6 health care executives who implemented an MMIS in an urban hospital in the northeast region of the United States. Data were …
Evaluation Of Telehealth Applications For Patients Seeking Hospice Care, Victoria Emma Surujlall
Evaluation Of Telehealth Applications For Patients Seeking Hospice Care, Victoria Emma Surujlall
Walden Dissertations and Doctoral Studies
Telehealth (TH) is one of the newest avenues for improving accessibility and healthcare accommodations for patients with chronic health issues and terminal illness. The purpose of a quality improvement (QI) initiative at the project site was to align current evidence-based practice to address the disparities in the admissions process experienced by patients seeking hospice care from remote locations. The health belief model and Roger's diffusion of innovation theory were used to inform this doctor of nursing QI evaluation project to determine whether using a standardized evidence-based intake assessment process delivered by TH would increase accessibility for patients seeking hospice services. …
Strategies To Mitigate The Effects Of Identity Theft In The Hospitality Industry, Patricia Lee Jirsa
Strategies To Mitigate The Effects Of Identity Theft In The Hospitality Industry, Patricia Lee Jirsa
Walden Dissertations and Doctoral Studies
Leaders in the U.S. hospitality industry experience significant losses in profitability, increased mitigation cost, and reduced revenues because of business and consumer identity theft. Grounded in the fraud triangle theory and the fraud diamond theory, the purpose of this qualitative multiple-case study was to explore strategies leaders in the hospitality industry use to mitigate identity theft. A purposeful sample of 5 leaders of 5 different hospitality businesses in Montana participated in the study. Data were collected through semistructured interviews, member checking, and a review of company documents. During data analysis using Yin’s 5-step process, 3 key themes emerged: a new …
Strategies To Implement Big Data Analytics In Telecommunications Organizations, Delton Aneato
Strategies To Implement Big Data Analytics In Telecommunications Organizations, Delton Aneato
Walden Dissertations and Doctoral Studies
Information Technology (IT) leaders who do not invest in big data projects may struggle to gain a competitive advantage and business insights to improve performance. Grounded in the Kotterâs change and Six Sigma models, the purpose of this qualitative multiple case study was to explore strategies IT leaders used to implement big data analytics successfully. The participants comprised 4 IT leaders from 2 telecommunication organizations in the United States of America, who effectively used strategies to promote and maximize competitive advantage using big data analytics. Data were collected from semistructured interviews, company documents, and project-related documents and were analyzed using …
Strategies For Reducing Adverse Medical Events From Implanted Medical Devices, Gary John Zack
Strategies For Reducing Adverse Medical Events From Implanted Medical Devices, Gary John Zack
Walden Dissertations and Doctoral Studies
Managing medical device monitoring processes is challenging and lacks a realtime, life cycle tracking strategy to reduce adverse medical events and revision costs for hospital administrators, physicians, and patients. Understanding the malfunctions of medical devices for cardiac and orthopedic patients could save lives and reduce hospital liability. Grounded in the business process reengineering conceptual framework, the purpose of this single qualitative case study was to explore strategies hospital managers used to redesign the implant recall surveillance process at one hospital in Pennsylvania. The 5 participants selected successfully implemented a medical device surveillance process that reduced adverse medical events and revision …
Factors Affecting Electronic Banking Adoption In Barbados, Jacqueline Delores Bend
Factors Affecting Electronic Banking Adoption In Barbados, Jacqueline Delores Bend
Walden Dissertations and Doctoral Studies
The low rate of customers' adoption of electronic banking services affects retail banks' profitability. The operating cost for a financial transaction performed by bank tellers averages US$1.07 compared to US$0.01 using electronic banking channels. It is paramount for retail banking leaders to understand the factors influencing customer adoption of electronic banking to sustain competitive advantage. Grounded in the technology acceptance model framework, the purpose of this quantitative correlational study was to examine the relationship between perceived usefulness (PU), perceived ease of use (PEOU), and customer adoption of electronic banking in Barbados. The validated technology acceptance model survey instrument was used …
Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove
Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove
Walden Dissertations and Doctoral Studies
Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …
The Impact Of Technological Advances On Older Workers, Toni Mcintosh
The Impact Of Technological Advances On Older Workers, Toni Mcintosh
Walden Dissertations and Doctoral Studies
