Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Strategies

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 73

Full-Text Articles in Physical Sciences and Mathematics

Overcoming Obstacles To Interdisciplinary Research: Empirical Insights And Strategies For Transdisciplinary Communication [Presentation], Cristo Leon, James Lipuma Mar 2024

Overcoming Obstacles To Interdisciplinary Research: Empirical Insights And Strategies For Transdisciplinary Communication [Presentation], Cristo Leon, James Lipuma

STEM for Success Resources

Presented at Third Meeting of the International Association FOR Trans-Disciplinary Communications (AFTC)


Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın Jul 2023

Cyberbullying: Senior Prospective Teachers’ Coping Knowledge And Strategies, Kürşat Arslan, İnan Aydın

Journal of Cybersecurity Education, Research and Practice

This study aimed to determine senior prospective teachers’ coping knowledge and strategies for cyberbullying in terms of demographic variables. The sample consisted of 471 prospective teachers (324 female and 147 male) studying in the 4th grade in Dokuz Eylül University Buca Education Faculty in Izmir in the 2019-2020 academic year. It was a quantitative study using a causal-comparative research design to find out whether prospective teachers’ coping knowledge differed by independent variables. The "Coping with Cyberbullying Scale" developed by Koç et al. (2016) was employed to discover prospective teachers’ coping strategies for cyberbullying. A "Personal Information" form was also prepared …


Using Visual Imagery To Develop Multiplication Fact Strategies, Gina Kling Apr 2023

Using Visual Imagery To Develop Multiplication Fact Strategies, Gina Kling

Dissertations

The learning of basic facts, or the sums and products of numbers 0–10 and their related differences and quotients, has always been a high priority for elementary school teachers. While memorization of basic facts has been a hallmark of elementary school, current recommendations focus on a more nuanced development of fluency with these facts. Fluency is characterized by the ability to demonstrate flexibility, accuracy, efficiency, and appropriate strategy use. Despite recommendations to focus on strategy use, there is insufficient information on instructional approaches that are effective for developing strategies, particularly for multiplication facts. Using visual imagery with dot patterns has …


Pandemic Time And Tourism In Oecd Countries: Artificial Intelligence And Digital Platforms, Alfonso Marino, Paolo Pariso, Michele Picariello Oct 2022

Pandemic Time And Tourism In Oecd Countries: Artificial Intelligence And Digital Platforms, Alfonso Marino, Paolo Pariso, Michele Picariello

University of South Florida (USF) M3 Publishing

Introduction underline the three phases related to sector crisis, Background, starting from literature highlight the importance of what are the main actions implemented in 38 Member States. Methodology, with SPAD, elaborates a qualitative and quantitative set of policy responses that are displayed in Results. Discussions highlight the different approaches within the OECD area, but also the absence of a common strategy to exit to the sector crisis. The conclusion emphasizes that crisis response policies still need to be built and developed in the OECD area, even though initial responses showed strong responses in individual Member States that did not address …


Planning Strategies And Barriers To Achieving Local Drought Preparedness, T. Haigh, E. Wickham, S. Hamlin, C. Knutson Jan 2022

Planning Strategies And Barriers To Achieving Local Drought Preparedness, T. Haigh, E. Wickham, S. Hamlin, C. Knutson

School of Natural Resources: Faculty Publications

No abstract provided.


As The Goose Flies: Migration Routes And Timing Of Strategies Influence Genetic Diversity Patterns Of A Circumpolar Goose, R. E. Wilson, Sarah A. Sonsthagen, J. M. Dacosta, M. D. Sorenson, A. D. Fox, M. Weaver, D. Skalos, A. V. Kondratyev, K. T. Scribner, A. Walsh, C. R. Ely, S. L. Talbot Jan 2022

As The Goose Flies: Migration Routes And Timing Of Strategies Influence Genetic Diversity Patterns Of A Circumpolar Goose, R. E. Wilson, Sarah A. Sonsthagen, J. M. Dacosta, M. D. Sorenson, A. D. Fox, M. Weaver, D. Skalos, A. V. Kondratyev, K. T. Scribner, A. Walsh, C. R. Ely, S. L. Talbot

School of Natural Resources: Faculty Publications

No abstract provided.


Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger Jan 2022

Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger

Walden Dissertations and Doctoral Studies

AbstractRecent cyberattacks in hospitals show the urgency of the need to enhance secure information technology (IT) infrastructure. Hospitals are statistically more at cyber risk than all the multiple industries against ransomware, malware, hacking and internal threats. Guided by routine activity theory, the purpose of this exploratory multiple case study was to explore strategies utilized by hospitals' IT security managers to reduce cybersecurity breaches associated with sensitive data. The participants were nine IT security managers from hospitals in the eastern United States. Data were collected via semistructured interviews and supporting documentation from the consenting participants and hospitals' websites. Through thematic analysis, …


Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith Jan 2022

Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith

Walden Dissertations and Doctoral Studies

Business leaders do not often consider investing in informational technology (IT) to increase performance. These business leaders lack knowledge of innovative IT adoption strategies to expand their revenue and reduce costs to sustain a competitive advantage. Grounded in the technology-organization-environment (TOE) theory, the purpose of this qualitative multiple case study was to explore IT innovation adoption strategies business leaders use to increase performance. The participants were four successful business leaders selected from finalists for international entrepreneurial awards presented annually in the Mid-Atlantic region of the United States. The data were collected using semistructured telephone interviews, media releases, and online publications. …


Law Library Blog (December 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law Dec 2021

Law Library Blog (December 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Classroom And Computational Investigations Of Camel Up, Thomas J. Clark Sep 2021

Classroom And Computational Investigations Of Camel Up, Thomas J. Clark

Faculty Work Comprehensive List

Camel Up is a popular board game in which players score points by betting on camels which move randomly via a dice mechanic. The game is available both as a board game [1], as well as an IOS App [2]. Because of the random nature of the camels it is generally difficult to play optimally, but one can nevertheless develop various strategies. Probabilistic knowledge proves helpful in assigning relative value to potential game choices. We discuss how this game can be used to motivate and provide context for learning about the concepts of conditional probability and expected value. Also we …


Polymeric Nanoparticles Active Against Dual-Species Bacterial Biofilms, Jessa Marie V. Makabenta, Jungmi Park, Cheng-Hsuan Li, Aritra Nath Chattopadhyay, Ahmed Nabawy, Ryan F. Landis, Akash Gupta, Suzannah Schmidt-Malan, Robin Patel, Vincent M. Rotello Jan 2021

Polymeric Nanoparticles Active Against Dual-Species Bacterial Biofilms, Jessa Marie V. Makabenta, Jungmi Park, Cheng-Hsuan Li, Aritra Nath Chattopadhyay, Ahmed Nabawy, Ryan F. Landis, Akash Gupta, Suzannah Schmidt-Malan, Robin Patel, Vincent M. Rotello

Chemistry Department Faculty Publication Series

Biofilm infections are a global public health threat, necessitating new treatment strategies. Biofilm formation also contributes to the development and spread of multidrug-resistant (MDR) bacterial strains. Biofilm-associated chronic infections typically involve colonization by more than one bacterial species. The co-existence of multiple species of bacteria in biofilms exacerbates therapeutic challenges and can render traditional antibiotics ineffective. Polymeric nanoparticles offer alternative antimicrobial approaches to antibiotics, owing to their tunable physico-chemical properties. Here, we report the efficacy of poly(oxanorborneneimide) (PONI)-based antimicrobial polymeric nanoparticles (PNPs) against multi-species bacterial biofilms. PNPs showed good dual-species biofilm penetration profiles as confirmed by confocal laser scanning microscopy. …


Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2021

Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo Jan 2021

The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo

Walden Dissertations and Doctoral Studies

Despite information technology (IT) officers’ multiple efforts to develop reliable and efficient electronic justice (e-justice) systems, digitizing court processes still presents several quality challenges associated with IT infrastructure and literacy issues. Grounded in the principles of total quality management, the purpose of this qualitative multiple case study was to identify strategies and best practices IT officers in African regional economic communities (REC) use for digitizing regional and subregional court processes to improve African e-justice systems. The participants included four IT officers working as assistant computer system analysts (ACSA), computer system analysts (CSA), and heads of IT (HIT) in regional and …


Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa Jan 2021

Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa

Walden Dissertations and Doctoral Studies

Small business owners employ over half the U.S. labor force, yet only 50% of small businesses survive beyond 5 years. When small business owners understand the factors that lead to their business failure, they can develop strategies to remain sustainable and profitable within the first 5 years, thus reducing the potential of business failure. Grounded in the resource-based theory, the purpose of this qualitative multiple case study was to explore strategies five small construction owners in central Georgia used to remain in business beyond 5 years. Data were collected from semi structured interviews, a review of organization income statements and …


Strategies To Control Costs At U.S. Commercial Nuclear Power Plants, Gregory J. Lindamood Jan 2021

Strategies To Control Costs At U.S. Commercial Nuclear Power Plants, Gregory J. Lindamood

Walden Dissertations and Doctoral Studies

Commercial nuclear power plants in the United States are not cost competitive because of high operating and maintenance costs and historically low natural gas prices, resulting in the potential for premature plant closure of up to 25% of the operating power plants by 2025. Premature plant closure could impact the consumer through higher electricity rates, increased air pollution, and electric grid instability from increased renewable usage. Grounded in the behavioral decision theory, the purpose of this qualitative single case study was to explore successful strategies nuclear leaders used to control costs and ensure competitiveness. Data were collected through semistructured interviews …


