Open Access. Powered by Scholars. Published by Universities.®
Databases and Information Systems Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (7)
- Engineering (3)
- Medicine and Health Sciences (3)
- Social and Behavioral Sciences (3)
- Health and Medical Administration (2)
-
- Communication (1)
- Computer Engineering (1)
- Electrical and Computer Engineering (1)
- Electrical and Electronics (1)
- Entrepreneurial and Small Business Operations (1)
- Finance and Financial Management (1)
- Industrial Engineering (1)
- Library and Information Science (1)
- Nursing (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Organizational Behavior and Theory (1)
- Public Health (1)
- Public Health Education and Promotion (1)
- Keyword
-
- Cybersecurity (3)
- Manufacturing (2)
- Mobile Technology (2)
- Strategies (2)
- Strategy (2)
-
- Technology (2)
- Appropriate Documentation (1)
- Authentic Leadership (1)
- BLOCKCHAIN (1)
- BLOCKCHAIN APPLICATION SECURITY (1)
- BLOCKCHAIN SECURITY (1)
- Bank Customers (1)
- Bank Risk (1)
- Biometric Authentication (1)
- CRYPTOCURRENCY SECURITY (1)
- CYBERSECURITY (1)
- Casual users (1)
- Chief Information officer (CIOs) (1)
- Cloud (1)
- Cloud Computing (1)
- Cloud computing (1)
- Cloud solutions (1)
- Communication (1)
- Computerization (1)
- Court processes (1)
- Creative IT (1)
- Critical infrastructure (1)
- Critical success factors (1)
- Cyberattacks (1)
- Cyberloafing (1)
Articles 1 - 30 of 39
Full-Text Articles in Databases and Information Systems
Consumers Perspectives On Using Biometric Technology With Mobile Banking, Rodney Alston Clark
Consumers Perspectives On Using Biometric Technology With Mobile Banking, Rodney Alston Clark
Walden Dissertations and Doctoral Studies
The need for applying biometric technology in mobile banking is increasing due to emerging security issues, and many banks’ chief executive officers have integrated biometric solutions into their mobile application protocols to address these evolving security risks. This quantitative study was performed to evaluate how the opinions and beliefs of banking customers in the Mid-Atlantic region of the United States might influence their adoption of mobile banking applications that included biometric technology. The research question was designed to explore how performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC), perceived credibility (PC), and task-technology fit (TTF) affected …
Meaningful Use Criteria And Staff Accountability In An Office Setting, Marcia Ionie Pender
Meaningful Use Criteria And Staff Accountability In An Office Setting, Marcia Ionie Pender
Walden Dissertations and Doctoral Studies
Proper documentation for meaningful use (MU) criteria within electronic health records (EHRs) was identified as an issue for office staff at a local primary care office in a metropolitan area of Central Florida. The project question addressed the local gap in knowledge about MU standards necessary to ensure correct documentation of EHRs. The purpose of this doctoral project was to provide an educational program for staff to ensure compliance with the HITECH Act of 2009. Lewin’s Change Theory and Knowles Theory of Adult learning were the conceptual foundations for the educational program. The project question was to determine whether a …
A Multicase Study Of Critical Success Factors Of Self-Service Business Intelligence Initiatives, Eva Shepherd
A Multicase Study Of Critical Success Factors Of Self-Service Business Intelligence Initiatives, Eva Shepherd
Walden Dissertations and Doctoral Studies
Information technology (IT) managers have sparse information on the critical success factors (CSFs) needed for self-service business intelligence (SSBI) initiatives among casual users. The purpose of this qualitative, multicase study was to describe Business Intelligence (BI) experts’ views on the CSFs needed for self-service BI initiatives among casual users in the post-implementation stage. To meet this purpose, a multicase study design was used to collect data from a purposeful sample of 10 BI experts. Semistructured interviews, archival data, and reflective field notes drove the credibility of the multicase study’s findings through data triangulation. Two conceptual models framed this study: Lennerholt …
Maritime Cybersecurity Strategies For Information Technology Specialists, Angela Mizelle Griffin
Maritime Cybersecurity Strategies For Information Technology Specialists, Angela Mizelle Griffin
Walden Dissertations and Doctoral Studies
Dependence on digital technology increases cyber-related risks for maritime industries. As a result, the U.S. Coast Guard network is challenged with maritime cybersecurity, both economically and for national security. Grounded in the general systems theory, the purpose of this multiple case study was to explore strategies information technology (IT) specialists use to implement standard practices for ensuring cyber security. The participants included six IT specialists who have successfully implemented standard practices for maritime organizations in Virginia and West Virginia. Data were collected from individual semistructured interviews and a review of 12 external organizational documents available to the public from IT …
Enhancing Employee Engagement To Improve Financial Performance, Christine Lamacchia
Enhancing Employee Engagement To Improve Financial Performance, Christine Lamacchia
