Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Walden Dissertations and Doctoral Studies

2018

Discipline
Keyword

Articles 1 - 30 of 37

Full-Text Articles in Entire DC Network

Successful Strategies Of Small Business Owners To Recruit Veterans, Michelle Duncan Jan 2018

Successful Strategies Of Small Business Owners To Recruit Veterans, Michelle Duncan

Walden Dissertations and Doctoral Studies

Approximately 300,000 highly skilled veterans leave military service every year, yet some small business owners lack strategies to recruit these skilled workers. The specific business problem addressed in this multiple case study was that some small information technology business leaders lack strategies to recruit military veterans. The research sample included 3 owners of small businesses serving the information technology industry in the mid-Atlantic region of the United States who developed and implemented successful strategies for recruiting veterans. Data were collected from interviews and review of documents. Data analysis resulted in the identification of 3 major themes: understanding of veterans as …


Managerial Strategies Small Businesses Use To Prevent Cybercrime, Doreen Lynn Maahs Jan 2018

Managerial Strategies Small Businesses Use To Prevent Cybercrime, Doreen Lynn Maahs

Walden Dissertations and Doctoral Studies

Estimated worldwide losses due to cybercrime are approximately $375-575 billion annually, affecting governments, business organizations, economies, and society. With globalization on the rise, even small businesses conduct transactions worldwide through the use of information technology (IT), leaving these small businesses vulnerable to the intrusion of their networks. The purpose of this multiple case study was to explore the managerial strategies of small manufacturing business owners to protect their financial assets, data, and intellectual property from cybercrime. The conceptual framework was systems thinking and action theory. Participants included 4 small manufacturing business owners in the midwestern region of the United States. …


Thinking Perspective Profiles As A Predictor Of Intelligence Analysts' Job Performance., Curtis Rasmussen Jan 2018

Thinking Perspective Profiles As A Predictor Of Intelligence Analysts' Job Performance., Curtis Rasmussen

Walden Dissertations and Doctoral Studies

Empirical research has supported the use of general cognitive ability to predict employee performance; however, studies have accounted for only a fraction of the variance. The current study addressed whether intellectual styles, which describe how individuals habitually acquire and use information, account for a significant portion of the variance in job performance not covered by general cognitive ability. The study followed a quantitative, nonexperimental design with a convenience sample of 77 intelligence analysts from 6 U.S. government agencies and 2 online professional groups. MindTime provided the primary theoretical framework. The International Cognitive Ability Resource, MindTime Profile InventoryTM, and Self-Rated Analytic …


Exploring The Implementation Of Cloud Security To Minimize Electronic Health Records Cyberattacks, Lamonte Bryant Tyler Jan 2018

Exploring The Implementation Of Cloud Security To Minimize Electronic Health Records Cyberattacks, Lamonte Bryant Tyler

Walden Dissertations and Doctoral Studies

Health care leaders lack the strategies to implement cloud security for electronic medical records to prevent a breach of patient data. The purpose of this qualitative case study was to explore strategies senior information technology leaders in the healthcare industry use to implement cloud security to minimize electronic health record cyberattacks. The theory supporting this study was routine activities theory. Routine activities theory is a theory of criminal events that can be applied to technology. The study's population consisted of senior information technology leaders from a medical facility in a large northeastern city. Data collection included semistructured interviews, phone interviews, …


Greek Primary Educators' Perceptions Of Strategies For Mitigating Cyber Child Exploitation, Aikaterini Fragkou Jan 2018

Greek Primary Educators' Perceptions Of Strategies For Mitigating Cyber Child Exploitation, Aikaterini Fragkou

Walden Dissertations and Doctoral Studies

Cyber child exploitation is a problem in Greece due to the economic crisis and the resulting lack of government focus on social improvements. Research reveals the importance of educating school teachers of the potential for cyber exploitation of children and argues that early detection of child-focused cybercrimes will decrease the prevalence of child exploitation. The purpose of this interpretive qualitative study was to explore the phenomenon of cyber child exploitation in Greece and to identify strategies teachers may employ to identify and avert cyber child exploitation. Grounded theory provided the framework for this research. The sample consisted of 20 school …


