Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 69

Full-Text Articles in Entire DC Network

Consumers Perspectives On Using Biometric Technology With Mobile Banking, Rodney Alston Clark Jan 2021

Consumers Perspectives On Using Biometric Technology With Mobile Banking, Rodney Alston Clark

Walden Dissertations and Doctoral Studies

The need for applying biometric technology in mobile banking is increasing due to emerging security issues, and many banks’ chief executive officers have integrated biometric solutions into their mobile application protocols to address these evolving security risks. This quantitative study was performed to evaluate how the opinions and beliefs of banking customers in the Mid-Atlantic region of the United States might influence their adoption of mobile banking applications that included biometric technology. The research question was designed to explore how performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC), perceived credibility (PC), and task-technology fit (TTF) affected …


Meaningful Use Criteria And Staff Accountability In An Office Setting, Marcia Ionie Pender Jan 2021

Meaningful Use Criteria And Staff Accountability In An Office Setting, Marcia Ionie Pender

Walden Dissertations and Doctoral Studies

Proper documentation for meaningful use (MU) criteria within electronic health records (EHRs) was identified as an issue for office staff at a local primary care office in a metropolitan area of Central Florida. The project question addressed the local gap in knowledge about MU standards necessary to ensure correct documentation of EHRs. The purpose of this doctoral project was to provide an educational program for staff to ensure compliance with the HITECH Act of 2009. Lewin’s Change Theory and Knowles Theory of Adult learning were the conceptual foundations for the educational program. The project question was to determine whether a …


A Multicase Study Of Critical Success Factors Of Self-Service Business Intelligence Initiatives, Eva Shepherd Jan 2021

A Multicase Study Of Critical Success Factors Of Self-Service Business Intelligence Initiatives, Eva Shepherd

Walden Dissertations and Doctoral Studies

Information technology (IT) managers have sparse information on the critical success factors (CSFs) needed for self-service business intelligence (SSBI) initiatives among casual users. The purpose of this qualitative, multicase study was to describe Business Intelligence (BI) experts’ views on the CSFs needed for self-service BI initiatives among casual users in the post-implementation stage. To meet this purpose, a multicase study design was used to collect data from a purposeful sample of 10 BI experts. Semistructured interviews, archival data, and reflective field notes drove the credibility of the multicase study’s findings through data triangulation. Two conceptual models framed this study: Lennerholt …


Benefits Of Technology Integration In A Small Behavioral Health Organization, Tremaria Sweet Jan 2021

Benefits Of Technology Integration In A Small Behavioral Health Organization, Tremaria Sweet

Walden Dissertations and Doctoral Studies

The current study sought to understand the significance of information systems (IS) planning in small-to-medium enterprise (SME) behavioral health agencies and the direct impact it has on organizational growth and performance. The research was guided by the Baldrige Excellence Framework. The study was based on a sample of one senior leader from one agency licensed to practice in three states in the eastern region of the United States. This exploratory case study involved using semi-structured interviews and internal archival data during the process of data collection. Information technology (IT) competence, skills, leadership, infrastructure, and awareness were emergent themes identified in …


Sustainability Strategies For Small Business Organizations, Tajudeen O. Olatunji Jan 2021

Sustainability Strategies For Small Business Organizations, Tajudeen O. Olatunji

Walden Dissertations and Doctoral Studies

Small and medium-sized enterprises (SMEs) are essential to every nation’s economic growth, including the United States, but more than 67% of SMEs fail within the first 10 years. When SMEs implement long term business sustainability strategies, they continue to generate business and remain profitable, enabling SMEs to remain viable and contribute to local community employment opportunities. Using entrepreneurship theory as the conceptual framework, the purpose of this multiple case study was to explore strategies used by 3 SME owners in the northeastern region of the United States to sustain their businesses beyond 10 years. Data were collected using semistructured interviews …


