Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Walden Dissertations and Doctoral Studies

Discipline
Keyword
Publication Year

Articles 1 - 30 of 404

Full-Text Articles in Entire DC Network

Cybersecurity Fiscal Statecraft Conundrums In South Africa, Sabelo Lyndon Mbokazi Mar 2024

Cybersecurity Fiscal Statecraft Conundrums In South Africa, Sabelo Lyndon Mbokazi

Walden Dissertations and Doctoral Studies

No abstract provided.


Counterterrorism Legislation On Community Integration In Kenya, Collins Okinyi Odongo Mar 2024

Counterterrorism Legislation On Community Integration In Kenya, Collins Okinyi Odongo

Walden Dissertations and Doctoral Studies

No abstract provided.


Coaching Behaviors And High School Athlete’S Perceptions Of Team Inclusion And Bullying, Laronce Deangelo Jamal Franklin Sr. Mar 2024

Coaching Behaviors And High School Athlete’S Perceptions Of Team Inclusion And Bullying, Laronce Deangelo Jamal Franklin Sr.

Walden Dissertations and Doctoral Studies

No abstract provided.


Cybersecurity Strategies Information Technology Leaders Use To Protect Healthcare Information Systems From Ransomware, Alejandro Ruiz-Caino Mar 2024

Cybersecurity Strategies Information Technology Leaders Use To Protect Healthcare Information Systems From Ransomware, Alejandro Ruiz-Caino

Walden Dissertations and Doctoral Studies

Healthcare organizations’ (HCOs’) information systems (IS) are prone to increasing ransomware cyberattacks. For HCO information technology (IT) leaders, protecting IS from ransomware attacks is vital because these systems manage large amounts of confidential and sensitive data. Grounded in general systems theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies used by IT leaders in HCOs to protect IS from ransomware attacks. Participants included eight IT leaders from HCOs in the United States responsible for IS protection against ransomware cyberattacks. Data sources included semistructured interviews conducted with the participants via videoconferencing, the researcher’s field notes, and 10 …


Effective Strategies Leaders Use To Reduce Fraud In The Nigerian Banking Industry, Maroof Suleiman Mar 2024

Effective Strategies Leaders Use To Reduce Fraud In The Nigerian Banking Industry, Maroof Suleiman

Walden Dissertations and Doctoral Studies

Financial institutions may be liquidated by banking fraud. Bank leaders are concerned about ineffective strategies to prevent fraud and reduce revenue losses. Grounded in the fraud diamond theory and the fraud triangle theory, this qualitative pragmatic inquiry study aimed to identify and explore bank leaders' strategies to reduce fraud in the Nigerian banking industry. Data were collected by conducting semistructured interviews with nine bank leaders from six Nigerian banks and reviewing publicly accessible information from their companies' websites. A thematic approach adapted from Yin's methodology yielded three key themes: (a) the combination of multiple strategies, (b) employee and customer collaboration, …


Glocalization Business Strategies For Sme Sustainability In Nigeria, Olusanya Oyeyem Feb 2024

Glocalization Business Strategies For Sme Sustainability In Nigeria, Olusanya Oyeyem

Walden Dissertations and Doctoral Studies

Some small and medium enterprise (SME) retail business leaders in Nigeria lack glocalization business strategies, which can result in an SME’s failure to sustain their business beyond 5 years. When SME business leaders lack glocalization strategies their ability to remain operational and profitable can impact long-term organizational sustainability. Grounded in the glocalization theory, the purpose of this qualitative multiple case study was to explore strategies some leaders of retail SMEs in Nigeria use to foster sustainability beyond 5 years. The participants were four managers and one executive officer from five retail businesses. Through thematic analysis, six themes were identified: exchange …


Development Of Technology Pilot Training To Reduce The Number Of Senior Citizens Victimized By Computer Fraud Scams, James Eric Johnston Feb 2024

Development Of Technology Pilot Training To Reduce The Number Of Senior Citizens Victimized By Computer Fraud Scams, James Eric Johnston

Walden Dissertations and Doctoral Studies

There is need in the public sector to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction. This age group is targeted more than others involving technology fraud. The current study focused on which topics need to be part of Technology Fraud Pilot Training to reduce the victimization that is put upon seniors 60+ years of age. The project included measures that may improve understanding and safe usage of basic technology that is frequently used. These searches came from public administration, technology, government, city government, state sources, and others …


Strategies For Insider Threat Mitigation And Detection, Adam Clifton Feb 2024

Strategies For Insider Threat Mitigation And Detection, Adam Clifton

Walden Dissertations and Doctoral Studies

Some information technology (IT) security professionals lack strategies to protect against insider threats. This lack of strategy is concerning because of the widespread organizational damages from insider threat incidents within global organizations, which often lead to financial penalties against organizations and a lack of public trust. Based upon the total quality management model, the goal of this qualitative multiple-case study was to explore strategies IT security managers used to secure their organizations against threats from trusted insiders. Data were collected by conducting semi-structured interviews with five high-level network security practitioners specializing in insider threat mitigation. Five themes emerged during data …