Administrator And Staff Perceptions Of A Secondary School Antibullying Program, Suasn Kazmierczak Jan 2018

Administrator And Staff Perceptions Of A Secondary School Antibullying Program, Suasn Kazmierczak

Walden Dissertations and Doctoral Studies

Despite the increase in bullying behavior that has occurred among high school students, there is a lack of age appropriate intervention programs available to assist secondary administrators and staff with this problem. The purpose of this case study in 1 high school in a suburb of a major Mid-Atlantic city in the United States was to determine the perceptions held by secondary administrators and staff of an adapted antibullying program, originally created for use in elementary schools, in reducing the incidences of bullying behavior and feelings of strain. This study was also designed to explore how administrators and staff perceived …


Teacher's Perceptions Of Bullying In A Rural School District, Rutha Mae Jackson Jan 2018

Teacher's Perceptions Of Bullying In A Rural School District, Rutha Mae Jackson

Walden Dissertations and Doctoral Studies

Bullying is a serious problem that can interfere with children's developmental and learning processes but can be difficult to manage and diffuse. The purpose of this qualitative case study was to examine teachers' perceptions and experiences with managing student bullying in a middle school in central Georgia. Olweus's effective classroom management model served as the conceptual framework to guide this study. The research questions focused on teachers' perceptions of their current practices of diffusing bullying situations and their experiences with bullying occurrences. A case study design was used to capture the insights of 10 middle school teachers through interviews, and …


Exploring Sme Vulnerabilities To Cyber-Criminal Activities Through Employee Behavior And Internet Access, Jerry Allen Twisdale Jan 2018

Exploring Sme Vulnerabilities To Cyber-Criminal Activities Through Employee Behavior And Internet Access, Jerry Allen Twisdale

Walden Dissertations and Doctoral Studies

Cybercriminal activity may be a relatively new concern to small and medium enterprises (SMEs), but it has the potential to create financial and liability issues for SME organizations. The problem is that SMEs are a future growth target for cybercrime activity as larger corporations begin to address security issues to reduce cybercriminal risks and vulnerabilities. The purpose of this study was to explore a small business owner's knowledge about to the principal elements of decision making for SME investment into cybersecurity education for employees with respect to internet access and employee vulnerabilities. The theoretical framework consisted of the psychological studies …


Strategies To Prevent And Reduce Medical Identity Theft Resulting In Medical Fraud, Junior V. Clement Jan 2018

Strategies To Prevent And Reduce Medical Identity Theft Resulting In Medical Fraud, Junior V. Clement

Walden Dissertations and Doctoral Studies

Medical identity fraud is a byproduct of identity theft; it enables imposters to procure medical treatment, thus defrauding patients, insurers, and government programs through forged prescriptions, falsified medical records, and misuse of victim's health insurance. In 2014, for example, the United States Government lost $14.1 billion in improper payments. The purpose of this multiple case study, grounded by the Health Insurance Portability and Accountability Act as the conceptual framework, was to explore the strategies 5 healthcare leaders used to prevent identity theft and medical identity fraud and thus improve business performance in the state of New York. Data were collected …


Urban High School Educators' Perceptions Of Pre-Service And In-Service Conflict Resolution And Violence Prevention Education, Sean M. Brooks Jan 2018

Urban High School Educators' Perceptions Of Pre-Service And In-Service Conflict Resolution And Violence Prevention Education, Sean M. Brooks

Walden Dissertations and Doctoral Studies

Studies have shown that conflict resolution and violence prevention education may be lacking within school-based environments. There is a gap in the literature regarding pre-service and in-service conflict resolution and violence prevention education for urban high school educators. The purpose of the study was to understand the experiences and perceptions of urban high school educators' pre-service and in-service conflict resolution and violence prevention education, and the student health-related antecedents that contribute to both. Utilizing a case study methodology, this study emphasized the diverse geographic locations of urban high school educators' pre-service institutions and the perceptions of their pre-service and in-service …


