Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Walden Dissertations and Doctoral Studies

Databases and Information Systems

Information technology

Articles 1 - 20 of 20

Full-Text Articles in Entire DC Network

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams Jan 2023

The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams

Walden Dissertations and Doctoral Studies

The role that the information technology (IT) department serves is governed by the corporate culture and how it values the use of knowledge, including IT, to achieve a strategic competitive advantage. The purpose of this quantitative study was to examine the potential relationships between information acquisition, knowledge dissemination, shared interpretation, organizational memory, and organizational flexibility. Two theories served as the theoretical foundation for this study: contingency theory and the resource-based view of the firm. To answer the question of possible correlation between organizational flexibility and components of knowledge management, a randomly selected sample of 193 IT professionals employed at small- …


Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem Jan 2022

Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem

Walden Dissertations and Doctoral Studies

Since 2001, most government organizations’ IT modernization programs had failed because of ineffective implementation strategies from IT leaders. The research problem was the absence of effective strategies to modernize IT legacy systems. The purpose of this qualitative single case study was to explore effective IT modernization strategies to revolutionize IT legacy systems. The researcher sought to answer how organizations create effective strategies to modernize IT legacy systems. The study used purposeful sampling, including 13 IT leaders, IT technicians, and customers based on their experience in implementing successful IT modernization programs’ strategies. Data were collected using semi-structured interviews and agency documentation. …


Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson Jan 2022

Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson

Walden Dissertations and Doctoral Studies

Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …


The Impact Of Technological Advances On Older Workers, Toni Mcintosh Jan 2020

The Impact Of Technological Advances On Older Workers, Toni Mcintosh

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was the treatment of older workers in the information technology industry that contributes to age discrimination in the workplace. Age discrimination is against the law irrespective of whether it is aimed at older workers in the workforce or becoming job candidates at an advanced age. Although previous research has shown that age discrimination is prevalent in work environments, little has been suggested to eradicate the issue in the workplace. The purpose of this qualitative case study was to investigate the issue of age discrimination as it relates to workers over the age of …


The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase Jan 2020

The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase

Walden Dissertations and Doctoral Studies

America's higher education institutions have aligned computer science curricula with today's modern technology. Despite these efforts, data have shown that there is slow growth among young women majoring in computer science and even slower growth in this area at community colleges. Higher education institutions have also acknowledged a gap between men and women entering the computer science field and a need to explore options for computer science programs to engage women in the industry. The purpose of this phenomenological study was to gain an understanding of the perceptions and lived experiences of female students enrolled in computer classes at New …


Exploring Strategies To Integrate Disparate Bioinformatics Datasets, Charbel Bader Fakhry Jan 2019

Exploring Strategies To Integrate Disparate Bioinformatics Datasets, Charbel Bader Fakhry

Walden Dissertations and Doctoral Studies

Distinct bioinformatics datasets make it challenging for bioinformatics specialists to locate the required datasets and unify their format for result extraction. The purpose of this single case study was to explore strategies to integrate distinct bioinformatics datasets. The technology acceptance model was used as the conceptual framework to understand the perceived usefulness and ease of use of integrating bioinformatics datasets. The population of this study included bioinformatics specialists of a research institution in Lebanon that has strategies to integrate distinct bioinformatics datasets. The data collection process included interviews with 6 bioinformatics specialists and reviewing 27 organizational documents relating to integrating …


Knowledge Sharing And Customer Relations In Mobility, Katie Dyretha Moore Jan 2019

Knowledge Sharing And Customer Relations In Mobility, Katie Dyretha Moore

Walden Dissertations and Doctoral Studies

After the events of September 11, 2001, inadequacies in how government organizations and agencies shared knowledge and communication with defense mission partners became readily apparent. A reasonable U.S. government information technology expectation is the integrated use of mobile phones across organizations and agencies. Yet, it is difficult to meet this expectation, as the provisioning process for mobile devices can be different for each government organization or agency. The Department of Commerce National Institute of Standards and Technology does not set provisioning standards, and organizations and agencies determine policies tailored to their particular needs. Using Schein's theory on organizational culture, the …


Public Health Providers' Perceptions Of Electronic Health Records In A Disaster, Sherhonda Yvette Harper Jan 2018

Public Health Providers' Perceptions Of Electronic Health Records In A Disaster, Sherhonda Yvette Harper

Walden Dissertations and Doctoral Studies

The introduction of federal initiatives and incentives regarding health information technology fostered a movement towards the adoption of electronic health records (EHR). Implementation of EHRs sparked discussions among healthcare providers, patients, and others about the benefits or challenges of the move from the traditional paper method to the electronic version in healthcare settings. A knowledge gap in research involving the usefulness of EHRs and their impact to the delivery of care in other settings exists. The purpose of this qualitative study was to explore public health providers' perceptions of the meaningful use of EHRs in a disaster setting. Study participants …


Exploring Management Practices Of The Health Care System For Contractors, Gary L. Williams Jan 2018

Exploring Management Practices Of The Health Care System For Contractors, Gary L. Williams

Walden Dissertations and Doctoral Studies

Researchers have found that military members serving in war experienced changes in physical and mental health. Military members' healthcare is managed by the Department of Defense. The problem was that management practices of the system for providing long-term healthcare for employees of a contracting company working in foreign combat zones is either minimal or nonexistent. The purpose of this case study was to explore ways that contractor managers and government managers can work together to provide healthcare for those contract employees who will be deployed with the U.S. military. The primary research question was to determine what managers of contractors …