Cyberattacks Strategy For Nonprofit Organizations, Yawo Obimpe Kondo Jan 2021

Cyberattacks Strategy For Nonprofit Organizations, Yawo Obimpe Kondo

Walden Dissertations and Doctoral Studies

Information system security managers (ISSM) in nonprofits face increased cyberattack cases because nonprofits often use basic technology to save on costs. Nonprofit owners and managers need solutions to secure their data from cyberattacks. Grounded in the general systems theory, the purpose of this qualitative multiple case study was to explore strategies ISSMs at nonprofit organizations employ to protect against cyberattacks. Participants included five IT managers and directors of information technology in charge of security management in nonprofit organizations in Maryland, the District of Columbia, and Virginia. Data was generated through interviews and reviews of archival documents. The data analysis technique …


Successful Strategies For Adopting Open-Source Software, Balla Barro Jan 2021

Successful Strategies For Adopting Open-Source Software, Balla Barro

Walden Dissertations and Doctoral Studies

Middle-level information systems managers (ISMs) in small-scale organizations often have challenges in determining the most appropriate strategy for adopting open-source software (OSS) in their organizations. The ISMs need to determine the right strategy for adopting OSS to protect the organizations’ information technology infrastructure. Grounded in the diffusion of innovation theory, the objective of this multiple case study was to explore strategies middle-level ISMs used to adopt OSS in their small-scale organizations. Six middle-level ISMs from three small-scale organizations with experience of not less than six years in OSS adoption strategy in the city of Frederick, Maryland, shared their strategies during …


An Analysis Of Liquefied Petroleum Gas Adoption For Household Cooking In Nigeria, Saheed Olanrewaju Lasisi Jan 2021

An Analysis Of Liquefied Petroleum Gas Adoption For Household Cooking In Nigeria, Saheed Olanrewaju Lasisi

Walden Dissertations and Doctoral Studies

The Nigerian government established a domestic liquefied petroleum gas penetration program (DLPGPP) to support Nigerian households that still use traditional fuels, which are inefficient and hazardous for users while polluting and degrading the environment. Little is known about the relationships that exist among liquefied petroleum gas (LPG) accessibility, LPG affordability, and LPG adoption to guide DLPGPP implementation. Narrowing this gap was the purpose of this study using the general framework of consumer theory. The study's research questions addressed the effects of LPG affordability and LPG accessibility on LPG adoption for cooking in Nigeria’s households. A cross-sectional, correlational survey was employed …


Factors Affecting The Productivity And Satisfaction Of Virtual Workers, Teresa Peoples Jan 2021

Factors Affecting The Productivity And Satisfaction Of Virtual Workers, Teresa Peoples

Walden Dissertations and Doctoral Studies

Advancements in technology have ushered in new digital enterprises, shifting the trend from a conventional workforce to a virtual workforce and giving rise to new challenges for managers. However, the factors affecting virtual worker productivity and job satisfaction are not well known. The purpose of this study was to identify these factors and determine what managers can do to enhance them. The theoretical foundation for this study included sociotechnical theory and content theory as they relate to the motivation and communication needs of the virtual workforce. This qualitative phenomenological study was an exploration of factors that affect virtual workers' productivity …


The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo Jan 2021

The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo

Walden Dissertations and Doctoral Studies

Despite information technology (IT) officers’ multiple efforts to develop reliable and efficient electronic justice (e-justice) systems, digitizing court processes still presents several quality challenges associated with IT infrastructure and literacy issues. Grounded in the principles of total quality management, the purpose of this qualitative multiple case study was to identify strategies and best practices IT officers in African regional economic communities (REC) use for digitizing regional and subregional court processes to improve African e-justice systems. The participants included four IT officers working as assistant computer system analysts (ACSA), computer system analysts (CSA), and heads of IT (HIT) in regional and …