Elementary Educators' Knowledge, Beliefs, And Planned And Implemented Practices For Digital Citizenship, Meghan Gail Walters Jan 2018

Elementary Educators' Knowledge, Beliefs, And Planned And Implemented Practices For Digital Citizenship, Meghan Gail Walters

Walden Dissertations and Doctoral Studies

Limited research has focused on the knowledge, beliefs, and professional practices of elementary educators related to digital citizenship. The purpose of this study was to identify elementary educators' knowledge and beliefs about digital citizenship, as well as understand their plans and implemented practices, supports, and barriers related to digital citizenship instruction. This study was grounded in Mezirow's theory of transformative learning, Siemen's theory of connectivism, and Ribble's concept of digital citizenship. Descriptive statistics were used to analyze data collected from an original survey instrument developed from the literature by the researcher. Participants were recruited using publicly accessible email addresses and …


Patterns Within Nine Preattack Phases That Emerged In Israel Suicide Bombing Cases, Aaron Richman Jan 2018

Patterns Within Nine Preattack Phases That Emerged In Israel Suicide Bombing Cases, Aaron Richman

Walden Dissertations and Doctoral Studies

From 2000 to 2013, Israel had the second highest number of deaths from suicide attacks and was on the list of countries that may experience increases in terrorism due to ongoing conflicts. Suicide bombings present highly complex situations for counterterrorism and counterinsurgency professionals. Using Freeman, Tucker, and Merton's framework of 9 preattack phases as the primary theoretical constuct, the purpose of this multiple case study was to explore specific patterns that consistently emerged in the adversary planning process for 6 successful or failed suicide bombing cases in Israel. Secondary, archival data were acquired through a data use agreement with a …


Risk Management Strategies To Prevent And Mitigate Emerging Operational Security Threats, Nancy Page Larrimore Jan 2018

Risk Management Strategies To Prevent And Mitigate Emerging Operational Security Threats, Nancy Page Larrimore

Walden Dissertations and Doctoral Studies

Dependence on technology brings security compromises that have become a global threat that costs businesses millions of dollars. More than 7.6 million South Carolinians incurred effects from the 162 security breaches reported in 2011-2015. The purpose of this multiple case study was to explore the risk management strategies small business leaders use to prevent and mitigate operational security threats that produce financial losses. The population for this study consisted of 6 business leaders in South Carolina who have demonstrated successful experience in preventing and mitigating operational security threats. Transformational leadership theory provided the conceptual framework for exploring the overreaching research …


Educators' Perceptions Of A School-Based Antibullying Program In An Elementary School, Jacquelyn Andrea Sims-Jones Jan 2018

Educators' Perceptions Of A School-Based Antibullying Program In An Elementary School, Jacquelyn Andrea Sims-Jones

Walden Dissertations and Doctoral Studies

Bullying is a problem experienced in schools across the country including in the ABC Elementary School in Georgia, where the No Place for Hate antibullying program is in place to address this problem. The purpose of this qualitative case study was to understand educators' perspectives on their experiences implementing the program. Bandura's social learning theory was used as the conceptual foundation for this study. A content analysis research method based on that of Yin and employing NVivo software was used to analyze interviews. The participants were asked to comment on three main areas: (a) bullying, (b) useful components of the …


Understanding Teachers' Perceptions Of Bullying For Developing Teacher Detection And Intervention, Christopher Samuel Hazeltine Jan 2018

Understanding Teachers' Perceptions Of Bullying For Developing Teacher Detection And Intervention, Christopher Samuel Hazeltine

