Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Walden University (184)
- New Jersey Institute of Technology (122)
- University of South Florida (18)
- Nova Southeastern University (11)
- California State University, San Bernardino (9)
-
- University of Wisconsin Milwaukee (8)
- Air Force Institute of Technology (4)
- Old Dominion University (4)
- Singapore Management University (4)
- University of Arkansas, Fayetteville (4)
- World Maritime University (3)
- City University of New York (CUNY) (2)
- Dakota State University (2)
- Edith Cowan University (2)
- Purdue University (2)
- University of Kentucky (2)
- University of New Haven (2)
- University of Texas at El Paso (2)
- Wayne State University (2)
- CCT College Dublin (1)
- Chulalongkorn University (1)
- Cleveland State University (1)
- DePaul University (1)
- Eastern Michigan University (1)
- Georgia Southern University (1)
- Illinois State University (1)
- James Madison University (1)
- La Salle University (1)
- Langston University (1)
- Missouri University of Science and Technology (1)
- Keyword
-
- Information technology (24)
- Management (23)
- Information Technology (19)
- Project Management (15)
- Cybersecurity (13)
-
- Information systems (11)
- Business administration (10)
- Leadership (10)
- Strategies (10)
- Innovation (9)
- Knowledge management (9)
- Social media (9)
- Technology (8)
- Collaboration (7)
- Information science (7)
- Machine learning (7)
- Data mining (6)
- Information security (6)
- Small Business (6)
- E-commerce (5)
- Healthcare (5)
- Knowledge Management (5)
- Sustainability (5)
- Text mining (5)
- Algorithms (4)
- And operations;management sciences and quantitative methods (4)
- Big data (4)
- Cloud (4)
- Communication (4)
- Competitive Advantage (4)
- Publication Year
- Publication
-
- Walden Dissertations and Doctoral Studies (184)
- Dissertations (91)
- Theses (32)
- USF Tampa Graduate Theses and Dissertations (18)
- Theses and Dissertations (15)
-
- CCE Theses and Dissertations (11)
- Theses Digitization Project (7)
- Graduate Theses and Dissertations (4)
- Dissertations and Theses Collection (Open Access) (3)
- Engineering Management & Systems Engineering Theses & Dissertations (3)
- Electronic Theses, Projects, and Dissertations (2)
- Maritime Safety & Environment Management Dissertations (Dalian) (2)
- Master's Theses (2)
- Masters Theses & Doctoral Dissertations (2)
- Open Access Theses (2)
- Open Access Theses & Dissertations (2)
- Wayne State University Dissertations (2)
- Capstones (1)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (1)
- College of Computing and Digital Media Dissertations (1)
- Dissertations and Theses Collection (1)
- Dissertations, Theses, and Capstone Projects (1)
- ETD Archive (1)
- Economic Crime Forensics Capstones (1)
- Electronic Thesis and Dissertation Repository (1)
- Honors Capstone Projects - All (1)
- Honors College Theses (1)
- ICT (1)
- MPA/MPP/MPFM Capstone Projects (1)
- Master's Theses and Doctoral Dissertations (1)
Articles 1 - 30 of 405
Full-Text Articles in Business
All Quiet On The Digital Front: The Unseen Psychological Impacts On Cybersecurity First Responders, Tammie R. Hollis
All Quiet On The Digital Front: The Unseen Psychological Impacts On Cybersecurity First Responders, Tammie R. Hollis
USF Tampa Graduate Theses and Dissertations
Driven by the increasing frequency of cyberattacks and the existing talent gap between industry needs and skilled professionals, this research study focused on the crucial human element in the domain of cybersecurity incident response. The objective of this dissertation was to offer a meaningful exploration of the lived experiences encountered by cybersecurity incident responders and an assessment of the subsequent impacts on their well-being. Additionally, this study sought to draw comparisons between the experiences of cybersecurity incident responders and their counterparts in traditional emergency response roles. Semi-structured interviews were conducted with a cohort of 22 individuals with first-hand experience working …
An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark
An Analysis And Examination Of Consensus Attacks In Blockchain Networks, Thomas R. Clark
Senior Honors Projects, 2020-current
This paper examines consensus attacks as they relate to blockchain networks. Consensus attacks are a significant threat to the security and integrity of blockchain networks, and understanding these attacks is crucial for developers and stakeholders. The primary contribution of the paper is to present blockchain and consensus attacks in a clear and accessible manner, with the aim of making these complex concepts easily understandable for a general audience. Using literature review, the paper identifies various methods to prevent consensus attacks, including multi-chain networks, proof-of-work consensus algorithms, and network auditing and monitoring. An analysis revealed that these methods for preventing consensus …