Mobile Technology Use By Rural Farmers And Herders, Mohamed Ali Jan 2021

Mobile Technology Use By Rural Farmers And Herders, Mohamed Ali

Walden Dissertations and Doctoral Studies

Mobile technology business leaders from many mobile technology companies practice digital apartheid when improving rural farmers' communication and technology infrastructure in developing countries. Mobile technology business leaders who do not effectively plan mobile technology infrastructure deployment to rural farmers and herders are at a high risk of failure. Grounded in adaptive structuration theory of technology, the purpose of this qualitative multiple case study was to explore strategies mobile technology business leaders used to improve the mobile technology infrastructure for rural farmers and herders in the United Republic of Tanzania. The participants comprised three mobile technology business leaders from three different …


User Awareness And Knowledge Of Cybersecurity And The Impact Of Training In The Commonwealth Of Dominica, Jermaine Jewel Jean-Pierre Jan 2021

User Awareness And Knowledge Of Cybersecurity And The Impact Of Training In The Commonwealth Of Dominica, Jermaine Jewel Jean-Pierre

Walden Dissertations and Doctoral Studies

The frequency of cyberattacks against governments has increased at an alarming rate and the lack of user awareness and knowledge of cybersecurity has been considered a contributing factor to the increase in cyberattacks and cyberthreats. The purpose of this quantitative experimental study was to explore the role and effectiveness of employee training focused on user awareness of cyberattacks and cybersecurity, with the intent to close the gap in understanding about the level of awareness of cybersecurity within the public sector of the Commonwealth of Dominica. The theoretical framework was Bandura’s social cognitive theory, following the idea that learning occurs in …


Strategies For Integrating The Internet Of Things In Educational Institutions, Anthony Kofi Harvey Jan 2021

Strategies For Integrating The Internet Of Things In Educational Institutions, Anthony Kofi Harvey

Walden Dissertations and Doctoral Studies

The introduction of the Internet of Things (IoT) into educational institutions has necessitated the integration of IoT devices in the information technology (IT) infrastructural environment of educational institutions. Many IT leaders at educational institutions, however, lack strategies for integrating and deploying IoT devices in their institutions, which has resulted in numerous security breaches. The purpose of this study was to explore security strategies adopted by IT administrators to prevent data breaches resulting from the integration of IoT devices in their educational institutions. The diffusion of innovations theory served as the conceptual framework for this qualitative multiple case study. Eleven IT …


Strategies To Protect Against Security Violations During The Adoption Of The Internet Of Things By Manufacturers, Sixtus Anayochukwu Ekwo Jan 2021

Strategies To Protect Against Security Violations During The Adoption Of The Internet Of Things By Manufacturers, Sixtus Anayochukwu Ekwo

Walden Dissertations and Doctoral Studies

Security violations have been one of the key factors affecting manufacturers in adopting the Internet of Things (IoT). The corporate-level information technology (IT) leaders in the manufacturing industry encounter issues when adopting IoT due to security concerns because they lack strategies to protect against security violations. Grounded in Roger’s diffusion of innovations theory, the purpose of this qualitative multiple case study was to explore strategies corporate-level IT leaders use in protecting against security violations while adopting IoT for manufacturers. The participants were senior IT leaders in the eastern region of the United States. The data collection process included interviews with …


Exploring The Value Of Technology Within Cross-Departmental Communications, Brian J. Luckey Jan 2021

Exploring The Value Of Technology Within Cross-Departmental Communications, Brian J. Luckey

Walden Dissertations and Doctoral Studies

While many midsized businesses have invested in technology to support business operations, most have not realized the potential value of using technology to collaborate cross-departmentally. There is a lack of knowledge concerning strategies for using technology to facilitate effective organizational communications, which has resulted in operating technology investments being made without corresponding investments in communication technologies. The purpose of this qualitative case study was to fill the knowledge gap concerning the impact of technology for cross-departmental communications. The theoretical foundation for this study was based on systems theory, organizational theory, and stakeholder theory. The key research question involved the impact …


Insider Threats' Behaviors And Data Security Management Strategies, Gladys C. Cooley Jan 2021

