Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 39

Full-Text Articles in Databases and Information Systems

Consumers Perspectives On Using Biometric Technology With Mobile Banking, Rodney Alston Clark Jan 2021

Consumers Perspectives On Using Biometric Technology With Mobile Banking, Rodney Alston Clark

Walden Dissertations and Doctoral Studies

The need for applying biometric technology in mobile banking is increasing due to emerging security issues, and many banks’ chief executive officers have integrated biometric solutions into their mobile application protocols to address these evolving security risks. This quantitative study was performed to evaluate how the opinions and beliefs of banking customers in the Mid-Atlantic region of the United States might influence their adoption of mobile banking applications that included biometric technology. The research question was designed to explore how performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC), perceived credibility (PC), and task-technology fit (TTF) affected …


Meaningful Use Criteria And Staff Accountability In An Office Setting, Marcia Ionie Pender Jan 2021

Meaningful Use Criteria And Staff Accountability In An Office Setting, Marcia Ionie Pender

Walden Dissertations and Doctoral Studies

Proper documentation for meaningful use (MU) criteria within electronic health records (EHRs) was identified as an issue for office staff at a local primary care office in a metropolitan area of Central Florida. The project question addressed the local gap in knowledge about MU standards necessary to ensure correct documentation of EHRs. The purpose of this doctoral project was to provide an educational program for staff to ensure compliance with the HITECH Act of 2009. Lewin’s Change Theory and Knowles Theory of Adult learning were the conceptual foundations for the educational program. The project question was to determine whether a …


A Multicase Study Of Critical Success Factors Of Self-Service Business Intelligence Initiatives, Eva Shepherd Jan 2021

A Multicase Study Of Critical Success Factors Of Self-Service Business Intelligence Initiatives, Eva Shepherd

Walden Dissertations and Doctoral Studies

Information technology (IT) managers have sparse information on the critical success factors (CSFs) needed for self-service business intelligence (SSBI) initiatives among casual users. The purpose of this qualitative, multicase study was to describe Business Intelligence (BI) experts’ views on the CSFs needed for self-service BI initiatives among casual users in the post-implementation stage. To meet this purpose, a multicase study design was used to collect data from a purposeful sample of 10 BI experts. Semistructured interviews, archival data, and reflective field notes drove the credibility of the multicase study’s findings through data triangulation. Two conceptual models framed this study: Lennerholt …


Maritime Cybersecurity Strategies For Information Technology Specialists, Angela Mizelle Griffin Jan 2021

Maritime Cybersecurity Strategies For Information Technology Specialists, Angela Mizelle Griffin

Walden Dissertations and Doctoral Studies

Dependence on digital technology increases cyber-related risks for maritime industries. As a result, the U.S. Coast Guard network is challenged with maritime cybersecurity, both economically and for national security. Grounded in the general systems theory, the purpose of this multiple case study was to explore strategies information technology (IT) specialists use to implement standard practices for ensuring cyber security. The participants included six IT specialists who have successfully implemented standard practices for maritime organizations in Virginia and West Virginia. Data were collected from individual semistructured interviews and a review of 12 external organizational documents available to the public from IT …


Enhancing Employee Engagement To Improve Financial Performance, Christine Lamacchia Jan 2021

Enhancing Employee Engagement To Improve Financial Performance, Christine Lamacchia

Walden Dissertations and Doctoral Studies

Business leaders are negatively affected when many employees are not engaged in their jobs. Business leaders who struggle to achieve employee engagement suffer decreased profitability, sales, employee retention, and customer satisfaction. Grounded in employee engagement theory, the purpose of this qualitative single case study was to explore strategies IT business leaders use to engage employees. The participants were five IT business leaders who successfully developed strategies to engage employees. Data were collected from semistructured interviews, company documents, and artifacts. Thematic analysis was used to analyze the data. Two themes emerged: creating a company culture conducive to employee engagement and using …


Strategies For Applying Electronic Health Records To Improve Patient Care And Increase Profitability, Fritzgerald Paul Jan 2021

Strategies For Applying Electronic Health Records To Improve Patient Care And Increase Profitability, Fritzgerald Paul

Walden Dissertations and Doctoral Studies

AbstractIneffective strategies to implement electronic health record keeping systems can negatively impact patient care and increase expenses. Hospital administrators and primary care physicians care about this problem because they would be penalized for not meeting meaningful use guidelines. Grounded in the information systems success model, the purpose of this qualitative multiple case study was to explore electronic health record (EHR) implementation strategies primary care physicians use to improve patient care and increase profitability. The participants comprised five primary care physicians involved in the effective implementation of an EHR application in the central coast region of California. Data were collected from …