The general problem addressed in this study was the treatment of older workers in the information technology industry that contributes to age discrimination in the workplace. Age discrimination is against the law irrespective of whether it is aimed at older workers in the workforce or becoming job candidates at an advanced age. Although previous research has shown that age discrimination is prevalent in work environments, little has been suggested to eradicate the issue in the workplace. The purpose of this qualitative case study was to investigate the issue of age discrimination as it relates to workers over the age of …
Mathematics Cognitive And Content Abilities Across The Vincentian Student Population, Brendalee Rorena Cato
Mathematics Cognitive And Content Abilities Across The Vincentian Student Population, Brendalee Rorena Cato
Walden Dissertations and Doctoral Studies
Mathematics achievement is a key component of student overall academic achievement. However, many students from Saint Vincent and the Grenadines (Vincentian students) continue to perform poorly on the regional Caribbean Secondary Examination Certificate (CSEC) mathematics examination. This poor mathematics performance is a concern for education stakeholders. The purpose of this quantitative, nonexperimental study was to explore the extent to which the CSEC mathematics scores of high-scoring Vincentian students versus low-scoring Vincentian students in the cognitive domains of knowledge, comprehension, and reasoning differ across the content domains of algebra; geometry; measurement; statistics; and relations, functions, and graphs (RFG). The theoretical foundation …
Youth Leadership Development Program Evaluation, Loreley Lyn Smith
Youth Leadership Development Program Evaluation, Loreley Lyn Smith
Walden Dissertations and Doctoral Studies
In competitive youth sports organizations, few organizational leaders focus on leadership development to prepare youth for life situations. Sports organizational leaders are concerned about youth leadership development, as development allows youth to build skills necessary to understand their strengths and weaknesses and recognize ways to overcome fears. Grounded in social learning theory, the purpose of this summative program evaluation was to determine the extent to which a competitive youth sports leadership development program aligned with the organizationâs primary objective to provide skilled athletic training while providing lessons to prepare youth for adulthood. The participants comprised 40 key stakeholders, including participants …
Analysis Of Driving Forces That Ensures The Sustainability Of Voter Accreditation Technology, Lawrence Oluwagbenga Bayode
Analysis Of Driving Forces That Ensures The Sustainability Of Voter Accreditation Technology, Lawrence Oluwagbenga Bayode
Walden Dissertations and Doctoral Studies
Nigeria’s electoral body, the independent national electoral commission (INEC), deployed a novel information technology (IT) based voter accreditation technology in 2015. Benefits realized included transparency and curtailed electoral malpractices. The purpose of this quantitative correlational study was to examine the relationship(s) between some variables categorized into technological, organizational, and economic factors, and Sustainability of voter accreditation technology (SVAT). The theoretical framework for the study was the e-voting system adoption model in combination with constructs from three other theories. A total of 138 IT experts participated and were asked (via SurveyMonkey) of the relationships between the following factors and SVAT: ease …
Sustainability Strategies Of Small Business Owners In Northcentral Texas, Danielson Ledum Dukor
Sustainability Strategies Of Small Business Owners In Northcentral Texas, Danielson Ledum Dukor
Walden Dissertations and Doctoral Studies
While small businesses contribute significantly to job creation in the United States, they fail financially at alarming rates. Fifty percent of small businesses survive 5 years or longer, and only one-third of small business startups survive more than 10 years. Owners of small businesses could benefit from strategies used to mitigate the small firms’ failure rate by obtaining suitable leadership values and skills, understanding the business’s nature, and engaging in financial planning. Grounded in Schumpeter’s entrepreneurship theory, the purpose of this qualitative multiple case study was to explore strategies small home health business owners used to sustain their businesses beyond …
Relationship Between Nonprofit Leadership Intention, Leadership Development Programs, And Succession Planning Documentation, Denise March
Relationship Between Nonprofit Leadership Intention, Leadership Development Programs, And Succession Planning Documentation, Denise March
Walden Dissertations and Doctoral Studies