Retention Strategies To Ensure Financial Sustainability In Community Colleges, Claudia Yvette Provost Jan 2021

Retention Strategies To Ensure Financial Sustainability In Community Colleges, Claudia Yvette Provost

Walden Dissertations and Doctoral Studies

AbstractA rapid decline in student retention among community colleges reduces revenue and jeopardizes financial sustainability, meaning leaders of community colleges who lack strategies to retain students have lower revenue and financial sustainability. Grounded in the advocacy and participatory worldview conceptual framework, the purpose of this qualitative, single case study was to explore strategies leaders of community colleges used to increase student retention and revenues for achieving financial sustainability. A purposeful sampling of five leaders from a community college in Louisiana who successfully used strategies to increase student retention participated in this study. Data were collected from semistructured interviews and institutional …


Strategies To Overcome Constraints For Small Business Sustainability, Jaquane Mawyne Jones Jan 2021

Strategies To Overcome Constraints For Small Business Sustainability, Jaquane Mawyne Jones

Walden Dissertations and Doctoral Studies

More than 20% of small businesses that started in March 2018 failed within a year. Small business owners would benefit from strategies to identify and mitigate constraints from inception for business survival because business failure rates are higher among small businesses less than five years old. Grounded in the theory of constraints, the purpose of this qualitative multiple case study was to explore strategies small business owners use to sustain beyond the one year of operation. The participants included six small business owners in Georgia who successfully sustained their business beyond five years. Data were collected using semistructured interviews and …


Reimagining Bottom-Up Participatory Climate Change Adaptation In The Philippines, Emily Clark Nabong May 2020

Reimagining Bottom-Up Participatory Climate Change Adaptation In The Philippines, Emily Clark Nabong

USF Tampa Graduate Theses and Dissertations

While climate change trends indicate the progression towards more widespread and severe impacts across the world, current consequences of society’s climate inaction are already being felt by many vulnerable populations. Low-lying and coastal areas are particularly at risk from climate-related hazards such as sea level rise and increased intensity storms. In order to protect residents, countries and regional governments have begun to plan and implement adaptation strategies to minimize the impact of future climate change related disasters.

This thesis explores the current status of bottom-up participatory climate change adaptation planning in the Philippines and offers new insights into making this …


Strategies And Algorithms Of Sudoku, Callie Weaver May 2020

Strategies And Algorithms Of Sudoku, Callie Weaver

Mathematics Senior Capstone Papers

This paper discusses different strategies for the game of Sudoku and how those strategies relate to other problem solving techniques while also attempting to use those other techniques in a way that improves the strategies for Sudoku. This includes a thorough analysis of the general algorithm and an algorithm that is formed by the Occupancy Theorem and Preemptive Sets. This paper also compares these algorithms that directly relate to Sudoku with algorithms to similar combinatorial problems such as the Traveling Salesman problem and more. With the study of game theory becoming more popular, these strategies have also been shown to …


Exploring Strategies To Transition To Big Data Technologies From Dw Technologies, Mbah Johnas Fortem Jan 2020

Exploring Strategies To Transition To Big Data Technologies From Dw Technologies, Mbah Johnas Fortem

Walden Dissertations and Doctoral Studies

As a result of innovation and technological improvements, organizations are now capable of capturing and storing massive amounts of data from various sources and domains. This increase in the volume of data resulted in traditional tools used for processing, storing, and analyzing large amounts of data becoming increasingly inefficient. Grounded in the extended technology acceptance model, the purpose of this qualitative multiple case study was to explore the strategies data managers use to transition from traditional data warehousing technologies to big data technologies. The participants included data managers from 6 organizations (medium and large size) based in Munich, Germany, who …


Sustainability Strategies Of Small Business Owners In Northcentral Texas, Danielson Ledum Dukor Jan 2020

Sustainability Strategies Of Small Business Owners In Northcentral Texas, Danielson Ledum Dukor

Walden Dissertations and Doctoral Studies

While small businesses contribute significantly to job creation in the United States, they fail financially at alarming rates. Fifty percent of small businesses survive 5 years or longer, and only one-third of small business startups survive more than 10 years. Owners of small businesses could benefit from strategies used to mitigate the small firms’ failure rate by obtaining suitable leadership values and skills, understanding the business’s nature, and engaging in financial planning. Grounded in Schumpeter’s entrepreneurship theory, the purpose of this qualitative multiple case study was to explore strategies small home health business owners used to sustain their businesses beyond …


Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch Jan 2020

Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch

Walden Dissertations and Doctoral Studies

AbstractElectronic health record system implementations have a high failure rate when properly developed strategies are not used. These implementation failures affect healthcare workers and practitioners core roles through a lack of documentation practices, which decreases the quality of the care of the patients. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore the strategies information technology systems engineers use for the implementation of Health Information Management Systems. The participants were 10 information technology systems engineers from three healthcare organizations in the greater Tennessee area. The data were collected through recorded participant interviews …


Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna Jan 2020

Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna

Walden Dissertations and Doctoral Studies

Healthcare organizations generate massive amounts of data through their databases that may be vulnerable to data breaches due to extensive user privileges, unpatched databases, standardized query language injections, weak passwords/usernames, and system weaknesses. The purpose of this qualitative multiple case study was to explore technical strategies database managers in Southeast/North Texas used to protect database systems from data breaches. The target population consisted of database managers from 2 healthcare organizations in this region. The integrated system theory of information security management was the conceptual framework. The data collection process included semistructured interviews with 9 database managers, including a review of …


The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo Jan 2020

The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo

Walden Dissertations and Doctoral Studies

As consumers increase the use of smart technologies, the lack of or improper implementation of Internet of Things (IoT) systems may affect the profitability of hotel businesses. For this qualitative single case study, Porter’s value chain model was the conceptual framework. The data collection process also included direct observations, participant observations, company performance documents, and reflective journaling. Data analysis from multiple sources of data was triangulated to hoteliers revealing that the implementation of IoT systems strategies may increase profit through the use of IoT system technology. Using Yin’s 5-step process, data were coded and analyzed and produced 3 themes: offer …


Strategies Used In Ehealth Systems Adoption, Joshua Adams Jan 2020

Strategies Used In Ehealth Systems Adoption, Joshua Adams

Walden Dissertations and Doctoral Studies

Failure to adopt an interoperable eHealth system limits the accurate communication exchange of pertinent health-care-related data for diagnosis and treatment. Patient data are located in disparate health information systems, and the adoption of an interoperable eHealth system is complex and requires strategic planning by senior health care IT leaders. Grounded in DeLone and McLean’s information system success model, the purpose of this qualitative case study was to explore strategies used by some senior information technology (IT) health care leaders in the successful adoption of an eHealth system. The participants were 8 senior health care IT leaders in the eastern United …


Strategies To Implement Big Data Analytics In Telecommunications Organizations, Delton Aneato Jan 2020

Strategies To Implement Big Data Analytics In Telecommunications Organizations, Delton Aneato

Walden Dissertations and Doctoral Studies

Information Technology (IT) leaders who do not invest in big data projects may struggle to gain a competitive advantage and business insights to improve performance. Grounded in the Kotter’s change and Six Sigma models, the purpose of this qualitative multiple case study was to explore strategies IT leaders used to implement big data analytics successfully. The participants comprised 4 IT leaders from 2 telecommunication organizations in the United States of America, who effectively used strategies to promote and maximize competitive advantage using big data analytics. Data were collected from semistructured interviews, company documents, and project-related documents and were analyzed using …


Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen Jan 2019

Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen

Walden Dissertations and Doctoral Studies

The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study's conceptual framework. …


Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen Jan 2019

Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen

Walden Dissertations and Doctoral Studies

The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study's conceptual framework. …


Cybersecurity Strategies To Protect Information Systems In Small Financial Institutions, Johnny Fadel Rawass Jan 2019

Cybersecurity Strategies To Protect Information Systems In Small Financial Institutions, Johnny Fadel Rawass

Walden Dissertations and Doctoral Studies

Leaders of financial institutions face challenges in protecting data because of the increased use of computer networks in the commerce and governance aspects of their businesses. The purpose of this single case study was to explore the strategies that leaders of a small financial institution used to protect information systems from cyber threats. The actor-network theory was the conceptual framework for this study. Data were collected through face-to-face, semistructured interviews with 5 leaders of a small financial institution in Qatar and a review of company documents relevant to information security, cybersecurity, and risk management. Using thematic analysis and Yin'€™s 5-€step …


Strategies For Using Information And Communication Technologies To Improve Profitability, Rodney Mciver Jan 2019

Strategies For Using Information And Communication Technologies To Improve Profitability, Rodney Mciver

Walden Dissertations and Doctoral Studies

Small business owners in a range of industries continually adapt to take advantage of technological developments in accounting, marketing, and communication. The purpose of this multiple case study was to explore strategies that small business owners operating in the central region of North Carolina used to implement information and communication technology (ICT). Roger's diffusion of innovation theory grounded the study. Data collection included face-to-face semistructured interviews with 6 owners of small businesses who successfully implemented ICT, field notes from site observations, and reviews of participant websites. Interviews were transcribed and participants were engaged in member checking. Data were analyzed using …