An Acceptable Cloud Computing Model For Public Sectors, Eswar Kumar Devarakonda Jan 2021

An Acceptable Cloud Computing Model For Public Sectors, Eswar Kumar Devarakonda

Walden Dissertations and Doctoral Studies

Cloud computing enables information technology (IT) leaders to shift from passive business support to active value creators. However, social economic-communication barriers inhibit individual users from strategic use of the cloud. Grounded in the theory of technology acceptance, the purpose of this multiple case study was to explore strategies IT leaders in public sector organizations implement to utilize cloud computing. The participants included nine IT leaders from public sector organizations in Texas, USA. Data were collected using semi-structured interviews, field notes, and publicly available artifacts documents. Data were analyzed using thematic analysis: five themes emerged (a) user-centric and data-driven cloud model; …


Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly Jan 2021

Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly

Walden Dissertations and Doctoral Studies

Some information technology (IT) managers working for small businesses are struggling to monitor and deter cyberloafing. Strategies are needed to help IT practitioners to discourage cyberloafing and improve productivity while maintaining employee satisfaction. Grounded in adaptive structuration theory, the purpose of this qualitative multiple-case study was to explore strategies some small business IT managers use to monitor and deter cyberloafing. The participants were nine IT managers who successfully implemented cyberloafing monitoring and deterrence strategies in the United States. Data were collected via semistructured interviews and organization employee policy handbooks (n = 4) provided by the participants. Data were analyzed using …


Relationships Among Dimensions Of Information System Success And Benefits Of Cloud, William Harold Stanley Jan 2021

Relationships Among Dimensions Of Information System Success And Benefits Of Cloud, William Harold Stanley

Walden Dissertations and Doctoral Studies

Despite the many benefits offered by cloud computing’s design architecture, there are many fundamental performance challenges for IT managers to manage cloud infrastructures to meet business expectations effectively. Grounded in the information systems success model, the purpose of this quantitative correlational study was to evaluate the relationships among the perception of information quality, perception of system quality, perception of service quality, perception of system use, perception of user satisfaction, and net benefits of cloud computing services. The participants (n = 137) were IT cloud services managers in the United States, who completed the DeLone and McLean ISS authors’ validated survey …


Leadership Strategies For Implementing Telemedicine Technology In Rural Hospitals To Improve Profitability, Chikezie Ralph Waturuocha Jan 2021

Leadership Strategies For Implementing Telemedicine Technology In Rural Hospitals To Improve Profitability, Chikezie Ralph Waturuocha

Walden Dissertations and Doctoral Studies

Ineffective leadership strategies can negatively impact telemedicine technology implementation in rural hospitals, which may hinder profitability. Rural hospital administrators who struggle to implement telemedicine technology for improved profitability are at high risk of experiencing patient health outcomes failure. Grounded in the technology acceptance model, the purpose of this qualitative single case study was to explore leadership strategies rural hospital leaders use to implement telemedicine technology to improve profitability. The participants were five health care administrators of a rural hospital in a Midwest U.S. state who successfully implemented telemedicine technology to improve profitability. Sources for data collection were semistructured interviews and …


Exploring The Value Of Technology Within Cross-Departmental Communications, Brian J. Luckey Jan 2021

Exploring The Value Of Technology Within Cross-Departmental Communications, Brian J. Luckey

Walden Dissertations and Doctoral Studies

While many midsized businesses have invested in technology to support business operations, most have not realized the potential value of using technology to collaborate cross-departmentally. There is a lack of knowledge concerning strategies for using technology to facilitate effective organizational communications, which has resulted in operating technology investments being made without corresponding investments in communication technologies. The purpose of this qualitative case study was to fill the knowledge gap concerning the impact of technology for cross-departmental communications. The theoretical foundation for this study was based on systems theory, organizational theory, and stakeholder theory. The key research question involved the impact …


Information Technology Service Continuity Practices In Disadvantaged Business Enterprises, Allen Edward Raub Jan 2021

Information Technology Service Continuity Practices In Disadvantaged Business Enterprises, Allen Edward Raub

Walden Dissertations and Doctoral Studies

Disadvantaged business enterprises (DBEs) not using cloud solutions to ensure information technology (IT) service continuity may not withstand the impacts of IT disruption caused by human-made and natural disasters. The loss of critical IT resources leads to business closure and a resource loss for the community, employees, and families. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore strategies IT leaders in DBEs use to implement cloud solutions to minimize IT disruption. Participants included 16 IT leaders in DBEs in the U.S. state of Maryland. Data were generated through semi-structured interviews and …


Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa Jan 2021

Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa

Walden Dissertations and Doctoral Studies

Small business owners employ over half the U.S. labor force, yet only 50% of small businesses survive beyond 5 years. When small business owners understand the factors that lead to their business failure, they can develop strategies to remain sustainable and profitable within the first 5 years, thus reducing the potential of business failure. Grounded in the resource-based theory, the purpose of this qualitative multiple case study was to explore strategies five small construction owners in central Georgia used to remain in business beyond 5 years. Data were collected from semi structured interviews, a review of organization income statements and …


Strategies Security Managers Used To Prevent Security Breaches In Scada Systems' Networks, Oladipo Ogunmesa Jan 2021

Strategies Security Managers Used To Prevent Security Breaches In Scada Systems' Networks, Oladipo Ogunmesa

Walden Dissertations and Doctoral Studies

Supervisory Control and Data Acquisition (SCADA) systems monitor and control physical processes in critical infrastructure. The impact of successful attacks on the SCADA systems includes the system's downtime and delay in production, which may have a debilitating effect on the national economy and create critical human safety hazards. Grounded in the general systems theory, the purpose of this qualitative multiple case study was to explore strategies SCADA security managers in the Southwest region of the United States use to secure SCADA systems' networks. The participants comprised six SCADA security managers from three oil and gas organizations in the midstream sector …


Network Function Virtualization Technology Adoption Strategies, Abdlrazaq Ayodeji Adeyi Shittu Jan 2021

Network Function Virtualization Technology Adoption Strategies, Abdlrazaq Ayodeji Adeyi Shittu

Walden Dissertations and Doctoral Studies

Network function virtualization (NFV) is a novel system adopted by service providers and organizations, which has become a critical organizational success factor. Chief information officers (CIOs) aim to adopt NFV to consolidate and optimize network processes unavailable in conventional methods. Grounded in the diffusion of innovation theory (DOI), the purpose of this multiple case research study was to explore strategies chief information officers utilized to adopt NFV technology. Participants include two CIOs, one chief security information officer (CSIO), one chief technical officer (CTO), and two senior information technology (IT) executives. Data were collected through semi-structured telephone interviews and eight organizational …


Addressing High False Positive Rates Of Ddos Attack Detection Methods, Alireza Zeinalpour Jan 2021

Addressing High False Positive Rates Of Ddos Attack Detection Methods, Alireza Zeinalpour

Walden Dissertations and Doctoral Studies

Distributed denial of service (DDoS) attack detection methods based on the clustering method are ineffective in detecting attacks correctly. Service interruptions caused by DDoS attacks impose concerns for IT leaders and their organizations, leading to financial damages. Grounded in the cross industry standard process for data mining framework, the purpose of this ex post facto study was to examine whether adding the filter and wrapper methods prior to the clustering method is effective in terms of lowering false positive rates of DDoS attack detection methods. The population of this study was 225,745 network traffic data records of the CICIDS2017 network …


Successful Strategies For Adopting Open-Source Software, Balla Barro Jan 2021

Successful Strategies For Adopting Open-Source Software, Balla Barro

Walden Dissertations and Doctoral Studies

Middle-level information systems managers (ISMs) in small-scale organizations often have challenges in determining the most appropriate strategy for adopting open-source software (OSS) in their organizations. The ISMs need to determine the right strategy for adopting OSS to protect the organizations’ information technology infrastructure. Grounded in the diffusion of innovation theory, the objective of this multiple case study was to explore strategies middle-level ISMs used to adopt OSS in their small-scale organizations. Six middle-level ISMs from three small-scale organizations with experience of not less than six years in OSS adoption strategy in the city of Frederick, Maryland, shared their strategies during …


Factors Affecting The Productivity And Satisfaction Of Virtual Workers, Teresa Peoples Jan 2021

Factors Affecting The Productivity And Satisfaction Of Virtual Workers, Teresa Peoples

Walden Dissertations and Doctoral Studies

Advancements in technology have ushered in new digital enterprises, shifting the trend from a conventional workforce to a virtual workforce and giving rise to new challenges for managers. However, the factors affecting virtual worker productivity and job satisfaction are not well known. The purpose of this study was to identify these factors and determine what managers can do to enhance them. The theoretical foundation for this study included sociotechnical theory and content theory as they relate to the motivation and communication needs of the virtual workforce. This qualitative phenomenological study was an exploration of factors that affect virtual workers' productivity …


Implementation Strategies For Modeling And Simulation In Military Organizations, Cody Lynn Taylor Jan 2021