Insider Threats' Behaviors And Data Security Management Strategies, Gladys C. Cooley

Walden Dissertations and Doctoral Studies

As insider threats and data security management concerns become more prevalent, the identification of risky behaviors in the workplace is crucial for the privacy of individuals and the survival of organizations. The purpose of this three-round qualitative Delphi study was to identify real-time consensus among 25 information technology (IT) subject matter experts (SMEs) in the Washington metropolitan area about insider threats and data security management. The SMEs participating in this study were adult IT professionals and senior managers with certification in their area of specialization and at least 5 years of practical experience. The dark triad theory was the conceptual …


Multigenerational Family Firm Succession Planning For Transgenerational Sustainability, Janine Michelle Moore-Williams Jan 2021

Multigenerational Family Firm Succession Planning For Transgenerational Sustainability, Janine Michelle Moore-Williams

Walden Dissertations and Doctoral Studies

AbstractFamily firm businesses represent 90% of the global economy and have a 70% first-generation failure rate; business sustainability could have a tremendous impact on the U.S. economy. Grounded in the sustainable family business theory, the purpose of this qualitative multiple case study was to explore strategies used by four California-based, multigenerational family firm leaders who successfully implemented succession planning processes to transfer leadership of their family firm. Data were collected by reviewing firm documents, public information, and semistructured interviews. Data were analyzed using thematic analysis and methodological triangulation, and five themes emerged: leader strategies to implement succession planning, strategies for …


Factors For Consideration In A Plan For Terrestrial Oil Disaster Mitigation, Olaniyi O. Oyebode Jan 2021

Factors For Consideration In A Plan For Terrestrial Oil Disaster Mitigation, Olaniyi O. Oyebode

Walden Dissertations and Doctoral Studies

Oil spills, are common disasters associated with hydrocarbon exploration and production, can be devastating and severely impact water quality, which can be detrimental to human life and the environment. One of the primary objectives of oil spill planning and response, aside from protecting human beings, is to reduce the environmental consequences of spills and cleanup efforts. This objective is best achieved by responders identifying sensitive resources ahead of time to establish protection priorities and select cleanup strategies. When a plan is well situated, within the limited hours available to respond, responders will not have to contact all of the various …


Impact Of Case Management On Childhood Lead Exposure In Marion County, Indiana, Maliki Yacouba Jan 2021

Impact Of Case Management On Childhood Lead Exposure In Marion County, Indiana, Maliki Yacouba

Walden Dissertations and Doctoral Studies

The Centers for Disease Control and Prevention recently declared that no amount of childhood blood lead level (BLL) is safe. The purpose of this quantitative study with a retrospective cohort design was to evaluate the effectiveness of case management intervention on children diagnosed with elevated BLL (EBLL; ≥ 5 μg/dL) in Marion, County, Indiana. The health belief model was used as the theoretical foundation for the study. A data set of 160 lead exposure case management records was analyzed to find whether: (a) BLL at post-case-management time significantly differ from BLL at baseline (b) BLL at post-case-management time is affected …


Teacher Perceptions Of Using Standards-Based Rubrics For Monitoring Student Growth In Teacher Evaluation, Jennette Susan Winters Jan 2021

Teacher Perceptions Of Using Standards-Based Rubrics For Monitoring Student Growth In Teacher Evaluation, Jennette Susan Winters

Walden Dissertations and Doctoral Studies

In the United States, national and state legislative mandates have forced school districts to include student growth measures in teacher evaluation systems. However, statistical models for monitoring student growth on standardized tests have not been found to foster teachers’ reflective practice or pedagogical content knowledge and goal-based models have been found to lack adequate structure for supporting implementation. This basic qualitative inquiry explored how teachers perceive using standards-based rubrics to monitor student growth for teacher evaluation influences their reflective practice and pedagogical content knowledge in mathematics. Nine teachers who have used standards-based rubrics to monitor student growth were recruited through …


Retention Strategies To Ensure Financial Sustainability In Community Colleges, Claudia Yvette Provost Jan 2021