Walden Dissertations and Doctoral Studies
Business leaders are negatively affected when many employees are not engaged in their jobs. Business leaders who struggle to achieve employee engagement suffer decreased profitability, sales, employee retention, and customer satisfaction. Grounded in employee engagement theory, the purpose of this qualitative single case study was to explore strategies IT business leaders use to engage employees. The participants were five IT business leaders who successfully developed strategies to engage employees. Data were collected from semistructured interviews, company documents, and artifacts. Thematic analysis was used to analyze the data. Two themes emerged: creating a company culture conducive to employee engagement and using …
Strategies For Applying Electronic Health Records To Improve Patient Care And Increase Profitability, Fritzgerald Paul
Strategies For Applying Electronic Health Records To Improve Patient Care And Increase Profitability, Fritzgerald Paul
Walden Dissertations and Doctoral Studies
AbstractIneffective strategies to implement electronic health record keeping systems can negatively impact patient care and increase expenses. Hospital administrators and primary care physicians care about this problem because they would be penalized for not meeting meaningful use guidelines. Grounded in the information systems success model, the purpose of this qualitative multiple case study was to explore electronic health record (EHR) implementation strategies primary care physicians use to improve patient care and increase profitability. The participants comprised five primary care physicians involved in the effective implementation of an EHR application in the central coast region of California. Data were collected from …
An Acceptable Cloud Computing Model For Public Sectors, Eswar Kumar Devarakonda
An Acceptable Cloud Computing Model For Public Sectors, Eswar Kumar Devarakonda
Walden Dissertations and Doctoral Studies
Cloud computing enables information technology (IT) leaders to shift from passive business support to active value creators. However, social economic-communication barriers inhibit individual users from strategic use of the cloud. Grounded in the theory of technology acceptance, the purpose of this multiple case study was to explore strategies IT leaders in public sector organizations implement to utilize cloud computing. The participants included nine IT leaders from public sector organizations in Texas, USA. Data were collected using semi-structured interviews, field notes, and publicly available artifacts documents. Data were analyzed using thematic analysis: five themes emerged (a) user-centric and data-driven cloud model; …
Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly
Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly
Walden Dissertations and Doctoral Studies
Some information technology (IT) managers working for small businesses are struggling to monitor and deter cyberloafing. Strategies are needed to help IT practitioners to discourage cyberloafing and improve productivity while maintaining employee satisfaction. Grounded in adaptive structuration theory, the purpose of this qualitative multiple-case study was to explore strategies some small business IT managers use to monitor and deter cyberloafing. The participants were nine IT managers who successfully implemented cyberloafing monitoring and deterrence strategies in the United States. Data were collected via semistructured interviews and organization employee policy handbooks (n = 4) provided by the participants. Data were analyzed using …
Relationships Among Dimensions Of Information System Success And Benefits Of Cloud, William Harold Stanley
Relationships Among Dimensions Of Information System Success And Benefits Of Cloud, William Harold Stanley
Walden Dissertations and Doctoral Studies
Despite the many benefits offered by cloud computing’s design architecture, there are many fundamental performance challenges for IT managers to manage cloud infrastructures to meet business expectations effectively. Grounded in the information systems success model, the purpose of this quantitative correlational study was to evaluate the relationships among the perception of information quality, perception of system quality, perception of service quality, perception of system use, perception of user satisfaction, and net benefits of cloud computing services. The participants (n = 137) were IT cloud services managers in the United States, who completed the DeLone and McLean ISS authors’ validated survey …
Leadership Strategies For Implementing Telemedicine Technology In Rural Hospitals To Improve Profitability, Chikezie Ralph Waturuocha
Leadership Strategies For Implementing Telemedicine Technology In Rural Hospitals To Improve Profitability, Chikezie Ralph Waturuocha
Walden Dissertations and Doctoral Studies
Ineffective leadership strategies can negatively impact telemedicine technology implementation in rural hospitals, which may hinder profitability. Rural hospital administrators who struggle to implement telemedicine technology for improved profitability are at high risk of experiencing patient health outcomes failure. Grounded in the technology acceptance model, the purpose of this qualitative single case study was to explore leadership strategies rural hospital leaders use to implement telemedicine technology to improve profitability. The participants were five health care administrators of a rural hospital in a Midwest U.S. state who successfully implemented telemedicine technology to improve profitability. Sources for data collection were semistructured interviews and …