Rattus Norvegicus As A Biological Detector Of Clandestine Remains And The Use Of Ultrasonic Vocalizations As A Locating Mechanism, Gabrielle M. Johnston
Rattus Norvegicus As A Biological Detector Of Clandestine Remains And The Use Of Ultrasonic Vocalizations As A Locating Mechanism, Gabrielle M. Johnston
Master's Theses
In investigations, locating missing persons and clandestine remains are imperative. One way that first responder and police agencies can search for the remains is by using cadaver dogs as biological detectors. Cadaver dogs are typically used due to their olfactory sensitivity and ability to detect low concentrations of volatile organic compounds produced by biological remains. Cadaver dogs are typically chosen for their stamina, agility, and olfactory sensitivity. However, what is not taken into account often is the size of the animal and the expense of maintaining and training the animal. Cadaver dogs are typically large breeds that cannot fit in …
Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis
Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis
Master's Theses
This study aspires to find a new screening approach to trace DNA recovery techniques to yield a higher quantity of trace DNA from larger items of evidence. It takes the path of visualizing trace DNA on items of evidence with potential DNA so analysts can swab a more localized area rather than attempting to recover trace DNA through the general swabbing technique currently used for trace DNA recovery. The first and second parts consisted of observing trace DNA interaction with Diamond Dye on porous and non-porous surfaces.
The third part involved applying the Diamond Dye solution by spraying it onto …
A Study Of The Impact Of Data Intelligence On Software Delivery Performance, Yongdong Dong
A Study Of The Impact Of Data Intelligence On Software Delivery Performance, Yongdong Dong
Dissertations and Theses Collection (Open Access)
With the rise of big data and artificial intelligence, data intelligence has gradually become the focus of academia and industry. Data intelligence has two obvious characteristics: big data drive and application scene drive. More and more enterprises extract valuable patterns contained in data with prediction and decision analysis methods and technologies such as large-scale data mining, machine learning and deep learning and use them to improve the management and decision in complex practice, so as to promote changes of new business modes, organizational structures and even business strategies, and improve the operational efficiency of organizations. However, there are few studies …
How It Professionals Acquire Soft Skills, Paul Majett
How It Professionals Acquire Soft Skills, Paul Majett
Walden Dissertations and Doctoral Studies
AbstractIn this study, I investigated how information technology (IT) professionals learn/acquire soft skills. Little is understood about how IT professionals describe and apply the soft skills that they consider necessary for their own employability. Exploring how IT professionals describe and apply soft skills is important to their future work and career advancement. The purpose of this basic qualitative study was to better understand how IT professionals learn/acquire soft skills. Bandura’s 1986, social learning theory served as the organizational conceptual framework of this study and guided the research question, which asked how IT professionals acquire learn/acquire soft skills. This research question …
Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei
Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei
Walden Dissertations and Doctoral Studies
Small- and medium-sized enterprise (SME) manufacturing executives and managers are concerned with the rapid technological changes involving artificial intelligence (AI), machine learning, and big data. To compete in the global landscape, effectively managing digital and artificial intelligence changes among SME manufacturing executives and managers is critical for leaders to compete in 2023 and beyond. Grounded in the dynamic capabilities view theory, the purpose of this quantitative correlation study was to examine the relationship between strategic dexterity, absorptive capacity, and competitive advantage. The participants were 66 executives and managers of SME manufacturing organizations who use big data and analytics daily and …
Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law
Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law
Walden Dissertations and Doctoral Studies
