Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu Jan 2020

Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu

Walden Dissertations and Doctoral Studies

Information technology (IT) employees of small business organizations have been the driving force for the implementation of innovative standardized IT service management and process improvement initiatives. Competitiveness amongst small business IT organizations in the market for quality IT service delivery led small business IT leaders toward the implementation of an information technology infrastructure library (ITIL) as an IT service management framework. The problem addressed in this research encompassed the needs of small business IT leaders and ITIL designers to understand the perceptions of IT operation employees following ITIL implementation. The purpose of this qualitative multiple case study was to explore …


Customer And Employee Social Media Comments/Feedback And Stock Purchasing Decisions Enhanced By Sentiment Analysis, Drew Mikel Hall Jan 2020

Customer And Employee Social Media Comments/Feedback And Stock Purchasing Decisions Enhanced By Sentiment Analysis, Drew Mikel Hall

Walden Dissertations and Doctoral Studies

The U.S. Securities and Exchange Commission (SEC) warns professional investors that sentiment analysis tools may lead to impulsive investment decision-making. This warning comes despite evidence showing that aided social sentiment investment decision tools can increase accurate investment decision-making by 18%. Using Fama's theory of efficient market hypothesis, the purpose of this quantitative correlational study was to examine whether customer Twitter comments and employee Glassdoor feedback sentiment predicted successful investing decisions measured by business stock prices. Two thousand records from 3 archival U.S. public NASDAQ 100 datasets from March 28, 2016, to June 15, 2016 (79 days) of 53 companies with …


Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon Jan 2020

Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon

Walden Dissertations and Doctoral Studies

The cyber threat landscape has led some cybersecurity leaders to focus on a holistic approach encompassing people, processes, and technology to make their government agencies and organizations more responsive to a more diverse and inclusive cyber workforce to protect critical infrastructure from hackers or cybercriminals intent on causing harm. This qualitative multiple case study used Schein’s organizational culture theory to explore strategies used by cybersecurity leaders to attract, recruit, and retain diverse cybersecurity professionals to effectively and efficiently protect sensitive systems from rising cyber threats. The study's population consisted of cybersecurity leaders from 3 government agencies and 9 organizations in …


Social Connectedness And Financial Independence Strategies Supporting Nonprofit Sustainability, Christopher Edmund Maylor Jan 2020

Social Connectedness And Financial Independence Strategies Supporting Nonprofit Sustainability, Christopher Edmund Maylor

Walden Dissertations and Doctoral Studies

Leaders of nonprofit organizations (NPOs) often lack strategies to ensure the sustainability of their organizations beyond initial funding, resulting in significant risk to program continuity. Grounded in social entrepreneurship theory, the purpose of this qualitative single-case study was to explore strategies used by 3 leaders of a small NPO in the southwest region of the United States. Data were collected from semistructured interviews and a review of organizational documents. Through thematic analysis, 6 social themes emerged: optimization of business strategies, income and donor growth, program cost management, funding diversification, program licensing, and public awareness of NPO programs. The contributions to …


Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove Jan 2020

Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove

Walden Dissertations and Doctoral Studies

Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …


The Impact Of Technological Advances On Older Workers, Toni Mcintosh Jan 2020

The Impact Of Technological Advances On Older Workers, Toni Mcintosh

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was the treatment of older workers in the information technology industry that contributes to age discrimination in the workplace. Age discrimination is against the law irrespective of whether it is aimed at older workers in the workforce or becoming job candidates at an advanced age. Although previous research has shown that age discrimination is prevalent in work environments, little has been suggested to eradicate the issue in the workplace. The purpose of this qualitative case study was to investigate the issue of age discrimination as it relates to workers over the age of …


Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham Jan 2020

Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham

Walden Dissertations and Doctoral Studies

Consumer online activities can generate massive volumes of data that private companies may collect and use for business purposes. Consumer personal data need to be protected from unauthorized access and misuse. The specific problem is that consumers have little control regarding their data being collected and used by private companies. The purpose of this qualitative archival research was to explore business practices involving collection and use of consumer data without an individual’s consent. This study used the big data ethical conceptual framework to focus on various privacy issues, including those related to ownership, transparency, ethics, and consumer privacy laws. Archival …


Engaging External Stakeholders To Improve Public-Private Partnership Water Project Completion Rates, John Paul Kolman Jan 2020

Engaging External Stakeholders To Improve Public-Private Partnership Water Project Completion Rates, John Paul Kolman

Walden Dissertations and Doctoral Studies

Public-private partnership (PPP) water projects may have competing external stakeholders, resulting in a disproportionately high project failure rate when compared to other types of infrastructure projects. Private companies and local governments use PPP projects as a means to bridge deficiencies in local government funding and knowledge to assist in bringing improved water to their communities. The purpose of this qualitative single case study was to examine strategies leaders use to engage their external stakeholders in improving their PPP project completion rates. The study was grounded in Freeman's stakeholder theory. The participants consisted of 3 leaders who recently completed stakeholder activities …


Exploring Cybersecurity Awareness And Training Strategies To Protect Information Systems And Data, Michael Hanna Jan 2020

Exploring Cybersecurity Awareness And Training Strategies To Protect Information Systems And Data, Michael Hanna