Understanding the importance of efficient and effective leadership transition to retain organizational intelligence can mitigate the risks of significant disruption. The problem for nonprofits is the potential loss of organizational intelligence, funding, and continuity as baby boomers retire and transition out of their leadership roles without effectively addressing leadership transition and an impending leadership deficit. The purpose of this quantitative descriptive correlational study was to examine the relationship between leadership intention factors, succession planning documentation, and leadership development programs. The research questions pertained to the relationship between leadership intention factors, succession planning documentation, and leadership development programs. Ajzen’s theory of …
Strategies Used By It Project Managers To Integrate Icts In The Eastern Caribbean, Carl St. Aubin Roberts
Strategies Used By It Project Managers To Integrate Icts In The Eastern Caribbean, Carl St. Aubin Roberts
Walden Dissertations and Doctoral Studies
Current practices used to guide information and communication technology (ICT) projects in the Caribbean and developing countries lead to high project failure rates. Project managers must adopt new innovative approaches for transformation towards a 21st-century information society and sustainable digital economies. Grounded in the technology acceptance model (TAM), the purpose of this qualitative multiple-case study was to explore strategies information technology (IT) project managers use to implement IT frameworks designed to guide Caribbean ICT integration. Data were collected from face to face interviews and company documents and analyzed using coding, thematic analysis, and methodological triangulation. The participants were 12 IT …
Technology Business Leaders' Strategies To Increase Employees' Engagement, Desmond J. L. Browne
Technology Business Leaders' Strategies To Increase Employees' Engagement, Desmond J. L. Browne
Walden Dissertations and Doctoral Studies
AbstractEmployee disengagement is costly and reduces an organization's ability to meet its full potential to produce business results. Technology business leaders who have engaged employees can positively alter the company's rapid transformation to be more competitive. Grounded by the social exchange theory, the purpose of this qualitative single case study was to explore strategies 6 technology leaders in the Atlanta metropolitan area use to engage employees. Data were collected through semistructured interviews and company documents. Data were analyzed using Yin's 5-step data analysis process. Three themes emerged: communicate with transparency, provide offerings for training and rewards, and identify and implement …
Exploring The Relationship Between Iot Security And Standardization, James Jenness Clapp
Exploring The Relationship Between Iot Security And Standardization, James Jenness Clapp
Walden Dissertations and Doctoral Studies
The adoption of the Internet of Things (IoT) technology across society presents new and unique challenges for security experts in maintaining uninterrupted services across the technology spectrum. A botnet implemented over 490,000 IoT connected devices to cripple the Internet services for major companies in one recent IoT attack. Grounded in Rogerâs diffusion of innovations theory, the purpose of this qualitative exploratory multiple-case study was to explore implementation strategies used by some local campus IT managers in educational institutions in the United States to secure the IoT environment. The participants were 10 IT local campus IT managers within educational institutions across …
Denial Of Service Attacks: Difference In Rates, Duration, And Financial Damages And The Relationship Between Company Assets And Revenues, Abebe Gebreyes
Denial Of Service Attacks: Difference In Rates, Duration, And Financial Damages And The Relationship Between Company Assets And Revenues, Abebe Gebreyes
Walden Dissertations and Doctoral Studies
AbstractDenial-of-service/distributed denial-of-service (DoS) attacks on network connectivity are a threat to businesses that academics and professionals have attempted to address through cyber-security practices. However, currently there are no metrics to determine how attackers target certain businesses. The purpose of this quantitative study was to address this problem by, first, determining differences among business sectors in rates and duration of attacks and financial damages from attacks and, second, examining relationship among assets and/or revenues and duration of attacks and financial damages. Cohen and Felson's routine activity theory and Cornish and Clarke's rational choice theory served as frameworks as they address the …
Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch
Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch
Walden Dissertations and Doctoral Studies
AbstractElectronic health record system implementations have a high failure rate when properly developed strategies are not used. These implementation failures affect healthcare workers and practitioners core roles through a lack of documentation practices, which decreases the quality of the care of the patients. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore the strategies information technology systems engineers use for the implementation of Health Information Management Systems. The participants were 10 information technology systems engineers from three healthcare organizations in the greater Tennessee area. The data were collected through recorded participant interviews …