Small business owners who lack effective strategies to incorporate telecommuting may be unable to retain teleworking employees, create a flexible working environment, or improve workforce morale, negatively impacting company productivity and profitability. Grounded in transformational leadership theory and sociotechnical systems theory, the purpose of this qualitative multiple case study was to explore strategies small business owners use to incorporate telecommuting to retain teleworking employees. Data were collected from five small business owners in Texas with at least 1 year of management experience and created and maintained remote working strategies. Data collection included semistructured interviews and company documents. Three themes emerged …
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Walden Dissertations and Doctoral Studies
All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …
Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei
Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei
Walden Dissertations and Doctoral Studies
Small- and medium-sized enterprise (SME) manufacturing executives and managers are concerned with the rapid technological changes involving artificial intelligence (AI), machine learning, and big data. To compete in the global landscape, effectively managing digital and artificial intelligence changes among SME manufacturing executives and managers is critical for leaders to compete in 2023 and beyond. Grounded in the dynamic capabilities view theory, the purpose of this quantitative correlation study was to examine the relationship between strategic dexterity, absorptive capacity, and competitive advantage. The participants were 66 executives and managers of SME manufacturing organizations who use big data and analytics daily and …
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Walden Dissertations and Doctoral Studies
All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Walden Dissertations and Doctoral Studies
Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …
The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams
The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams
Walden Dissertations and Doctoral Studies
The role that the information technology (IT) department serves is governed by the corporate culture and how it values the use of knowledge, including IT, to achieve a strategic competitive advantage. The purpose of this quantitative study was to examine the potential relationships between information acquisition, knowledge dissemination, shared interpretation, organizational memory, and organizational flexibility. Two theories served as the theoretical foundation for this study: contingency theory and the resource-based view of the firm. To answer the question of possible correlation between organizational flexibility and components of knowledge management, a randomly selected sample of 193 IT professionals employed at small- …
Strategies To Increase Competitive Advantage In The Automotive Manufacturing Supply Chain, Amber Willis
Strategies To Increase Competitive Advantage In The Automotive Manufacturing Supply Chain, Amber Willis
Walden Dissertations and Doctoral Studies
Some automotive manufacturing supply chain leaders lack strategies that are needed to implement information technology (IT) systems. Business leaders are concerned with implementing IT systems to achieve and maintain a competitive advantage. Grounded in the resource-based view theory (RBV), the purpose of this qualitative single case study was to explore information system strategies used by leaders in the automotive manufacturing supply chain to achieve competitive advantage. Participants were five leaders of an automotive manufacturing supply chain organization who implemented IT systems. Data were collected through semistructured interviews and a review of organization project documents. Through thematic analysis, five themes were …
Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law
Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law
Walden Dissertations and Doctoral Studies
Small business owners who lack effective strategies to incorporate telecommuting may be unable to retain teleworking employees, create a flexible working environment, or improve workforce morale, negatively impacting company productivity and profitability. Grounded in transformational leadership theory and sociotechnical systems theory, the purpose of this qualitative multiple case study was to explore strategies small business owners use to incorporate telecommuting to retain teleworking employees. Data were collected from five small business owners in Texas with at least 1 year of management experience and created and maintained remote working strategies. Data collection included semistructured interviews and company documents. Three themes emerged …
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Walden Dissertations and Doctoral Studies
Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …
Text And Image Frames Affect Message's Sharing And Acceptance Of Social Media Users, Xin Sa
Text And Image Frames Affect Message's Sharing And Acceptance Of Social Media Users, Xin Sa
ETD Archive
No abstract provided.