Strategies For E-Commerce Adoption In A Travel Agency, Anita Smith Jan 2018

Strategies For E-Commerce Adoption In A Travel Agency, Anita Smith

Walden Dissertations and Doctoral Studies

In 2016, online travel sales increased 8%, resulting in profits increasing to over 565 billion U.S. dollars. Traditional travel agencies in brick-and-mortar storefronts are facing challenges related to competing with online travel agencies (OTAs), attracting new customers, and retaining existing customers. The purpose of this qualitative case study was to explore the e-commerce processes, business models, and strategies that leaders of traditional travel agencies use to compete with OTAs. The study sample consisted of 8 travel professionals from 3 small travel agencies located in the mid-Atlantic region of the United States. The conceptual framework for this study was Rogers's diffusion …


Exploring Welfare Recipients' Self-Sufficiency Barriers Through Information Management Systems In Tennessee, Valenta Eunice Nichols Jan 2018

Exploring Welfare Recipients' Self-Sufficiency Barriers Through Information Management Systems In Tennessee, Valenta Eunice Nichols

Walden Dissertations and Doctoral Studies

Families living on welfare in low-income impoverished neighborhoods encounter multiple barriers that need mitigating before seeking work to reach self-sufficiency. Many welfare recipients' self-sufficiency barriers are unnoticeable to caseworkers due to lack of data sharing to assess clients' needs through information technology processes. The purpose of this exploratory descriptive phenomenological qualitative study was to understand welfare recipients' viewpoints on socioeconomic barriers to living self-sufficiently and gain perspectives from human services caseworkers and technical resources on data sharing issues that impact recipients' ability to live independently from government assistance. Data collection and observational field notes resulted from in-depth interviews of 11 …


Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster Jan 2017

Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster

Walden Dissertations and Doctoral Studies

The decision to implement information technology (IT) initiatives to enhance collaboration among veterans, baby boomers, Generation X, Generation Y, and Fifth Generation employees continues to challenge organizational leaders. The purpose of this nonexperimental study was to identify how the implementation of information technology initiatives, coupled with the knowledge of learning styles, might enhance collaboration among generational cohort employees. The generational cohort theory, Maslow's hierarchy of needs theory, and the technology acceptance model were the theoretical frameworks used to develop an understanding of the relationships among the cohorts and the acceptance of technology to enhance collaboration. Data were collected from a …


Strategies To Manage Enterprise Information Technology Projects, Mario West Jan 2017

Strategies To Manage Enterprise Information Technology Projects, Mario West

Walden Dissertations and Doctoral Studies

Since 2005, most midsize company information technology (IT) projects had a 62.4% failure rate because of wrong project team communication skills or cost overruns. IT leaders expect negative IT project outcomes will cost over $2 billion by 2020. Using the actor-network theory, the purpose of this single case study was to explore strategies used by IT leaders from a midsize IT company in Washington, D.C. to plan and execute projects under budget and on time. Using purposeful sampling, 5 IT leaders were selected for this study because of their experience in implementing successful strategies for projects. Data were collected using …


Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr. Jan 2016

Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr.

Walden Dissertations and Doctoral Studies

Primary care physicians (PCPPs) have been slow to implement electronic health records (EHRs), even though there is a U.S. federal requirement to implement EHRs. The purpose of this phenomenological study was to determine why PCPPs have been slow to adopt electronic health record (EHR) systems despite the potential to increase efficiency and quality of health care. The complex adaptive systems theory (CAS) served as the conceptual framework for this study. Twenty-six PCPPs were interviewed from primary care practices (PCPs) based in southwestern Ohio. The data were collected through a semistructured interview format and analyzed using a modified van Kaam method. …


Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey Jan 2015

Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey

Walden Dissertations and Doctoral Studies

Ineffective communication behavioral constructs in the workplace that lead to information technology (IT) project failure and in some cases organization failure are increasingly becoming a management concern. Despite this trend, there is little research on the communication behavioral constructs that contribute to IT project failure rates. The purpose of this phenomenological study was to explore the lived experiences of business analysts, programmers, and programmer analysts pertaining to the behavioral constructs associated with effective and ineffective communication. The research questions addressed these behaviors from a conceptual framework based on communication theory, organizational information processing theory, and critical social theory. This framework …


Nurses Knowledge, Skills, And Attitude Toward Electronic Health Records (Ehr), Sharon L. Adams Jan 2015

Nurses Knowledge, Skills, And Attitude Toward Electronic Health Records (Ehr), Sharon L. Adams

Walden Dissertations and Doctoral Studies

Information technology (IT) has been rapidly integrated into the healthcare industry, including nursing, and has the ability to reduce errors, cut cost, and enhance patient care. However, approximately 45% of the current nurse workforce lacks adequate training in computer skills, which may hinder the adoption of health-related IT in the workplace. Characteristics of Rogers's diffusion of innovation (relative advantage, compatibility, complexity, trialability, and observability) guided this project. This project was conducted to address the problem of IT adoption on a local level and was designed to assess whether simulation training on a generic electronic health record (EHR) system would improve …