Information Technology Strategies Automotive Retailers Use To Improve Customer Retention, Alexious Mulemba
Information Technology Strategies Automotive Retailers Use To Improve Customer Retention, Alexious Mulemba
Walden Dissertations and Doctoral Studies
Business managers in the automotive retail industry face challenges in retaining customers in sales operations. Automotive business managers' failure to retain customers negatively affects sales, revenue, and sustainable business performance. Grounded in expectation-confirmation theory, the purpose of this qualitative multiple case study was to explore the IT strategies some business managers use in the automotive retail industry to retain customers. The participants comprised 4 business managers from 2 automotive retail dealerships in the Western Region of Saudi Arabia, who used IT strategies to retain customers. Data were collected from semistructured interviews, interview notes, and company documents. Four themes emerged: customer …
Engaging External Stakeholders To Improve Public-Private Partnership Water Project Completion Rates, John Paul Kolman
Engaging External Stakeholders To Improve Public-Private Partnership Water Project Completion Rates, John Paul Kolman
Walden Dissertations and Doctoral Studies
Public-private partnership (PPP) water projects may have competing external stakeholders, resulting in a disproportionately high project failure rate when compared to other types of infrastructure projects. Private companies and local governments use PPP projects as a means to bridge deficiencies in local government funding and knowledge to assist in bringing improved water to their communities. The purpose of this qualitative single case study was to examine strategies leaders use to engage their external stakeholders in improving their PPP project completion rates. The study was grounded in Freeman's stakeholder theory. The participants consisted of 3 leaders who recently completed stakeholder activities …
Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna
Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna
Walden Dissertations and Doctoral Studies
Healthcare organizations generate massive amounts of data through their databases that may be vulnerable to data breaches due to extensive user privileges, unpatched databases, standardized query language injections, weak passwords/usernames, and system weaknesses. The purpose of this qualitative multiple case study was to explore technical strategies database managers in Southeast/North Texas used to protect database systems from data breaches. The target population consisted of database managers from 2 healthcare organizations in this region. The integrated system theory of information security management was the conceptual framework. The data collection process included semistructured interviews with 9 database managers, including a review of …
Social Presence, Immediacy Of Communication, Concurrency, And Use Of Enterprise Social Networks, Veleta A. Gordon
Social Presence, Immediacy Of Communication, Concurrency, And Use Of Enterprise Social Networks, Veleta A. Gordon
Walden Dissertations and Doctoral Studies
Managers are faced with low continuous postadoption usage rates for enterprise social networks implemented at high costs. The problem is a potential loss of value-added benefits when organizations experience a lapse in continuous usage of enterprise social networks among corporate knowledge workers. The purpose of this quantitative study was to test the unified theory of acceptance and use of technology that relates collaboration technology constructs to continuous usage of enterprise social networks for knowledge workers at information technology Fortune 500 companies in the United States. The key research question aimed to examine the relationship among social presence, immediacy of communication, …
Perceptions, Potholes, And Possibilities Of Using Digital Voice Assistants To Differentiate Instructions, Adrian A. Weir
Perceptions, Potholes, And Possibilities Of Using Digital Voice Assistants To Differentiate Instructions, Adrian A. Weir
Walden Dissertations and Doctoral Studies
Access to technologies and understanding the potential uses of technology to differentiate instruction have been a concern for the teachers and students in a local school district located in the southeastern United States. Despite the emergence of digital voice assistants (DVAs) as tools for instructions, teachers lack knowledge and strategies for using DVAs to differentiate instruction in their classrooms. The purpose of this qualitative study was to identify teacher knowledge and strategies employed among special education (SPED) teachers using DVAs to differentiate instruction in their classrooms. The concepts of Carol Tomlinson’s differentiation theory and Mishra and Koehler’s TPACK framework served …
Strategies To Digitize Business Processes, Mohamed Abdelmoneim
Strategies To Digitize Business Processes, Mohamed Abdelmoneim
Walden Dissertations and Doctoral Studies
