Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

2019

Information Technology

Articles 1 - 6 of 6

Full-Text Articles in Databases and Information Systems

Strategizing Effective Succession Planning For Information Technology Executives, Michael Barr Jan 2019

Strategizing Effective Succession Planning For Information Technology Executives, Michael Barr

Walden Dissertations and Doctoral Studies

Organizations across the United States lose hundreds of millions of dollars each year due to the lack of effective succession planning for information technology executives. The purpose of this single case study was to explore strategies for the development and implementation of effective succession plans for future information technology executives. Bass and Avolio's transformational leadership theory was the conceptual framework for this study. The 3 participants were selected based upon their roles as executives in technology-related positions and their experiences with succession planning. Data were collected using semistructured interviews with these executives from a company headquartered in Kansas City, Missouri. …


Leadership Characteristics In Flexible Information Technology Environments, Chrisilia Bristow Jan 2019

Leadership Characteristics In Flexible Information Technology Environments, Chrisilia Bristow

Walden Dissertations and Doctoral Studies

Researchers have found that a positive correlation exists between information technology (IT) flexibility, IT effectiveness, and strategic alignment in organizations. It has been determined that within inflexible IT environments maintainability is reduced and key business factors become at risk. An IT flexibility measurement matrix was developed to assess IT flexibility however leadership characteristics were not identified for measurement with that model. Determining the leadership characteristics needed for IT flexibility was the purpose of this multiple case study. Leveraging the empowerment, situational leadership, IT-business equilibrium, and complexity change theories, the research questions were focused on the leadership characteristics exhibited by organizational …


Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome Jan 2019

Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome

Walden Dissertations and Doctoral Studies

In the United States, women remain underrepresented in senior level positions in the information technology (IT) field. Despite this challenge, a few women have successfully ascended into senior leadership in IT. Using the social cognitive theory as the conceptual framework, the purpose of this qualitative transcendental phenomenological study was to understand the lived experiences of senior women leaders in the IT field. The research question explored the lived personal and professional experiences of senior women leaders in IT to gain an understanding of their career advancement into senior leadership positions. Through the use of the modified Van Kaam method of …


Exploring Information Technology Return On Investment Reports For Planning, Budgeting, And Implementation, Constantine Bitwayiki Jan 2019

Exploring Information Technology Return On Investment Reports For Planning, Budgeting, And Implementation, Constantine Bitwayiki

Walden Dissertations and Doctoral Studies

The failure rate of new government information technology (IT) projects in developing countries is high, with 35% classified as total failures and approximately 50% as partial failures. The population for this study was 10 senior managers of a public sector organization in Uganda selected because of high IT project successes achieved through leveraging IT return on investment (ROI) reports. The purpose of this qualitative single-case study was to explore the strategies Ugandan senior public sector officials used to leverage IT ROI reports during planning, budgeting, and implementation of IT projects to reduce failure rates. The conceptual frameworks were the strategic …


Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome Jan 2019

Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome

Walden Dissertations and Doctoral Studies

In the United States, women remain underrepresented in senior level positions in the information technology (IT) field. Despite this challenge, a few women have successfully ascended into senior leadership in IT. Using the social cognitive theory as the conceptual framework, the purpose of this qualitative transcendental phenomenological study was to understand the lived experiences of senior women leaders in the IT field. The research question explored the lived personal and professional experiences of senior women leaders in IT to gain an understanding of their career advancement into senior leadership positions. Through the use of the modified Van Kaam method of …


Exploring Industry Cybersecurity Strategy In Protecting Critical Infrastructure, Mark Boutwell Jan 2019

Exploring Industry Cybersecurity Strategy In Protecting Critical Infrastructure, Mark Boutwell

Walden Dissertations and Doctoral Studies

Successful attacks on critical infrastructure have increased in occurrence and sophistication. Many cybersecurity strategies incorporate conventional best practices but often do not consider organizational circumstances and nonstandard critical infrastructure protection needs. The purpose of this qualitative multiple case study was to explore cybersecurity strategies used by information technology (IT) managers and compliance officers to mitigate cyber threats to critical infrastructure. The population for this study comprised IT managers and compliance officers of 4 case organizations in the Pacific Northwest United States. The routine activity theory developed by criminologist Cohen and Felson in 1979 was used as the conceptual framework. Data …