Strategies For Financing Small Businesses, Tina P. Do Feb 2024

Strategies For Financing Small Businesses, Tina P. Do

Walden Dissertations and Doctoral Studies

Accessing financial capital is an essential aspect of small business survival because the lack of funding is detrimental to the performance and sustainability of small businesses. Small business owners are concerned about gaining access to financial capital because it is vital to small businesses’ survival. Grounded in Donaldson’s pecking-order-theory, the purpose of this qualitative multiple case study was to explore strategies small business owners used to sustain their businesses. The participants were three small business owners of the restaurant industry who successfully accessed capital from banks and financial institutions to help sustain their businesses. Data were collected through semistructured interviews …


Strategies For Change Implementation In The Energy Industry, Elier Alvarado Feb 2024

Strategies For Change Implementation In The Energy Industry, Elier Alvarado

Walden Dissertations and Doctoral Studies

Many energy leaders struggle to effectively lead change initiatives amidst the evolving landscape of the energy industry marked by decarbonization, decentralization, and digitization. Unsuccessful change initiatives jeopardize organizations’ sustainability and negatively influence business performance and profitability. Grounded in Lewin’s concepts and the 3-step change model, the purpose of this multiple case study was to explore the strategies leaders in the energy industry employed to achieve success in their change initiatives. Data were collected from nine U.S. energy leaders who successfully implemented organizational change initiatives, utilizing a combination of semistructured interviews and document reviews. Thematic analysis was used to analyze the …


Electrical Field Service Employees’ Intent To Stay Or Leave, Jeffrey Daniels Feb 2024

Electrical Field Service Employees’ Intent To Stay Or Leave, Jeffrey Daniels

Walden Dissertations and Doctoral Studies

Electrical field service leaders are concerned with losing human capital as it requires the shifting or reallocating of economic and non-economic resources to maintain operations and financial goals. Grounded in Herzberg’s two-factor theory, the purpose of this quantitative correlational study was to examine the relationship between general job satisfaction, employee motivation, and employee turnover intentions. Participants included 51 electrical field service leaders in the electrical field service industry who completed the Minnesota Satisfaction Questionnaire and the Motivational Trait Questionnaire. The multiple linear regression analysis results indicated the model could significantly predict employee turnover intentions, F(2, 48) = 15.29, p < .001, R2 = .389. In the final model, general job satisfaction was the only significant contributor (t = -5.15, p = < .001, β = -0.586). A key recommendation is for electrical field service leaders to implement goals around the mastery of a particular task, quarterly competitions around goal attainment, and regularly scheduled team meetings. The implications for positive social change include the potential to improve work–life balance, shift more time invested into the local community, and update models incorporating a multicultural workforce in the services sector.


Effective Strategies University Information Technology Leaders Use To Prevent Or Mitigate Cyberattacks’ Costs, Rene Ekoteson Jan 2024

Effective Strategies University Information Technology Leaders Use To Prevent Or Mitigate Cyberattacks’ Costs, Rene Ekoteson

Walden Dissertations and Doctoral Studies

No abstract provided.


Strategies To Retain Science, Technology, Engineering, And Mathematics Civilian Employees In U.S. Army Cyberfocused Organizations, Monica Collins-Hines Jan 2024

Strategies To Retain Science, Technology, Engineering, And Mathematics Civilian Employees In U.S. Army Cyberfocused Organizations, Monica Collins-Hines

Walden Dissertations and Doctoral Studies

No abstract provided.


At-Risk Students’ Self-Determination Through The Lens Of Alternate Graduation Programs, Donka Catalina Flaig Jan 2024

At-Risk Students’ Self-Determination Through The Lens Of Alternate Graduation Programs, Donka Catalina Flaig

Walden Dissertations and Doctoral Studies

No abstract provided.


Psycholinguistic Factors Of Incel Cognition, Molly R. Johnson Dec 2023

Psycholinguistic Factors Of Incel Cognition, Molly R. Johnson

Walden Dissertations and Doctoral Studies

No abstract provided.


A Mixed Methods Program Evaluation Of A Youth Sexual Exploitation Prevention Module For Leaders Of Afrocentric Churches, Tyrina Kristina Thompson Nov 2023

A Mixed Methods Program Evaluation Of A Youth Sexual Exploitation Prevention Module For Leaders Of Afrocentric Churches, Tyrina Kristina Thompson

Walden Dissertations and Doctoral Studies

No abstract provided.