Exploring The Value Of Technology Within Cross-Departmental Communications, Brian J. Luckey
Exploring The Value Of Technology Within Cross-Departmental Communications, Brian J. Luckey
Walden Dissertations and Doctoral Studies
While many midsized businesses have invested in technology to support business operations, most have not realized the potential value of using technology to collaborate cross-departmentally. There is a lack of knowledge concerning strategies for using technology to facilitate effective organizational communications, which has resulted in operating technology investments being made without corresponding investments in communication technologies. The purpose of this qualitative case study was to fill the knowledge gap concerning the impact of technology for cross-departmental communications. The theoretical foundation for this study was based on systems theory, organizational theory, and stakeholder theory. The key research question involved the impact …
Information Technology Service Continuity Practices In Disadvantaged Business Enterprises, Allen Edward Raub
Information Technology Service Continuity Practices In Disadvantaged Business Enterprises, Allen Edward Raub
Walden Dissertations and Doctoral Studies
Disadvantaged business enterprises (DBEs) not using cloud solutions to ensure information technology (IT) service continuity may not withstand the impacts of IT disruption caused by human-made and natural disasters. The loss of critical IT resources leads to business closure and a resource loss for the community, employees, and families. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore strategies IT leaders in DBEs use to implement cloud solutions to minimize IT disruption. Participants included 16 IT leaders in DBEs in the U.S. state of Maryland. Data were generated through semi-structured interviews and …
Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa
Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa
Walden Dissertations and Doctoral Studies
Small business owners employ over half the U.S. labor force, yet only 50% of small businesses survive beyond 5 years. When small business owners understand the factors that lead to their business failure, they can develop strategies to remain sustainable and profitable within the first 5 years, thus reducing the potential of business failure. Grounded in the resource-based theory, the purpose of this qualitative multiple case study was to explore strategies five small construction owners in central Georgia used to remain in business beyond 5 years. Data were collected from semi structured interviews, a review of organization income statements and …
Strategies Security Managers Used To Prevent Security Breaches In Scada Systems' Networks, Oladipo Ogunmesa
Strategies Security Managers Used To Prevent Security Breaches In Scada Systems' Networks, Oladipo Ogunmesa
Walden Dissertations and Doctoral Studies
Supervisory Control and Data Acquisition (SCADA) systems monitor and control physical processes in critical infrastructure. The impact of successful attacks on the SCADA systems includes the system's downtime and delay in production, which may have a debilitating effect on the national economy and create critical human safety hazards. Grounded in the general systems theory, the purpose of this qualitative multiple case study was to explore strategies SCADA security managers in the Southwest region of the United States use to secure SCADA systems' networks. The participants comprised six SCADA security managers from three oil and gas organizations in the midstream sector …
Network Function Virtualization Technology Adoption Strategies, Abdlrazaq Ayodeji Adeyi Shittu
Network Function Virtualization Technology Adoption Strategies, Abdlrazaq Ayodeji Adeyi Shittu
Walden Dissertations and Doctoral Studies
Network function virtualization (NFV) is a novel system adopted by service providers and organizations, which has become a critical organizational success factor. Chief information officers (CIOs) aim to adopt NFV to consolidate and optimize network processes unavailable in conventional methods. Grounded in the diffusion of innovation theory (DOI), the purpose of this multiple case research study was to explore strategies chief information officers utilized to adopt NFV technology. Participants include two CIOs, one chief security information officer (CSIO), one chief technical officer (CTO), and two senior information technology (IT) executives. Data were collected through semi-structured telephone interviews and eight organizational …
Addressing High False Positive Rates Of Ddos Attack Detection Methods, Alireza Zeinalpour
Addressing High False Positive Rates Of Ddos Attack Detection Methods, Alireza Zeinalpour
Walden Dissertations and Doctoral Studies
Distributed denial of service (DDoS) attack detection methods based on the clustering method are ineffective in detecting attacks correctly. Service interruptions caused by DDoS attacks impose concerns for IT leaders and their organizations, leading to financial damages. Grounded in the cross industry standard process for data mining framework, the purpose of this ex post facto study was to examine whether adding the filter and wrapper methods prior to the clustering method is effective in terms of lowering false positive rates of DDoS attack detection methods. The population of this study was 225,745 network traffic data records of the CICIDS2017 network …