Information technology leaders with limited digitization strategies are less profitable than competitors in the same industry. Without digital strategies, information technology leaders suffer from manual business processes, which results in losing business opportunities. Grounded in general systems theory, the purpose of this multiple case study was to explore the strategies that 10 IT leaders used to transform business processes digitally at four different organizations in Ireland. Data were collected using semistructured face-to-face interviews. The second data source was organizational digitization documents. The 3 themes that emerged from thematic analysis were (a) strong digital leadership competencies, (b) digitally aligned with the …
Effective Data Analytics And Security Strategies In Internal Audit Organizations, Desiree Auchey
Effective Data Analytics And Security Strategies In Internal Audit Organizations, Desiree Auchey
Walden Dissertations and Doctoral Studies
The digitization of the corporate and regulatory environment presents an opportunity for internal audit organizations to change their audit techniques and increase their value to corporations. Audit functions have not kept pace with these advancements, as evidenced by the massive frauds in recent years, and current audit methodology does not robustly incorporate analytics and security of data. Grounded in agency theory, the purpose of this qualitative case study was to explore successful strategies business leaders use to implement data analytics and security for internal auditing and fraudulent activity. The participants comprised 3 audit leaders in Pennsylvania, who effectively used data …
Cloud Adoption Decision-Making Processes By Small Businesses: A Multiple Case Study, Francis Blay
Cloud Adoption Decision-Making Processes By Small Businesses: A Multiple Case Study, Francis Blay
Walden Dissertations and Doctoral Studies
Cloud services have emerged as a compelling technology with immense benefits, but many companies still have concerns about cloud services adoption because of several failures that have occurred, including mistakes by service providers, exploitation of security flaws by hackers, and immature policies and procedures. The specific problem is how small businesses often lack the understanding of the ramifications of their respective decision-making processes to adopt cloud services. There is little understanding of the decision-making processes managers use in cloud services adoption. The purpose of this qualitative multiple case study was to explore the decision-making processes of 3 small businesses in …
The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo
The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo
Walden Dissertations and Doctoral Studies
As consumers increase the use of smart technologies, the lack of or improper implementation of Internet of Things (IoT) systems may affect the profitability of hotel businesses. For this qualitative single case study, Porter’s value chain model was the conceptual framework. The data collection process also included direct observations, participant observations, company performance documents, and reflective journaling. Data analysis from multiple sources of data was triangulated to hoteliers revealing that the implementation of IoT systems strategies may increase profit through the use of IoT system technology. Using Yin’s 5-step process, data were coded and analyzed and produced 3 themes: offer …
Effective Strategies Processing Companies Use To Sustain Business Operations Beyond 5 Years, Travis C. Souders
Effective Strategies Processing Companies Use To Sustain Business Operations Beyond 5 Years, Travis C. Souders
Walden Dissertations and Doctoral Studies
Some small food processing businesses in the United States lack strategies to remain financially viable beyond 5 years of operation. Owners and managers of small food processing businesses could benefit from an improved understanding of the importance of effective strategies to improve small business sustainability. Grounded in systems theory, the purpose of this qualitative single case study was to explore strategies small food processing companies use to sustain operations beyond 5 years. The participants were 1 small-business owner and 8 managers in Lexington, Kentucky, who used effective strategies to sustain business operations beyond 5 years. Data collected came from semi-structured …
Relationship Between Corporate Social Responsibility And Social Performance Of Small Businesses, Melva Steps
Relationship Between Corporate Social Responsibility And Social Performance Of Small Businesses, Melva Steps
Walden Dissertations and Doctoral Studies
Small business leaders affected by negative social performance may also experience a diminishing customer base and minimized profits. Grounded in the strategic success paradigm framework, the purpose of this quantitative correlational study was to examine the relationship between four elements of corporate social responsibility (CSR) strategic posture (workplace, marketplace, community, and environment) and social performance. The participants consisted of retail trade small business owners in the United States. The Survey of CSR in Small Business was conducted via SurveyMonkey and provided the data for analysis (N = 85). Results of multiple linear regression analysis showed that the regression model significantly …