Promoting Effective Cybersecurity Policy Compliance In Small Businesses, Adelaja Oyesanya Odujinrin Nov 2023

Promoting Effective Cybersecurity Policy Compliance In Small Businesses, Adelaja Oyesanya Odujinrin

Walden Dissertations and Doctoral Studies

No abstract provided.


Data Security Strategies For Preventing Breaches Due To Insider Threats, Ojodale Achor Nov 2023

Data Security Strategies For Preventing Breaches Due To Insider Threats, Ojodale Achor

Walden Dissertations and Doctoral Studies

No abstract provided.


Mitigating Supply Chain Disruptions In Retail Discount Department Stores, Anthony T. Patton Jan 2023

Mitigating Supply Chain Disruptions In Retail Discount Department Stores, Anthony T. Patton

Walden Dissertations and Doctoral Studies

Supply chain disruptions can have adverse effects on business outcomes. Retail industry supply chain leaders are concerned with supply chain disruptions because supply chain disruptions can lead to dissatisfied customers and loss of profits. Grounded in game theory, the purpose of this multiple case study was to explore strategies four retail industry supply chain leaders in Northern Illinois and Northwest Indiana implemented to mitigate the effects of supply chain disruptions. Data were collected using semistructured virtual interviews with four retail industry supply chain leaders and a review of company documents. Through thematic analysis, four themes emerged: (a) choosing appropriate inventory …


Relationship Between Parental Attachment And Cyberbullying Within The Homeschooling Community, Jason King Jan 2023

Relationship Between Parental Attachment And Cyberbullying Within The Homeschooling Community, Jason King

Walden Dissertations and Doctoral Studies

Cyberbullying has been a focus of research and societal concern since the advent of the internet. Both perpetrators and victims of cyberbullying experience significant adverse effects including depression, anxiety, internalizing and externalizing problems, suicidal ideation, and suicide. Despite the broad understanding of the impact of cyberbullying on mental and physical health, research has not prioritized the exploration of cyberbullying within the homeschooled population. The purpose of this quantitative survey design was to identify the characteristics and relationships between cyberbullying victimization and perpetration, attachment security, and religiosity in homeschooled adolescents. Using a framework of Bowlby’s attachment theory, the Parental Attachment Questionnaire, …


Cyberscience Undergraduate Faculty And School Official Perspectives Of The Innovation And Implementation Of Curriculum For Inclusion, Robert Gerald Nordan Jan 2023

Cyberscience Undergraduate Faculty And School Official Perspectives Of The Innovation And Implementation Of Curriculum For Inclusion, Robert Gerald Nordan

Walden Dissertations and Doctoral Studies

AbstractA disproportionate number of European American male students are enrolled in cyberscience undergraduate degree programs, despite attempts to attract diverse student populations in the field. The purpose of the basic qualitative study was to gain a better understanding on how cyberscience academic experts perceive the challenges related to the disproportionate number of European American male students enrolled in cyberscience degree programs nationwide and how to attract college students from diverse backgrounds for cyberscience programs. Using Rogers’s diffusion of innovation, the research questions explored cyberscience academic expert perceptions of the challenges of enrollment in cyberscience programs and attracting students from diverse …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


How It Professionals Acquire Soft Skills, Paul Majett Jan 2023

How It Professionals Acquire Soft Skills, Paul Majett

Walden Dissertations and Doctoral Studies

AbstractIn this study, I investigated how information technology (IT) professionals learn/acquire soft skills. Little is understood about how IT professionals describe and apply the soft skills that they consider necessary for their own employability. Exploring how IT professionals describe and apply soft skills is important to their future work and career advancement. The purpose of this basic qualitative study was to better understand how IT professionals learn/acquire soft skills. Bandura’s 1986, social learning theory served as the organizational conceptual framework of this study and guided the research question, which asked how IT professionals acquire learn/acquire soft skills. This research question …


Generational Information Security Awareness And The Role Of Big Five Personality Traits, Gloria Mccue Jan 2023

Generational Information Security Awareness And The Role Of Big Five Personality Traits, Gloria Mccue

Walden Dissertations and Doctoral Studies

AbstractTechnological change drives organizations to safeguard information systems. However, such safeguards are dependent upon people to follow security rules. This study examined generational cohorts and personality traits and their impact on information security awareness. Participants in this study were 137 volunteers who completed an anonymous survey online. Two tools were utilized to collect data from the participants: the Human Aspects of Information Security Questionnaire and the Big Five Inventory, which captured behaviors and personality traits, respectively. The three main generational cohorts represented in the study, Baby Boomers, Generation X, and Generation Y, were in today’s workforce. The results of the …


Strategies To Mitigate Foreign Trade Costs And Regulations That Reduce Revenues, Allan Dithan Mugisa Jan 2023