Implementation Strategies For Modeling And Simulation In Military Organizations, Cody Lynn Taylor

Walden Dissertations and Doctoral Studies

Some IT project managers working for U.S. military organizations are struggling to implement modern modeling and simulation (M&S) technology. Implementation strategies are needed to help IT practitioners deliver meaningful simulations and models that ultimately help senior leaders make logical and science-based decisions. Grounded in the extended technology acceptance model, the purpose of this qualitative multiple-case study was to explore strategies some IT project managers supporting U.S. military organizations use to implement modern M&S technology. The participants included 10 civil servants who successfully implemented modeling and simulation technology for military organizations located in the United States eastern region. Data was collected …


The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo Jan 2021

The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo

Walden Dissertations and Doctoral Studies

Despite information technology (IT) officers’ multiple efforts to develop reliable and efficient electronic justice (e-justice) systems, digitizing court processes still presents several quality challenges associated with IT infrastructure and literacy issues. Grounded in the principles of total quality management, the purpose of this qualitative multiple case study was to identify strategies and best practices IT officers in African regional economic communities (REC) use for digitizing regional and subregional court processes to improve African e-justice systems. The participants included four IT officers working as assistant computer system analysts (ACSA), computer system analysts (CSA), and heads of IT (HIT) in regional and …


Medical Practitioners’ Intention To Use Secure Electronic Medical Records In Healthcare Organizations, Omar Enrique Sangurima Jan 2021

Medical Practitioners’ Intention To Use Secure Electronic Medical Records In Healthcare Organizations, Omar Enrique Sangurima

Walden Dissertations and Doctoral Studies

Medical practitioners have difficulty fully implementing secure electronic medical records (EMRs). Clinicians and medical technologists alike need to identify motivational factors behind secure EMR implementation to assure the safety of patient data. Grounded in the unified theory of acceptance and use of technology model, the purpose of this quantitative, correlational study was to examine the relationship between medical practitioners’ perceptions of performance expectancy, effort expectancy, social influence, facilitating conditions, and the intention to use secure EMRs in healthcare organizations. Survey data (N = 126) were collected from medical practitioners from the northeastern United States. The results of the multiple regression …


Strategies Project Managers Use That Reduce Information Technology Project Failures In The Insurance Industry, Jamarcus Snipes Jan 2021

Strategies Project Managers Use That Reduce Information Technology Project Failures In The Insurance Industry, Jamarcus Snipes

Walden Dissertations and Doctoral Studies

The worldwide failure rate of information technology (IT) projects is approximately 65%. Insurance project managers who fail to successfully implement IT projects negatively impact organizational performance and profitability. Grounded in the management by objectives theory, the purpose of this qualitative multiple case study was to explore strategies project managers use to reduce IT project failures in the insurance industry. The participants comprised four IT project managers in Alabama who successfully used strategies to reduce IT project failures in the insurance industry. Data were collected from virtual semistructured interviews, company documents, existing literature, and journal notes. Thematic analysis was used to …


Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez Jan 2021

Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez

Walden Dissertations and Doctoral Studies

The Internet of Things (IoT) has been exploited as a threat vector for cyberattacks in manufacturing environments. Manufacturing industry leaders are concerned with cyberattacks because of the associated costs of damages and lost production for their organizations. Grounded in the general systems theory, the purpose of this multiple case study was to explore strategies electrical controls engineers use to implement secure IoT devices in manufacturing environments. The study participants were eight electrical controls engineers working in three separate manufacturing facilities located in the Midwest region of the United States. The data were collected by semistructured interviews and 15 organizational documents. …


User Awareness And Knowledge Of Cybersecurity And The Impact Of Training In The Commonwealth Of Dominica, Jermaine Jewel Jean-Pierre Jan 2021

User Awareness And Knowledge Of Cybersecurity And The Impact Of Training In The Commonwealth Of Dominica, Jermaine Jewel Jean-Pierre

Walden Dissertations and Doctoral Studies

The frequency of cyberattacks against governments has increased at an alarming rate and the lack of user awareness and knowledge of cybersecurity has been considered a contributing factor to the increase in cyberattacks and cyberthreats. The purpose of this quantitative experimental study was to explore the role and effectiveness of employee training focused on user awareness of cyberattacks and cybersecurity, with the intent to close the gap in understanding about the level of awareness of cybersecurity within the public sector of the Commonwealth of Dominica. The theoretical framework was Bandura’s social cognitive theory, following the idea that learning occurs in …


Impact Of Information Breaches On Health Care Records, Anton Antony Arockiasamy Jan 2021