Empirical Assessment Of Big Data Technology Adoption Factors For Organizations With Data Storage Systems, Ahmad B. Alnafoosi
Empirical Assessment Of Big Data Technology Adoption Factors For Organizations With Data Storage Systems, Ahmad B. Alnafoosi
College of Computing and Digital Media Dissertations
Many organizations have on-premises data storage systems. Data storage systems are evolving in multiple ways. One way is the adoption of Big Data. Big Data is a data storage system with the ability to analyze large volumes, velocity, and a variety of data. Per the Economist, data is now the most valuable resource (Parkins, 2017). Big Data holds the promise of unlocking a substantial value of data stored. Yet many organizations are not implementing Big Data. There is a need to identify key factors affecting adoption for such organizations. The literature review revealed multiple gaps in studied adoption factors (un-studied …
Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte
Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte
Walden Dissertations and Doctoral Studies
Small businesses are the foundation of an economy and spawn innovation, but small business owners fail at an alarming rate because they lack strategies to sustain business operations. Since 50% of small businesses fail within the first 5 years, small business sustainability research is critical to support small business owners. Grounded in entrepreneurial theory, the purpose of this multiple case study was to identify strategies information technology (IT) small business owners use to sustain operation beyond the first 5 years. The participants included four IT small business owners in the Southwestern United States who sustained operations beyond the first 5 …
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Walden Dissertations and Doctoral Studies
Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …
Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao
Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao
Walden Dissertations and Doctoral Studies
User Experience (UX) design improvement can alter business results. Information technology (IT) company leaders are concerned with UX design improvement, as it is the number one indication of product innovation success and user satisfaction. Grounded in Christensen’s disruptive innovation theory, the purpose of the qualitative single case study was to explore strategies IT company leaders and UX designers used to identify critical UX design elements that lead to improved product innovations. The participants were five IT company leaders and a focus group of four UX designers employed by a sizeable telecom organization in Beijing, China. The data were collected from …
The Effects Of Recommender System On Sales Promotion Of High-Value Products: Evidence From A Field Experiment In The Real Estate Industry, Lian Liu
Dissertations and Theses Collection (Open Access)
Real estate sales industry in China has long suffered the problem of inefficient matching of customers to projects. Inspired by the design of recommender systems, which have been widely used in the online retail industry, and are shown to facility customer-product matching and improve sales, we apply this system to the real estate sales industry using a novel approach. Instead of recommending products to customers, we suggest the best potential customers to salespeople with whom they will conduct sales with. Using city-wide sales data from the largest real estate sales company in China, we first develop a recommend system based …
Enterprise Resource Planning Implementation Strategies In Small- And Medium-Sized Manufacturing Enterprises, Tatianna Gilliam
Enterprise Resource Planning Implementation Strategies In Small- And Medium-Sized Manufacturing Enterprises, Tatianna Gilliam
Walden Dissertations and Doctoral Studies
The difficulty SME leaders of manufacturing firms experience in the executing of enterprise resource planning (ERP) systems threatens the longevity of innovative change within firms seeking to adopt ERP systems. Grounded in the diffusion of innovation theory, the purpose of this multiple case study was to examine critical success factors used to successfully implement ERP systems. The participants were four ERP business leaders of small to medium size manufacturing firms based on the east and west coasts of the United States. Data were collected using semistructured online interviews and a review of company documents. Through thematic analysis, five themes were …
Strategies For Small-And Medium-Sized Business Growth And Survival, Abiodun Nestamanuel Ogunmuyiwa
Strategies For Small-And Medium-Sized Business Growth And Survival, Abiodun Nestamanuel Ogunmuyiwa
Walden Dissertations and Doctoral Studies
In the United States, approximately 50% of small businesses fail within the first five years (Small Business Administration, 2018b). Small and medium sized enterprises (SMEs) owners and managers would benefit from strategies to identify and mitigate constraints to sustain their business beyond the first five years of business operation. Grounded in the system theory framework, the purpose of this qualitative multiple case study was to explore strategies leaders of small and medium sized enterprises (SMEs) in Austin, Texas, used to grow and sustain their business’s operations beyond five years. The participants were five small and medium sized businesses owners in …
Strategies For Cryptocurrency Adoption In Contemporary Businesses, Jacqueline Rodriguez
