Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 54

Full-Text Articles in Physical Sciences and Mathematics

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams Jan 2023

The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams

Walden Dissertations and Doctoral Studies

The role that the information technology (IT) department serves is governed by the corporate culture and how it values the use of knowledge, including IT, to achieve a strategic competitive advantage. The purpose of this quantitative study was to examine the potential relationships between information acquisition, knowledge dissemination, shared interpretation, organizational memory, and organizational flexibility. Two theories served as the theoretical foundation for this study: contingency theory and the resource-based view of the firm. To answer the question of possible correlation between organizational flexibility and components of knowledge management, a randomly selected sample of 193 IT professionals employed at small- …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem Jan 2022

Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem

Walden Dissertations and Doctoral Studies

Since 2001, most government organizations’ IT modernization programs had failed because of ineffective implementation strategies from IT leaders. The research problem was the absence of effective strategies to modernize IT legacy systems. The purpose of this qualitative single case study was to explore effective IT modernization strategies to revolutionize IT legacy systems. The researcher sought to answer how organizations create effective strategies to modernize IT legacy systems. The study used purposeful sampling, including 13 IT leaders, IT technicians, and customers based on their experience in implementing successful IT modernization programs’ strategies. Data were collected using semi-structured interviews and agency documentation. …


Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson Jan 2022

Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson

Walden Dissertations and Doctoral Studies

Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …


Factors That Influence The Perception Of Higher Education Leaders In The Adoption Process Of Instructional Technology And Distance Education, Diego Tibaquirá Jan 2020

Factors That Influence The Perception Of Higher Education Leaders In The Adoption Process Of Instructional Technology And Distance Education, Diego Tibaquirá

Theses and Dissertations

The problem addressed by this study was that many administrators at institutions of higher learning are faced with the task of finding ways to provide the latest technologies while being extremely constricted by budgets and the rising cost of education. The purpose of this study was to determine the factors that influence the perceptions of higher education leaders in the adoption process of Instructional Technology and Distance Education. This included an examination of the decision-making process and what determined if Instructional Technology and Distance Education were either implemented or upgraded at various higher learning institutions.

The researcher implemented a mixed-methods …


The Impact Of Technological Advances On Older Workers, Toni Mcintosh Jan 2020

The Impact Of Technological Advances On Older Workers, Toni Mcintosh

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was the treatment of older workers in the information technology industry that contributes to age discrimination in the workplace. Age discrimination is against the law irrespective of whether it is aimed at older workers in the workforce or becoming job candidates at an advanced age. Although previous research has shown that age discrimination is prevalent in work environments, little has been suggested to eradicate the issue in the workplace. The purpose of this qualitative case study was to investigate the issue of age discrimination as it relates to workers over the age of …


The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase Jan 2020

The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase

Walden Dissertations and Doctoral Studies

America's higher education institutions have aligned computer science curricula with today's modern technology. Despite these efforts, data have shown that there is slow growth among young women majoring in computer science and even slower growth in this area at community colleges. Higher education institutions have also acknowledged a gap between men and women entering the computer science field and a need to explore options for computer science programs to engage women in the industry. The purpose of this phenomenological study was to gain an understanding of the perceptions and lived experiences of female students enrolled in computer classes at New …


Exploring Strategies To Integrate Disparate Bioinformatics Datasets, Charbel Bader Fakhry Jan 2019

Exploring Strategies To Integrate Disparate Bioinformatics Datasets, Charbel Bader Fakhry

Walden Dissertations and Doctoral Studies

Distinct bioinformatics datasets make it challenging for bioinformatics specialists to locate the required datasets and unify their format for result extraction. The purpose of this single case study was to explore strategies to integrate distinct bioinformatics datasets. The technology acceptance model was used as the conceptual framework to understand the perceived usefulness and ease of use of integrating bioinformatics datasets. The population of this study included bioinformatics specialists of a research institution in Lebanon that has strategies to integrate distinct bioinformatics datasets. The data collection process included interviews with 6 bioinformatics specialists and reviewing 27 organizational documents relating to integrating …


Knowledge Sharing And Customer Relations In Mobility, Katie Dyretha Moore Jan 2019