Successful Strategies For Adopting Open-Source Software, Balla Barro
Successful Strategies For Adopting Open-Source Software, Balla Barro
Walden Dissertations and Doctoral Studies
Middle-level information systems managers (ISMs) in small-scale organizations often have challenges in determining the most appropriate strategy for adopting open-source software (OSS) in their organizations. The ISMs need to determine the right strategy for adopting OSS to protect the organizations’ information technology infrastructure. Grounded in the diffusion of innovation theory, the objective of this multiple case study was to explore strategies middle-level ISMs used to adopt OSS in their small-scale organizations. Six middle-level ISMs from three small-scale organizations with experience of not less than six years in OSS adoption strategy in the city of Frederick, Maryland, shared their strategies during …
Factors Affecting The Productivity And Satisfaction Of Virtual Workers, Teresa Peoples
Factors Affecting The Productivity And Satisfaction Of Virtual Workers, Teresa Peoples
Walden Dissertations and Doctoral Studies
Advancements in technology have ushered in new digital enterprises, shifting the trend from a conventional workforce to a virtual workforce and giving rise to new challenges for managers. However, the factors affecting virtual worker productivity and job satisfaction are not well known. The purpose of this study was to identify these factors and determine what managers can do to enhance them. The theoretical foundation for this study included sociotechnical theory and content theory as they relate to the motivation and communication needs of the virtual workforce. This qualitative phenomenological study was an exploration of factors that affect virtual workers' productivity …
Implementation Strategies For Modeling And Simulation In Military Organizations, Cody Lynn Taylor
Implementation Strategies For Modeling And Simulation In Military Organizations, Cody Lynn Taylor
Walden Dissertations and Doctoral Studies
Some IT project managers working for U.S. military organizations are struggling to implement modern modeling and simulation (M&S) technology. Implementation strategies are needed to help IT practitioners deliver meaningful simulations and models that ultimately help senior leaders make logical and science-based decisions. Grounded in the extended technology acceptance model, the purpose of this qualitative multiple-case study was to explore strategies some IT project managers supporting U.S. military organizations use to implement modern M&S technology. The participants included 10 civil servants who successfully implemented modeling and simulation technology for military organizations located in the United States eastern region. Data was collected …
The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo
The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo
Walden Dissertations and Doctoral Studies
Despite information technology (IT) officers’ multiple efforts to develop reliable and efficient electronic justice (e-justice) systems, digitizing court processes still presents several quality challenges associated with IT infrastructure and literacy issues. Grounded in the principles of total quality management, the purpose of this qualitative multiple case study was to identify strategies and best practices IT officers in African regional economic communities (REC) use for digitizing regional and subregional court processes to improve African e-justice systems. The participants included four IT officers working as assistant computer system analysts (ACSA), computer system analysts (CSA), and heads of IT (HIT) in regional and …
Medical Practitioners’ Intention To Use Secure Electronic Medical Records In Healthcare Organizations, Omar Enrique Sangurima
Medical Practitioners’ Intention To Use Secure Electronic Medical Records In Healthcare Organizations, Omar Enrique Sangurima
Walden Dissertations and Doctoral Studies
Medical practitioners have difficulty fully implementing secure electronic medical records (EMRs). Clinicians and medical technologists alike need to identify motivational factors behind secure EMR implementation to assure the safety of patient data. Grounded in the unified theory of acceptance and use of technology model, the purpose of this quantitative, correlational study was to examine the relationship between medical practitioners’ perceptions of performance expectancy, effort expectancy, social influence, facilitating conditions, and the intention to use secure EMRs in healthcare organizations. Survey data (N = 126) were collected from medical practitioners from the northeastern United States. The results of the multiple regression …
Strategies Project Managers Use That Reduce Information Technology Project Failures In The Insurance Industry, Jamarcus Snipes
Strategies Project Managers Use That Reduce Information Technology Project Failures In The Insurance Industry, Jamarcus Snipes
Walden Dissertations and Doctoral Studies