Walden Dissertations and Doctoral Studies

Bullying behaviors can have lasting adverse consequences for teachers, victims, offenders, and bystanders. Teachers are often not prepared with the knowledge required for appropriate interventions. The purpose of this study was to understand teachers' perceptions of bullying in one of the largest urban school districts in the United States. Guided by Bronfenbrenner's ecological systems theory, which holds that individuals impact and should be impacted by various environmental systems around them, the study was focused on teachers' understanding of detection and intervention of bullying in the school setting. A qualitative single case study design was used. Fifteen urban, middle school teachers …


Does Cybersecurity Law And Emergency Management Provide A Framework For National Electric Grid Protection?, Matthew Ryan Ziska Jan 2018

Does Cybersecurity Law And Emergency Management Provide A Framework For National Electric Grid Protection?, Matthew Ryan Ziska

Walden Dissertations and Doctoral Studies

The U.S. government is responsible for protecting the country's energy and technology infrastructure. Critics argue the United States has failed to prepare, protect and respond to incidents involving the national electric grid leaving communities vulnerable to prolonged power outages. Protection of investor owned utilities' critical infrastructure is vulnerable to cyber and physical harm from the absence of criminalizing the intrusion of private sector computer networks, the lack of cybersecurity threats in emergency management, and the absence of cyber-intelligent leadership supports this argument. The purpose of this study was to introduce an electric grid protection theoretical concept, while identifying whether cybersecurity …


The Effects Of Computer Crimes On The Management Of Disaster Recovery, Tim Gene Proffitt Jan 2018

The Effects Of Computer Crimes On The Management Of Disaster Recovery, Tim Gene Proffitt

Walden Dissertations and Doctoral Studies

The effects of a technology disaster on an organization can include a prolonged disruption, loss of reputation, monetary damages, and the inability to remain in business. Although much is known about disaster recovery and business continuance, not much research has been produced on how businesses can leverage other technology frameworks to assist information technology disaster recovery. The problem was the lack of organizational knowledge to recover from computer crime interruptions given the maturity level of existing disaster recovery programs. The purpose of this Delphi study was to understand how disaster recovery controls and processes can be modified to improve response …


Exploring Teachers' Perspective Of Digital Literacy Pedagogy: Implications For Future Practice, Kindra Xerez Sabado Jan 2018

Exploring Teachers' Perspective Of Digital Literacy Pedagogy: Implications For Future Practice, Kindra Xerez Sabado

Walden Dissertations and Doctoral Studies

Pedagogy has not addressed the literacy shift from reading, writing, and speaking to include cognitive digital literacy skills. Teachers lack the technological pedagogical content knowledge to integrate digital literacy skills into student learning. Using a digital literacy framework with 6 essentials skills, the purpose of this qualitative case study was to investigate teachers' (a) current understanding, knowledge and skills; (b) current integration of digital literacy skills; (c) challenges they face in integration; and (d) supports needed in shifting pedagogical practices to address change. Participants were 13 teachers from high school content areas. Data were gathered through focus groups interviews, observations, …


Strategies For Hiring Skilled Furniture Manufacturing Workers, Michael L. Simmons Jan 2018

Strategies For Hiring Skilled Furniture Manufacturing Workers, Michael L. Simmons

Walden Dissertations and Doctoral Studies

In April 2013, the U.S. unemployment rate was 7.6% and did not drop as quickly in the recent recession as in past recessions. The Unemployment and Job Creation Program study informed readers that many employers could not find qualified workers. The purpose of this qualitative multiple case study was to explore hiring managers' strategies to locate and hire skilled workers in the furniture manufacturing industry. The target sample included 3 furniture manufacturers located in Huntsville, Alabama who have successfully developed and implemented strategies for hiring skilled workers. The skill shortage theory was the conceptual framework for this study. In the …


Countering Expansion And Organization Of Terrorism In Cyberspace, Sunday Oludare Ogunlana Jan 2018

Countering Expansion And Organization Of Terrorism In Cyberspace, Sunday Oludare Ogunlana