Knowledge Sharing And Customer Relations In Mobility, Katie Dyretha Moore

Walden Dissertations and Doctoral Studies

After the events of September 11, 2001, inadequacies in how government organizations and agencies shared knowledge and communication with defense mission partners became readily apparent. A reasonable U.S. government information technology expectation is the integrated use of mobile phones across organizations and agencies. Yet, it is difficult to meet this expectation, as the provisioning process for mobile devices can be different for each government organization or agency. The Department of Commerce National Institute of Standards and Technology does not set provisioning standards, and organizations and agencies determine policies tailored to their particular needs. Using Schein's theory on organizational culture, the …


Exploring Management Practices Of The Health Care System For Contractors, Gary L. Williams Jan 2018

Exploring Management Practices Of The Health Care System For Contractors, Gary L. Williams

Walden Dissertations and Doctoral Studies

Researchers have found that military members serving in war experienced changes in physical and mental health. Military members' healthcare is managed by the Department of Defense. The problem was that management practices of the system for providing long-term healthcare for employees of a contracting company working in foreign combat zones is either minimal or nonexistent. The purpose of this case study was to explore ways that contractor managers and government managers can work together to provide healthcare for those contract employees who will be deployed with the U.S. military. The primary research question was to determine what managers of contractors …


Public Health Providers' Perceptions Of Electronic Health Records In A Disaster, Sherhonda Yvette Harper Jan 2018

Public Health Providers' Perceptions Of Electronic Health Records In A Disaster, Sherhonda Yvette Harper

Walden Dissertations and Doctoral Studies

The introduction of federal initiatives and incentives regarding health information technology fostered a movement towards the adoption of electronic health records (EHR). Implementation of EHRs sparked discussions among healthcare providers, patients, and others about the benefits or challenges of the move from the traditional paper method to the electronic version in healthcare settings. A knowledge gap in research involving the usefulness of EHRs and their impact to the delivery of care in other settings exists. The purpose of this qualitative study was to explore public health providers' perceptions of the meaningful use of EHRs in a disaster setting. Study participants …


Strategies For E-Commerce Adoption In A Travel Agency, Anita Smith Jan 2018

Strategies For E-Commerce Adoption In A Travel Agency, Anita Smith

Walden Dissertations and Doctoral Studies

In 2016, online travel sales increased 8%, resulting in profits increasing to over 565 billion U.S. dollars. Traditional travel agencies in brick-and-mortar storefronts are facing challenges related to competing with online travel agencies (OTAs), attracting new customers, and retaining existing customers. The purpose of this qualitative case study was to explore the e-commerce processes, business models, and strategies that leaders of traditional travel agencies use to compete with OTAs. The study sample consisted of 8 travel professionals from 3 small travel agencies located in the mid-Atlantic region of the United States. The conceptual framework for this study was Rogers's diffusion …


Exploring Welfare Recipients' Self-Sufficiency Barriers Through Information Management Systems In Tennessee, Valenta Eunice Nichols Jan 2018

Exploring Welfare Recipients' Self-Sufficiency Barriers Through Information Management Systems In Tennessee, Valenta Eunice Nichols

Walden Dissertations and Doctoral Studies

Families living on welfare in low-income impoverished neighborhoods encounter multiple barriers that need mitigating before seeking work to reach self-sufficiency. Many welfare recipients' self-sufficiency barriers are unnoticeable to caseworkers due to lack of data sharing to assess clients' needs through information technology processes. The purpose of this exploratory descriptive phenomenological qualitative study was to understand welfare recipients' viewpoints on socioeconomic barriers to living self-sufficiently and gain perspectives from human services caseworkers and technical resources on data sharing issues that impact recipients' ability to live independently from government assistance. Data collection and observational field notes resulted from in-depth interviews of 11 …


Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster Jan 2017

Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster

Walden Dissertations and Doctoral Studies

The decision to implement information technology (IT) initiatives to enhance collaboration among veterans, baby boomers, Generation X, Generation Y, and Fifth Generation employees continues to challenge organizational leaders. The purpose of this nonexperimental study was to identify how the implementation of information technology initiatives, coupled with the knowledge of learning styles, might enhance collaboration among generational cohort employees. The generational cohort theory, Maslow's hierarchy of needs theory, and the technology acceptance model were the theoretical frameworks used to develop an understanding of the relationships among the cohorts and the acceptance of technology to enhance collaboration. Data were collected from a …


Strategies To Manage Enterprise Information Technology Projects, Mario West Jan 2017