Walden Dissertations and Doctoral Studies

Ineffective security education, training, and awareness (SETA) programs contribute to compromises of organizational information systems and data. Inappropriate actions from users due to ineffective SETA programs may result in legal consequences, fines, reputational damage, adverse impacts on national security, and criminal acts. Grounded in social cognitive theory, the purpose of this qualitative multiple case study was to explore strategies hospitality organizational information technology (IT) leaders utilized to implement SETA successfully. The participants were organizational IT leaders from four organizations in Hampton Roads, Virginia. Data collection was performed using telephone and video teleconference interviews with organizational IT leaders (n = 6) …


Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten Jan 2020

Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten

Walden Dissertations and Doctoral Studies

Cloud computing adoption rates have not grown commensurate with several well-known and substantially tangible benefits such as horizontal distribution and reduced cost, the latter both in terms of infrastructure and specialized personnel. The lack of adoption presents a challenge to both service providers from a sales perspective and service consumers from a usability focus. The purpose of this quantitative correlational study utilizing the technological, organizational, and environmental framework was to examine the relationship between shared technology (ST), malicious insiders (MI), account hijacking, data leakage, data protection, service partner trust (SP), regulatory concerns and the key decision-makers intention to adopt cloud …


Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde Jan 2020

Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde

Walden Dissertations and Doctoral Studies

Some financial institutions in Nigeria have not deployed strategies that mitigate cyber exploitation risks in the financial services industry. Financial institution leaders are concerned because cyber exploitation contributed to the reduction in the adult banking population to a low 38%. Grounded in the integrated systems theory of information security management, the purpose of this multiple case study was to explore strategies some financial institution leaders in Nigeria use to prevent cyber exploitations. The participants included 6 chief information security officers of 6 financial institutions. Data were collected from semistructured interviews and company and public documents. A thematic analysis identified themes …


Social Responsibility Perceptions Of Community Flood Resilience In Nigeria, Reginald Olisa Oranye Jan 2020

Social Responsibility Perceptions Of Community Flood Resilience In Nigeria, Reginald Olisa Oranye

Walden Dissertations and Doctoral Studies

Flooding is a severe threat to livelihoods and socioeconomic development in Ogbaru riverine communities of Anambra State, Nigeria. Limited success in the traditional approach of using predominantly structural measures, such as flood channels, to manage floods makes it imperative to explore nonstructural resilience initiatives that would potentially better protect vulnerable flood-prone communities. This study contributes to addressing the problems of ineffective flood management by developing vital social responsibility (SR) data and information that can enhance community flood resilience through individual and collective responsibilities for resilient action. The purpose of this quantitative correlational study was to explore SR perceptions of flood …


Reducing Payment-Card Fraud, Chares R. Ross Jan 2020

Reducing Payment-Card Fraud, Chares R. Ross

Walden Dissertations and Doctoral Studies

Critical public data in the United States are vulnerable to theft, creating severe financial and legal implications for payment-card acceptors. When security analysts and managers who work for payment card processing organizations implement strategies to reduce or eliminate payment-card fraud, they protect their organizations, consumers, and the local and national economy. Grounded in Cressey’s fraud theory, the purpose of this qualitative single case study was to explore strategies business owners and card processors use to reduce or eliminate payment-card fraud. The participants were 3 data security analysts and 1 manager working for an international payment card processing organization with 10 …


Information Security Ambassadors’ Perceptions Of Peer-Led Motivation In Phishing Detection, Kingkane Malmquist Jan 2020

Information Security Ambassadors’ Perceptions Of Peer-Led Motivation In Phishing Detection, Kingkane Malmquist

Walden Dissertations and Doctoral Studies

Phishing rates are increasing yearly and continue to compromise data integrity. The need to guard business information is vital for organizations to meet their business objectives and legal obligations. The purpose of this phenomenological study was to explore security ambassadors’ perceptions of motivating their peers to adopt safe internet behaviors in a large medical campus in Minnesota. Hackman and Oldham’s job characteristic motivation theory was used to frame the study. Data were collected from semistructured interviews with 20 security ambassadors. Data coding and analysis yielded 7 themes: rewarding, value, personal interest, limited information security knowledge, increased interest, communication, and topics …


Innovation And Market Leadership In A Technology Industry, Wilson Zehr Jan 2020

Innovation And Market Leadership In A Technology Industry, Wilson Zehr

Walden Dissertations and Doctoral Studies

According to the Abernathy-Utterback (A-U) model, firms focus on technological product innovation early in the product lifecycle and then shift to process innovation as markets mature. However, there is no consensus on the forms that non-technological innovation can take. In addition, the A-U model, which guides innovators, does not include forms of non-technological innovation that are generally accepted by experts. In this study, a hybrid e-Delphi technique with an AHP decision model was used to evaluate the forms of innovation used to establish market leadership over the historical lifecycle of the personal computer industry in the United States. In Phase …


Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii Jan 2020

Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii

Walden Dissertations and Doctoral Studies

Many data scientists are struggling to adopt effective data governance practices as they transition from traditional data analysis to big data analytics. Data governance of big data requires new strategies to deal with the volume, variety, and velocity attributes of big data. The purpose of this qualitative multiple case study was to explore big data governance strategies employed by data scientists to provide a holistic perspective of those data for making decisions. The participants were 10 data scientists employed in multiple mid-market companies in the greater Salt Lake City, Utah area who have strategies to govern big data. This study’s …