Retention Strategies To Ensure Financial Sustainability In Community Colleges, Claudia Yvette Provost

Walden Dissertations and Doctoral Studies

AbstractA rapid decline in student retention among community colleges reduces revenue and jeopardizes financial sustainability, meaning leaders of community colleges who lack strategies to retain students have lower revenue and financial sustainability. Grounded in the advocacy and participatory worldview conceptual framework, the purpose of this qualitative, single case study was to explore strategies leaders of community colleges used to increase student retention and revenues for achieving financial sustainability. A purposeful sampling of five leaders from a community college in Louisiana who successfully used strategies to increase student retention participated in this study. Data were collected from semistructured interviews and institutional …


Strategies To Overcome Constraints For Small Business Sustainability, Jaquane Mawyne Jones Jan 2021

Strategies To Overcome Constraints For Small Business Sustainability, Jaquane Mawyne Jones

Walden Dissertations and Doctoral Studies

More than 20% of small businesses that started in March 2018 failed within a year. Small business owners would benefit from strategies to identify and mitigate constraints from inception for business survival because business failure rates are higher among small businesses less than five years old. Grounded in the theory of constraints, the purpose of this qualitative multiple case study was to explore strategies small business owners use to sustain beyond the one year of operation. The participants included six small business owners in Georgia who successfully sustained their business beyond five years. Data were collected using semistructured interviews and …


Knowledge Workers’ Daily Experiences With Technostress And Presenteeism: A Single Case Study, Teresa Himes Mcgovern Jan 2021

Knowledge Workers’ Daily Experiences With Technostress And Presenteeism: A Single Case Study, Teresa Himes Mcgovern

Walden Dissertations and Doctoral Studies

Despite the prominence of Information and Communication Technologies (ICT)-enabled technostress in organizations, there is a gap in the literature on how knowledge workers cope with technostress, and managers know little about the interface of ICT-induced presenteeism on employee productivity. The overarching research question was developed to address the purpose of this qualitative single case study with embedded units, which was to understand the perceptions of knowledge workers on the interface of technostress and ICT-induced presenteeism on their work productivity. This study was framed by the concept of presenteeism developed by Lohaus and Habermann within their comprehensive presenteeism model, a decision-integrated …


Security Strategies Information Technology Security Mangers Use In Deploying Blockchain Applications, Prince Nana Yaw Gyedu Nkrumah Jan 2021

Security Strategies Information Technology Security Mangers Use In Deploying Blockchain Applications, Prince Nana Yaw Gyedu Nkrumah

Walden Dissertations and Doctoral Studies

Blockchain is seen as a potential game-changer in many industries and a transformational technology in the 21st century. However, security concerns have made blockchain technology adoption relatively slow. Massive security breaches in cryptocurrency, an example of blockchain technology, have caused organizations to lose $11.3 billion in illegal transactions, exacerbating these security concerns for information technology (IT) security managers who are worried about the safety of blockchain. Grounded in the routine activity theory, the purpose of this multiple case study was to explore strategies used by IT security managers to deploy blockchain applications securely. The participants were 4 IT security managers …


Strategies For Small Business Entrepreneur Sustainability For 5 Years And Beyond, Ralph A. Heath Iii Jan 2021

Strategies For Small Business Entrepreneur Sustainability For 5 Years And Beyond, Ralph A. Heath Iii

Walden Dissertations and Doctoral Studies

AbstractSmall business failures impede entrepreneurs' sustainability in localities, the state, and the U.S. economy. Small business entrepreneurs are concerned about strategies to target and minimize obstacles from business inception for business survival because the failure rate increases as the business develop. Grounded in the entrepreneurial theory, the purpose of this qualitative multiple case study was to explore strategies for small business entrepreneur sustainability beyond five years. Participants comprised three small business owners in Southeast Virginia who effectively used strategies to sustain their business beyond five years. Data were collected from semistructured interviews, analysis of participants’ business documentation, and research of …