Strategies To Manage Enterprise Information Technology Projects, Mario West

Walden Dissertations and Doctoral Studies

Since 2005, most midsize company information technology (IT) projects had a 62.4% failure rate because of wrong project team communication skills or cost overruns. IT leaders expect negative IT project outcomes will cost over $2 billion by 2020. Using the actor-network theory, the purpose of this single case study was to explore strategies used by IT leaders from a midsize IT company in Washington, D.C. to plan and execute projects under budget and on time. Using purposeful sampling, 5 IT leaders were selected for this study because of their experience in implementing successful strategies for projects. Data were collected using …


An Experimental Study On The Role Of Password Strength And Cognitive Load On Employee Productivity, Stephen Mujeye Jan 2016

An Experimental Study On The Role Of Password Strength And Cognitive Load On Employee Productivity, Stephen Mujeye

CCE Theses and Dissertations

The proliferation of information systems (IS) over the past decades has increased the demand for system authentication. While the majority of system authentications are password-based, it is well documented that passwords have significant limitations. To address this issue, companies have been placing increased requirements on the user to ensure their passwords are more complex and consequently stronger. In addition to meeting a certain complexity threshold, the password must also be changed on a regular basis. As the cognitive load increases on the employees using complex passwords and changing them often, they may have difficulty recalling their passwords. As such, the …


An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr. Jan 2016

An Investigation Of Socio-Technical Components Of Knowledge Management System (Kms) Usage, Noel Wint Jr.

CCE Theses and Dissertations

Existing literature indicates that although both academics and practitioners recognize knowledge management (KM) as a source of competitive advantage, users are not always willing to use a knowledge management system (KMS). Because of the social nature of knowledge transfer, a KMS can be considered a socio-technical system. Many explanations have been presented for this failure to utilize the KMS. These explanations include a number of the socio-technical factors relating to people, processes, and technologies. While these factors may have significant explanatory power when examined independently, existing studies have not sufficiently addressed the interactions among all three socio-technical factors or their …


Electronic Medical Records (Emr): An Empirical Testing Of Factors Contributing To Healthcare Professionals’ Resistance To Use Emr Systems, Emmanuel Patrick Bazile Jan 2016

Electronic Medical Records (Emr): An Empirical Testing Of Factors Contributing To Healthcare Professionals’ Resistance To Use Emr Systems, Emmanuel Patrick Bazile

CCE Theses and Dissertations

The benefits of using electronic medical records (EMRs) have been well documented; however, despite numerous financial benefits and cost reductions being offered by the federal government, some healthcare professionals have been reluctant to implement EMR systems. In fact, prior research provides evidence of failed EMR implementations due to resistance on the part of physicians, nurses, and clinical administrators. In 2010, only 25% of office-based physicians have basic EMR systems and only 10% have fully functional systems. One of the hindrances believed to be responsible for the slow implementation rates of EMR systems is resistance from healthcare professionals not truly convinced …


Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew Jan 2016

Patient Portals: Achieving Technology Acceptance And Meaningful Use In Independent Physician-Managed Practices, Kimberly W. Bartholomew

CCE Theses and Dissertations

As the bulk of medical health records shift from paper-based file systems to electronic formats, the promise of the transformation process called healthcare reform included adding efficiencies to medical practice workflows, lower costs, improved quality of care and most important, and the freeing of patient information from traditional propriety silos. With this incoming largess of protected health information data now viewable through online patient portals, patients can be empowered to become educated and active in their own health care decisions, but only if they have admission to their information. A digital divide currently exists in many medical practices where only …


An Empirical Investigation Of Factors Affecting Resistance To Using Multi-Method Authentication Systems In Public-Access Environments, Joseph Marnell Jan 2016

An Empirical Investigation Of Factors Affecting Resistance To Using Multi-Method Authentication Systems In Public-Access Environments, Joseph Marnell

CCE Theses and Dissertations

Over the course of history, different means of object and person identification as well as verification have evolved for user authentication. In recent years, a new concern has emerged regarding the accuracy of verifiable authentication and protection of personal identifying information (PII), because previous misuses have resulted in significant financial loss. Such losses have escalated more noticeably because of human identity-theft incidents due to breaches of PII within multiple public-access environments. Although the use of various biometric and radio frequency identification (RFID) technologies is expanding, resistance to using these technologies for user authentication remains an issue. This study addressed the …


Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi Jan 2016

Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi

CCE Theses and Dissertations

Although ERP systems have been depicted as a solution in many organizations, there are many negative reports on ERP success, benefits, and effect on user’s performance. Previous research noted that there is a lack of knowledge and awareness of ERP systems and their overall value to ERP organizations. ERP systems have been widely studied during the past decade, yet they often fail to deliver the intended benefits originally expected. One notable reason for their failures is the lack of understanding in users’ requirements. This dissertation study was designed to understand the relative importance of system quality (SQ), IQ (IQ), service …


Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig Jan 2016

Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig

CCE Theses and Dissertations

Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.

Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …


Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr. Jan 2016

Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr.

Walden Dissertations and Doctoral Studies

Primary care physicians (PCPPs) have been slow to implement electronic health records (EHRs), even though there is a U.S. federal requirement to implement EHRs. The purpose of this phenomenological study was to determine why PCPPs have been slow to adopt electronic health record (EHR) systems despite the potential to increase efficiency and quality of health care. The complex adaptive systems theory (CAS) served as the conceptual framework for this study. Twenty-six PCPPs were interviewed from primary care practices (PCPs) based in southwestern Ohio. The data were collected through a semistructured interview format and analyzed using a modified van Kaam method. …


Service Quality And Perceived Value Of Cloud Computing-Based Service Encounters: Evaluation Of Instructor Perceived Service Quality In Higher Education In Texas, Eges Egedigwe Jun 2015

Service Quality And Perceived Value Of Cloud Computing-Based Service Encounters: Evaluation Of Instructor Perceived Service Quality In Higher Education In Texas, Eges Egedigwe

CCE Theses and Dissertations

Cloud computing based technology is becoming increasingly popular as a way to deliver quality education to community colleges, universities and other organizations. At the same time, compared with other industries, colleges have been slow on implementing and sustaining cloud computing services on an institutional level because of budget constraints facing many large community colleges, in addition to other obstacles. Faced with this challenge, key stakeholders are increasingly realizing the need to focus on service quality as a measure to improve their competitive position in today's highly competitive environment. Considering the amount of study done with cloud computing in education, very …


An Examination Of Service Level Agreement Attributes That Influence Cloud Computing Adoption, Howard Gregory Hamilton Jun 2015

An Examination Of Service Level Agreement Attributes That Influence Cloud Computing Adoption, Howard Gregory Hamilton

CCE Theses and Dissertations

Cloud computing is perceived as the technological innovation that will transform future investments in information technology. As cloud services become more ubiquitous, public and private enterprises still grapple with concerns about cloud computing. One such concern is about service level agreements (SLAs) and their appropriateness.

While the benefits of using cloud services are well defined, the debate about the challenges that may inhibit the seamless adoption of these services still continues. SLAs are seen as an instrument to help foster adoption. However, cloud computing SLAs are alleged to be ineffective, meaningless, and costly to administer. This could impact widespread acceptance …


Affect And Online Privacy Concerns, David Charles Castano Apr 2015

Affect And Online Privacy Concerns, David Charles Castano

CCE Theses and Dissertations

The purpose of this study was to investigate the influence of affect on privacy concerns and privacy behaviors. A considerable amount of research in the information systems field argues that privacy concerns, usually conceptualized as an evaluation of privacy risks, influence privacy behaviors. However, recent theoretical work shows that affect, a pre-cognitive evaluation, has a significant effect on preferences and choices in risky situations. Affect is contrasted with cognitive issues in privacy decision making and the role of affective versus cognitive-consequentialist factors is reviewed in privacy context.

A causal model was developed to address how affect influences privacy concerns and …


Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen Jan 2015

Motivating The Solicited And Unsolicited Sharing Of Tacit Knowledge Through The Process Of Externalization, Sheila Yvonne Sorensen

CCE Theses and Dissertations

While several U. S. firms have invested in Knowledge Management (KM) tools and software, it has become apparent that investments must be made in additional facets of KM, such as knowledge sharing (KS), thought by many researchers to be the most important component of KM. Of the two types of KS, explicit and tacit, the sharing of tacit knowledge has been shown to contribute the most to an organization’s performance. However, since tacit knowledge is difficult to both convey and acquire, this unshared tacit knowledge may ultimately harm an organization when, without the appropriate knowledge, individuals cannot effectively perform their …