Walden Dissertations and Doctoral Studies

Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities perpetrated through the aid of computers in cyberspace. Using routine activity theory, this study assessed the effectiveness of technological approaches to mitigating the expansion and organization of terrorism in cyberspace. The study aligned with the purpose area analysis objective of classifying and assessing potential terrorist threats to preempt and mitigate the attacks. Data collection included document content analysis of the …


Strategies For Improving Contractors' Defense Acquisition Cost Estimates, Kenneth Peters Jan 2018

Strategies For Improving Contractors' Defense Acquisition Cost Estimates, Kenneth Peters

Walden Dissertations and Doctoral Studies

In 2015, private sector Department of Defense (DoD) contractors experienced decreasing profit margins by approximately 8% and an increase in estimated costs of approximately 250%. The purpose of this multicase study was to explore strategies used by business leaders of private sector contractors for DoD capacity-building projects to accurately estimate program costs to improve profitability. The target population for this study was business leaders of DoD capacity-building program contractors with successful experience improving cost-estimation processes and strategies in Southeast Asia and the former Soviet Union. The conceptual framework for this study was business process quality management with a supporting framework …


Effect Of Attendance On The Performance Of Day And Evening Students, Kerry-Ann Alicia Barrett Jan 2018

Effect Of Attendance On The Performance Of Day And Evening Students, Kerry-Ann Alicia Barrett

Walden Dissertations and Doctoral Studies

Several studies posit a positive relationship between class attendance and student performance. Grades for students enrolled in Introduction to Management during the fall 2015 semester at a community college in Jamaica revealed that evening students on

average scored a grade higher than students enrolled in the day sections. Lecturers noted day students missed more classes than evening students but the relationship between attendance and performance was not known. The purpose of this correlational study was

to determine the relationship between attendance and performance, measured by grades. Guided by Knowles's theory that adults are self-directed, this study was designed to explore …


Parent Aggression Level As A Predictor Of Attitudes Toward Bullying, John Bradley Jan 2018

Parent Aggression Level As A Predictor Of Attitudes Toward Bullying, John Bradley

Walden Dissertations and Doctoral Studies

The focus of this study was on parents of elementary and middle school age children and how the variables of age, gender, and level of education influence their attitudes toward bullying. The gaps in literature support the notion that additional empirical research on the different sociological factors that influence, support, and encourage bullying is required. The purpose of this study was to determine if parental level of aggression, as measured by the Modified Overt Aggression Scale, can predict a parent's attitude toward bullying as measured by the Parental Attitudes to Bullying (PAB) scale. In addition, this study investigated whether other …


An Autoethnographic Examination Of Personal And Organizational Transformation In The U.S. Military, Marjon K. John Jan 2018

An Autoethnographic Examination Of Personal And Organizational Transformation In The U.S. Military, Marjon K. John

Walden Dissertations and Doctoral Studies

Large-scale transformational change, such as the integration and acceptance of gays in the U.S. military, necessitates a long-term effort by management to mitigate unanticipated consequences. Suboptimal implementation may not account for damaging consequences among individuals expected to live the change. The purpose of this autoethnographic study was to examine the individual experiences of a closeted gay personnel member living through a transformational change in identity, which paralleled an organizational change in the U.S. Department of Defense (DoD). The conceptual framework included elements of general systems theory, Kotter's theory of change management, Ostroff's change management for government, and Maslow's self-actualization theory. …


Teacher Descriptions Of Oppositional Defiant Disorder And Bully-Victim Behavior Among Middle School Male Students, Randy Heller Jan 2018

Teacher Descriptions Of Oppositional Defiant Disorder And Bully-Victim Behavior Among Middle School Male Students, Randy Heller