Information Technology Resources For Precision Medicine, Nicholas L. Bertram Jan 2021

Information Technology Resources For Precision Medicine, Nicholas L. Bertram

Walden Dissertations and Doctoral Studies

Healthcare delivery organizations have an opportunity to use insights from the emerging field of precision medicine to improve the quality of patient care; however, information technology resources to fully enable precision medicine are lacking. The specific problem was that people have limited information to use when making decisions regarding information technology resources for precision medicine in healthcare delivery organizations given the emerging state of precision medicine. The purpose of this Delphi study was to determine how a panel of precision medicine information technology experts view information technology resource importance and feasibility for precision medicine in healthcare delivery organizations. The research …


Mitigating It Security Risk In United States Healthcare: A Qualitative Examination Of Best Practices, Joann Hemann Jan 2021

Mitigating It Security Risk In United States Healthcare: A Qualitative Examination Of Best Practices, Joann Hemann

Walden Dissertations and Doctoral Studies

AbstractCyberattacks are ranked as third in the top 10 highest global threats in terms of likelihood, ranked after extreme weather events and natural disasters. Traditional technology risk management plans for preventative, detective, and recovery measures have failed to mitigate cybersecurity risks created by new technologies. The social problem addressed was the impact of cybercrime to the healthcare industry. The purpose of this qualitative classical Delphi study was to determine how a panel of 25 healthcare cybersecurity experts, based in the United States, viewed the desirability, feasibility, and importance of information technology (IT) cybersecurity risk mitigation techniques. The conceptual framework selected …


Maritime Cybersecurity Strategies For Information Technology Specialists, Angela Mizelle Griffin Jan 2021

Maritime Cybersecurity Strategies For Information Technology Specialists, Angela Mizelle Griffin

Walden Dissertations and Doctoral Studies

Dependence on digital technology increases cyber-related risks for maritime industries. As a result, the U.S. Coast Guard network is challenged with maritime cybersecurity, both economically and for national security. Grounded in the general systems theory, the purpose of this multiple case study was to explore strategies information technology (IT) specialists use to implement standard practices for ensuring cyber security. The participants included six IT specialists who have successfully implemented standard practices for maritime organizations in Virginia and West Virginia. Data were collected from individual semistructured interviews and a review of 12 external organizational documents available to the public from IT …


Enhancing Employee Engagement To Improve Financial Performance, Christine Lamacchia Jan 2021

Enhancing Employee Engagement To Improve Financial Performance, Christine Lamacchia

Walden Dissertations and Doctoral Studies

Business leaders are negatively affected when many employees are not engaged in their jobs. Business leaders who struggle to achieve employee engagement suffer decreased profitability, sales, employee retention, and customer satisfaction. Grounded in employee engagement theory, the purpose of this qualitative single case study was to explore strategies IT business leaders use to engage employees. The participants were five IT business leaders who successfully developed strategies to engage employees. Data were collected from semistructured interviews, company documents, and artifacts. Thematic analysis was used to analyze the data. Two themes emerged: creating a company culture conducive to employee engagement and using …


The Effect Of Social Media Use On Physical Isolation In Individuals With Borderline Personality Disorder, Davena Limitless Longshore Jan 2021

The Effect Of Social Media Use On Physical Isolation In Individuals With Borderline Personality Disorder, Davena Limitless Longshore

Walden Dissertations and Doctoral Studies

Individuals with borderline personality disorder (BPD) experience extreme interpersonal conflict, crippling their ability to sustain successful relationships. Consequently, clinicians within the psychological field face difficulty in devising treatments plans which can assist these individuals with suffering minimal relationship loss. The purpose of this study was to understand how current technological methods of social interaction affect individuals who suffer from BPD to improve treatment outcomes. This research was guided by the principles of attachment theory and social baseline theory. A quantitative correlational design using social network analysis and multiple regression analysis was used to examine data from surveys. Participants were solicited …