Impact Of Information Breaches On Health Care Records, Anton Antony Arockiasamy

Walden Dissertations and Doctoral Studies

Although there were almost 3.5 million reported information breaches of health care data in the first quarter of 2019, health care providers do not know the extent of digital and nondigital breaches of patient medical records. The purpose of this quantitative, comparative study was to identify the difference between the individual patient records affected by digital versus nondigital breaches for three types of health care entities in the United States, health care providers, health care plans, and health care clearinghouses. Allman’s privacy regulation theory, the National Institute of Standards and Technology Privacy Framework, and ecological systems theory comprised the theoretical …


Cyberattacks Strategy For Nonprofit Organizations, Yawo Obimpe Kondo Jan 2021

Cyberattacks Strategy For Nonprofit Organizations, Yawo Obimpe Kondo

Walden Dissertations and Doctoral Studies

Information system security managers (ISSM) in nonprofits face increased cyberattack cases because nonprofits often use basic technology to save on costs. Nonprofit owners and managers need solutions to secure their data from cyberattacks. Grounded in the general systems theory, the purpose of this qualitative multiple case study was to explore strategies ISSMs at nonprofit organizations employ to protect against cyberattacks. Participants included five IT managers and directors of information technology in charge of security management in nonprofit organizations in Maryland, the District of Columbia, and Virginia. Data was generated through interviews and reviews of archival documents. The data analysis technique …


Strategies For Integrating The Internet Of Things In Educational Institutions, Anthony Kofi Harvey Jan 2021

Strategies For Integrating The Internet Of Things In Educational Institutions, Anthony Kofi Harvey

Walden Dissertations and Doctoral Studies

The introduction of the Internet of Things (IoT) into educational institutions has necessitated the integration of IoT devices in the information technology (IT) infrastructural environment of educational institutions. Many IT leaders at educational institutions, however, lack strategies for integrating and deploying IoT devices in their institutions, which has resulted in numerous security breaches. The purpose of this study was to explore security strategies adopted by IT administrators to prevent data breaches resulting from the integration of IoT devices in their educational institutions. The diffusion of innovations theory served as the conceptual framework for this qualitative multiple case study. Eleven IT …


Characteristics Of Authentic Entrepreneurial Leadership Within Information Technology Startups In Kenya, Christine Mukhwana Jan 2021

Characteristics Of Authentic Entrepreneurial Leadership Within Information Technology Startups In Kenya, Christine Mukhwana

Walden Dissertations and Doctoral Studies

In Kenya, over 60% of nascent entrepreneurs start businesses with minimal leadership experience, engendering founder-CEOs who cannot sustain a business beyond its formative years. The problem is the nascent entrepreneurs’ lack of understanding of effective leadership. The purpose of this qualitative, phenomenological study was to develop a more nuanced understanding of authentic leadership behavior from the perspective of nascent entrepreneurs. Authentic leadership theory and the three-factor model were used to conceptualize the study. The research question focused on nascent entrepreneurs’ lived experiences and understanding of authentic leadership. The participants in the study were entrepreneurs from the information technology industry in …


Mobile Network Infrastructure Security In Developing Countries – A Kenya Case Study, James M. Omanwa Jan 2021

Mobile Network Infrastructure Security In Developing Countries – A Kenya Case Study, James M. Omanwa

Walden Dissertations and Doctoral Studies

The usage of mobile network infrastructure to access internet resources for organizations is getting higher year by year in sub-Saharan Africa. However, there was an increase in malicious attacks on mobile networks and devices accessing mobile network infrastructure, targeting organizations’ private information. Grounded in Bandura’s social cognitive theory, the purpose of this multiple case study was to explore strategies security managers used to secure mobile network infrastructures from cyberattacks. Participants comprised four security managers in Kenya in two major cities who successfully implemented strategies to mitigate cyberattacks on the mobile network infrastructures. Data were gathered from video conference, face-to-face, semi-structured …


Successful Strategies For Adopting Open-Source Software, Balla Barro Jan 2021

Successful Strategies For Adopting Open-Source Software, Balla Barro

Walden Dissertations and Doctoral Studies

Middle-level information systems managers (ISMs) in small-scale organizations often have challenges in determining the most appropriate strategy for adopting open-source software (OSS) in their organizations. The ISMs need to determine the right strategy for adopting OSS to protect the organizations’ information technology infrastructure. Grounded in the diffusion of innovation theory, the objective of this multiple case study was to explore strategies middle-level ISMs used to adopt OSS in their small-scale organizations. Six middle-level ISMs from three small-scale organizations with experience of not less than six years in OSS adoption strategy in the city of Frederick, Maryland, shared their strategies during …