Strategies For Cryptocurrency Adoption In Contemporary Businesses, Jacqueline Rodriguez
Walden Dissertations and Doctoral Studies
Millions of Bitcoin transactions occur daily, worth nearly $2 billion annually. With the proliferation of cryptocurrency markets, the reluctance to adopt the currency as an alternate payment method could cause businesses to forgo growth opportunities within this expanding market. Grounded in the diffusion of innovation theory, the purpose of this qualitative multiple-case study was to explore strategies business leaders use to respond to the alternative payment concerns perpetuated by cryptocurrency markets. The participants comprised 6 business leaders who effectively employed cryptocurrency adoption strategies. Data were collected through semistructured interviews, corporate documents, and other company social media resources. Thematic analysis of …
Increasing Nurse Leader Knowledge And Awareness Of Information And Communication Technologies, Cory Stephens
Increasing Nurse Leader Knowledge And Awareness Of Information And Communication Technologies, Cory Stephens
Walden Dissertations and Doctoral Studies
Due to the recent coronavirus disease (COVID-19) pandemic, rapid technological innovation and nursing practice transformation exposed a deepening divide in the knowledge and awareness of information and communication technologies (ICT) among nurses. This technological skills gap undermines the benefits of ICT to nursing practice such as increased nurse satisfaction, improved care quality, and reduced costs. Nurse leaders are positioned to promote the use of ICT among nurses but may suffer from the same knowledge deficit of ICT as their followers. Guided by Locsin’s technological competencies as caring in nursing theory, Staggers and Parks’ nurse-computer interaction framework, and Covell’s nursing intellectual …
Strategies For Cybercrime Prevention In Information Technology Businesses, Sophfronia G. Tucker
Strategies For Cybercrime Prevention In Information Technology Businesses, Sophfronia G. Tucker
Walden Dissertations and Doctoral Studies
Cybercrime continues to be a devastating phenomenon, impacting individuals and businesses across the globe. Information technology (IT) businesses need solutions to defend and secure their data and networks from cyberattacks. Grounded in general systems theory and transformational leadership theory, the purpose of this qualitative multiple case study was to explore strategies IT business leaders use to protect their systems from a cyberattack. The participants included six IT business leaders with experience in cybersecurity or system security in the Midlands region of South Carolina. Data were collected using semistructured interviews and reviews of government standards documents; data were analyzed using thematic …
Employee Training Strategies For New Technology Implementation In Small Business, Eddy Varela
Employee Training Strategies For New Technology Implementation In Small Business, Eddy Varela
Walden Dissertations and Doctoral Studies
Failure to implement new technology creates a barrier to success for small businesses. Small business owners must create competitive advantages by implementing new technology as there is a need to maintain an advantage when competing in the local market economy. Grounded in the human capital theory, the purpose of this qualitative multiple case study was to explore the employee training strategies small business owners use to implement new technology. The participants were five small business owners in Central Florida who used employee training strategies to implement new technologies Data were collected using (a) semistructured interviews, (b) member checking interviews, (c) …
Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams
Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams
Walden Dissertations and Doctoral Studies
Information technology infrastructure library (ITIL) business leaders lack strategies for implementing critical success factors (CSFs) to promote organizational effectiveness and project success. As a result, ITIL leaders may experience less project success if CSF strategies are not effectively implemented. Grounded in the balanced scorecard (BSC) theory, this qualitative multiple case study aimed to explore strategies ITIL business leaders use to implement CSFs successfully to improve organizational efficiency for project success. The participants comprised five ITIL business leaders in the financial industry located in the southwestern region of the United States who successfully implemented strategies to implement CSFs to improve organizational …
Strategies Business Leaders Use To Mitigate Online Credit Card Fraud, Clarissa Rosario-Tavarez
Strategies Business Leaders Use To Mitigate Online Credit Card Fraud, Clarissa Rosario-Tavarez
Walden Dissertations and Doctoral Studies
Online credit card fraud targeting banks, customers, and businesses costs millions of U.S. dollars annually. Online business leaders face challenges securing and regulating the online payment processing environment. Grounded in the situational crime prevention theory, the purpose of this qualitative multiple case study was to explore strategies online business leaders use to mitigate the loss of revenue caused by online credit card fraud. The participants comprised five online business leaders of an organization in the Southwest of the United States, who implemented strategies that successfully mitigated revenue losses due to online credit card fraud. The data were collected from semistructured …