Strategies To Mitigate Foreign Trade Costs And Regulations That Reduce Revenues, Allan Dithan Mugisa

Walden Dissertations and Doctoral Studies

Foreign trade costs and regulations can lead to unfavorable business outcomes. Business leaders in firms engaged in global trade express concerns about the potential negative impact of foreign trade costs and regulations on revenues. Grounded in the resource-based theory of firms, the purpose of this qualitative multiple case study was to explore strategies some small medical devices and supplies business leaders use to mitigate foreign trade costs and regulations that reduce revenues. Participants were four business leaders of medical device and supply firms who reversed declining revenues. Data were collected using in-person semi-structured interviews. Through thematic analysis, four themes were …


Ai Usage In Development, Security, And Operations, Maurice Ayidiya Jan 2023

Ai Usage In Development, Security, And Operations, Maurice Ayidiya

Walden Dissertations and Doctoral Studies

Artificial intelligence (AI) has become a growing field in information technology (IT). Cybersecurity managers are concerned that the lack of strategies to incorporate AI technologies in developing secure software for IT operations may inhibit the effectiveness of security risk mitigation. Grounded in the technology acceptance model, the purpose of this qualitative exploratory multiple case study was to explore strategies cybersecurity professionals use to incorporate AI technologies in developing secure software for IT operations. The participants were 10 IT professionals in the United States with at least 5 years of professional experience working in DevSecOps and managing teams of at least …


Money Laundering And Terrorist Financing Typologies That Reduce Financial Crime Risks, Sina Vinod Patel Jan 2023

Money Laundering And Terrorist Financing Typologies That Reduce Financial Crime Risks, Sina Vinod Patel

Walden Dissertations and Doctoral Studies

The Covid-19 pandemic has increased concerns over money laundering and terrorist financing and their impacts on societies and the world’s finance and economic systems. Some financial institutions are failing to detect and track new emerging financial crime threats. The purpose of this qualitative descriptive case study was to identify predicate offense typologies that U.S. banking and financial services company compliance managers use to reduce the risks of money laundering and terrorist financing. To understand the concepts of predicate offense and financial crime risks, Gary Becker’s economic theory of criminal behavior was the conceptual framework that grounded this study. The population …


Thematic Analysis Of Online Predatory Grooming Behavior Among Male Offenders, Ryan Christopher Dronek Jan 2023

Thematic Analysis Of Online Predatory Grooming Behavior Among Male Offenders, Ryan Christopher Dronek

Walden Dissertations and Doctoral Studies

Social media sites, gaming platforms, and online communication tools have been integrated into children’s everyday lives. This has created a new avenue for child predators to identify, communicate, and victimize children. Just as the internet and the ability to communicate online have evolved, predatory grooming behavior has evolved as well. This qualitative study aimed to identify predatory grooming themes and the thematic stage progression for online male offenders who target child victims using online chat rooms. O’Connell’s typology of cyber sexploitation and online grooming practices was used to explore online child predators’ grooming themes and stage progression. Nine male Wisconsin …


A Phenomenological Study On Protective Factors Preventing College-Aged Criminal Activity During Cameroon’S Anglophone Crisis, Melvis N. Asongwed Jan 2023

A Phenomenological Study On Protective Factors Preventing College-Aged Criminal Activity During Cameroon’S Anglophone Crisis, Melvis N. Asongwed

Walden Dissertations and Doctoral Studies

The Anglophone crisis, in which marginalization of the English-speaking regions in Cameroon began in October 2016 and has become one of the most prominent social problems in the nation’s history. It has led to loss of lives, infrastructure damage, displacement of families, incidents of mass violence, unemployment, and a rise in criminal activity in the Anglophone regions. Grounded in the phenomenological approach and guided by the general strain theory (GST), this qualitative inquiry explored the protective factors that have reduced or prevented criminal activity for college students in the Anglophone regions during the crisis. Semi structure interviewing guided participant responses. …


Strategies Global Virtual Team Leaders Use To Improve Trust And Communication, Sarah Crandell Monday Jan 2023

Strategies Global Virtual Team Leaders Use To Improve Trust And Communication, Sarah Crandell Monday

Walden Dissertations and Doctoral Studies

Global virtual team (GVT) members’ inability to effectively build trust and communication has the potential to negatively impact organizational outcomes. Organizational leaders are concerned with team members’ inability to build trust and communication, as it is the leading cause of reduced productivity and efficiency levels within GVTs. Grounded in the social exchange theory, the purpose of this qualitative multiple case study was to explore strategies GVT leaders use to improve trust and communication among GVT members. The participants were 18 GVT business leaders from six organizations located in the Pacific Northwest of the United States. Data were collected using semistructured …