Walden Dissertations and Doctoral Studies

While current psychological theory and research suggest conceptual associations between bullying and behavioral disorders, there is a gap in the literature examining such relationships. Although contemporary theories of aggression describe emotional, social, and cognitive risk factors that are common both, associations between bully-victim patterns and ODD have not been studied to date. This exploratory study addressed this gap by surveying 27 teachers to assess their reports of aggressive behaviors and socioemotional patterns of 58 male middle school students who were identified through school investigations as involved in bullying incidents. Between-group differences for students classified as bullies, victims, or bully-victims were …


Frequency Of Cell Phone Texting And Social Competency In Adolescents, Anita Marie Phillips Jan 2018

Frequency Of Cell Phone Texting And Social Competency In Adolescents, Anita Marie Phillips

Walden Dissertations and Doctoral Studies

There is no current research on the relationship between texting frequency, social competency development, and the moderating effect of gender in adolescents. A quantitative study involving a moderation design using multiple regression assisted in determining the relationship between cell phone texting and gender and whether or not the interaction of these variables predicted social competency development. The theoretical base that grounded this study was the taxonomic model of social competence, which identified the importance of examining social awareness abilities such as communication, an essential component for the development of social competency. The study included 74 participants. The participants were parents …


Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi Jan 2018

Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi

Walden Dissertations and Doctoral Studies

Productivity loss occurs in organizations that experience high levels of personal Internet use by employees on company time, which includes employees using smartphones to surf without needing the firm's Internet connection. The purpose of this qualitative phenomenological study was to explore reliable ways for organizational leaders to monitor or limit their employees' use of smartphone technology for personal use (cyberloafing) while on the job to minimize wasted work time. Social cognitive theory, which includes an emphasis on human behavioral changes based upon the environment, people, and behavior, served as the conceptual framework. The general research question was as follows: How …


Information Technology Infrastructure: Global Economy And National Development In Haiti, Reynolds Alcena Jan 2018

Information Technology Infrastructure: Global Economy And National Development In Haiti, Reynolds Alcena

Walden Dissertations and Doctoral Studies

Political and environmental chaos recently experienced in Haiti has damaged the economic sector and telecommunication infrastructure. Developmental data from Haiti show 3 major trends: inadequate social and economic development, insufficient benefits from the global economy, and poorly planned information technology infrastructure (ITI). The specific problem addressed in this study is a knowledge gap in the views of stakeholders within Haiti's national culture on how the country's ITI can be developed to better engage Haiti in 21st century global and digital economy. The purpose of this qualitative case study was to explore the views of 48 expert participants regarding ITI development …


Social Media Policy To Support Employee Productivity In The Finance Industry, David Shaun Rogers Jan 2018

Social Media Policy To Support Employee Productivity In The Finance Industry, David Shaun Rogers

Walden Dissertations and Doctoral Studies

Business leaders may see social media as a distraction for their workers; however, blocking access could lead to a reduction in productivity. Using social media technologies with knowledge workers could achieve cost reductions for payroll of 30% to 35%. The purpose of this multiple case study was to explore how business leaders used a social media policy to support employee productivity. The conceptual framework for this study was social exchange theory, which supports the notion that dyad and small group interactions make up most interactions, and such interactions enhance employees' productivity. The research question was to explore how finance industry …


Overcoming Data Breaches And Human Factors In Minimizing Threats To Cyber-Security Ecosystems, Manouan Pierre-Marius Ayereby Jan 2018

Overcoming Data Breaches And Human Factors In Minimizing Threats To Cyber-Security Ecosystems, Manouan Pierre-Marius Ayereby

Walden Dissertations and Doctoral Studies

This mixed-methods study focused on the internal human factors responsible for data breaches that could cause adverse impacts on organizations. Based on the Swiss cheese theory, the study was designed to examine preventative measures that managers could implement to minimize potential data breaches resulting from internal employees' behaviors. The purpose of this study was to provide insight to managers about developing strategies that could prevent data breaches from cyber-threats by focusing on the specific internal human factors responsible for data breaches, the root causes, and the preventive measures that could minimize threats from internal employees. Data were collected from 10 …