Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Walden University

Information Technology

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

Analysis Of Driving Forces That Ensures The Sustainability Of Voter Accreditation Technology, Lawrence Oluwagbenga Bayode Jan 2020

Analysis Of Driving Forces That Ensures The Sustainability Of Voter Accreditation Technology, Lawrence Oluwagbenga Bayode

Walden Dissertations and Doctoral Studies

Nigeria’s electoral body, the independent national electoral commission (INEC), deployed a novel information technology (IT) based voter accreditation technology in 2015. Benefits realized included transparency and curtailed electoral malpractices. The purpose of this quantitative correlational study was to examine the relationship(s) between some variables categorized into technological, organizational, and economic factors, and Sustainability of voter accreditation technology (SVAT). The theoretical framework for the study was the e-voting system adoption model in combination with constructs from three other theories. A total of 138 IT experts participated and were asked (via SurveyMonkey) of the relationships between the following factors and SVAT: ease …


Strategies Used By It Project Managers To Integrate Icts In The Eastern Caribbean, Carl St. Aubin Roberts Jan 2020

Strategies Used By It Project Managers To Integrate Icts In The Eastern Caribbean, Carl St. Aubin Roberts

Walden Dissertations and Doctoral Studies

Current practices used to guide information and communication technology (ICT) projects in the Caribbean and developing countries lead to high project failure rates. Project managers must adopt new innovative approaches for transformation towards a 21st-century information society and sustainable digital economies. Grounded in the technology acceptance model (TAM), the purpose of this qualitative multiple-case study was to explore strategies information technology (IT) project managers use to implement IT frameworks designed to guide Caribbean ICT integration. Data were collected from face to face interviews and company documents and analyzed using coding, thematic analysis, and methodological triangulation. The participants were 12 IT …


Strategies For The Development Of It Disaster Recovery Plans In The Manufacturing Industry, Michael Landry Sartwell Jan 2020

Strategies For The Development Of It Disaster Recovery Plans In The Manufacturing Industry, Michael Landry Sartwell

Walden Dissertations and Doctoral Studies

Information technology (IT) leaders have reported technology disruptions because of natural disasters, terror attacks, or adversarial threats. Information technology leaders are concerned with technology disruptions, as these disruptions are costing organizations as much as $22,000 per minute. Grounded in Zachman’s framework, the purpose of this qualitative multiple case study was to explore strategies IT managers in the manufacturing industry use to develop IT disaster recovery (DR) plans to support business operations. The participants included 3 manufacturing IT professionals, 2 Department of Defense manufacturing infrastructure specialists, and 1outsourcing contractor, each from firms located in the central United States who successfully developed …


It Security Managers' Strategies For Mitigating Data Breaches In Texas School Districts, Mercy Ikhuoria Nwankwo Jan 2020

It Security Managers' Strategies For Mitigating Data Breaches In Texas School Districts, Mercy Ikhuoria Nwankwo

Walden Dissertations and Doctoral Studies

School districts are increasingly becoming a prime target for cybercriminals. As a result, information technology (IT) security managers in Texas school districts are concerned about hackers gaining access to network resources that could lead to data breaches on their network. Grounded in the technology threat avoidance theory, the purpose of this qualitative multiple case study was to explore strategies IT security managers use to mitigate data breaches in school district networks in Texas. The participants comprised 6 IT security managers in 3 Texas school districts whose roles involved managing and implementing data security strategies. Data collection involved conducting semistructured interviews …


Key Strategies For Successful Information Technology Projects, David Morris Jan 2020

Key Strategies For Successful Information Technology Projects, David Morris

Walden Dissertations and Doctoral Studies

AbstractThe successful implementation of information technology (IT) projects globally depends on the increasing reliance of project managers on IT innovations. Some project managers and business leaders do not possess the strategies to effectively manage and successfully implement IT projects. Grounded in coordination theory, the purpose of this qualitative multiple case study was to explore strategies used to successfully implement IT projects. Data were collected using semistructured interviews and from company documents. The participants comprised 6 IT project managers in Northeast Ohio who successfully implemented IT projects. Thematic analysis was used to analyze the data. Four themes emerged: communication amongst all …


Strategies To Implement Big Data Analytics In Telecommunications Organizations, Delton Aneato Jan 2020

Strategies To Implement Big Data Analytics In Telecommunications Organizations, Delton Aneato

Walden Dissertations and Doctoral Studies

Information Technology (IT) leaders who do not invest in big data projects may struggle to gain a competitive advantage and business insights to improve performance. Grounded in the Kotter’s change and Six Sigma models, the purpose of this qualitative multiple case study was to explore strategies IT leaders used to implement big data analytics successfully. The participants comprised 4 IT leaders from 2 telecommunication organizations in the United States of America, who effectively used strategies to promote and maximize competitive advantage using big data analytics. Data were collected from semistructured interviews, company documents, and project-related documents and were analyzed using …