The worldwide failure rate of information technology (IT) projects is approximately 65%. Insurance project managers who fail to successfully implement IT projects negatively impact organizational performance and profitability. Grounded in the management by objectives theory, the purpose of this qualitative multiple case study was to explore strategies project managers use to reduce IT project failures in the insurance industry. The participants comprised four IT project managers in Alabama who successfully used strategies to reduce IT project failures in the insurance industry. Data were collected from virtual semistructured interviews, company documents, existing literature, and journal notes. Thematic analysis was used to …
Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez
Strategies For Implementing Internet Of Things Devices In Manufacturing Environments, Todd Efrain Hernandez
Walden Dissertations and Doctoral Studies
The Internet of Things (IoT) has been exploited as a threat vector for cyberattacks in manufacturing environments. Manufacturing industry leaders are concerned with cyberattacks because of the associated costs of damages and lost production for their organizations. Grounded in the general systems theory, the purpose of this multiple case study was to explore strategies electrical controls engineers use to implement secure IoT devices in manufacturing environments. The study participants were eight electrical controls engineers working in three separate manufacturing facilities located in the Midwest region of the United States. The data were collected by semistructured interviews and 15 organizational documents. …
User Awareness And Knowledge Of Cybersecurity And The Impact Of Training In The Commonwealth Of Dominica, Jermaine Jewel Jean-Pierre
User Awareness And Knowledge Of Cybersecurity And The Impact Of Training In The Commonwealth Of Dominica, Jermaine Jewel Jean-Pierre
Walden Dissertations and Doctoral Studies
The frequency of cyberattacks against governments has increased at an alarming rate and the lack of user awareness and knowledge of cybersecurity has been considered a contributing factor to the increase in cyberattacks and cyberthreats. The purpose of this quantitative experimental study was to explore the role and effectiveness of employee training focused on user awareness of cyberattacks and cybersecurity, with the intent to close the gap in understanding about the level of awareness of cybersecurity within the public sector of the Commonwealth of Dominica. The theoretical framework was Bandura’s social cognitive theory, following the idea that learning occurs in …
Impact Of Information Breaches On Health Care Records, Anton Antony Arockiasamy
Impact Of Information Breaches On Health Care Records, Anton Antony Arockiasamy
Walden Dissertations and Doctoral Studies
Although there were almost 3.5 million reported information breaches of health care data in the first quarter of 2019, health care providers do not know the extent of digital and nondigital breaches of patient medical records. The purpose of this quantitative, comparative study was to identify the difference between the individual patient records affected by digital versus nondigital breaches for three types of health care entities in the United States, health care providers, health care plans, and health care clearinghouses. Allman’s privacy regulation theory, the National Institute of Standards and Technology Privacy Framework, and ecological systems theory comprised the theoretical …
Cyberattacks Strategy For Nonprofit Organizations, Yawo Obimpe Kondo
Cyberattacks Strategy For Nonprofit Organizations, Yawo Obimpe Kondo
Walden Dissertations and Doctoral Studies
Information system security managers (ISSM) in nonprofits face increased cyberattack cases because nonprofits often use basic technology to save on costs. Nonprofit owners and managers need solutions to secure their data from cyberattacks. Grounded in the general systems theory, the purpose of this qualitative multiple case study was to explore strategies ISSMs at nonprofit organizations employ to protect against cyberattacks. Participants included five IT managers and directors of information technology in charge of security management in nonprofit organizations in Maryland, the District of Columbia, and Virginia. Data was generated through interviews and reviews of archival documents. The data analysis technique …
Strategies For Integrating The Internet Of Things In Educational Institutions, Anthony Kofi Harvey
Strategies For Integrating The Internet Of Things In Educational Institutions, Anthony Kofi Harvey
Walden Dissertations and Doctoral Studies
The introduction of the Internet of Things (IoT) into educational institutions has necessitated the integration of IoT devices in the information technology (IT) infrastructural environment of educational institutions. Many IT leaders at educational institutions, however, lack strategies for integrating and deploying IoT devices in their institutions, which has resulted in numerous security breaches. The purpose of this study was to explore security strategies adopted by IT administrators to prevent data breaches resulting from the integration of IoT devices in their educational institutions. The diffusion of innovations theory served as the conceptual framework for this qualitative multiple case study. Eleven IT …
Characteristics Of Authentic Entrepreneurial Leadership Within Information Technology Startups In Kenya, Christine Mukhwana
Characteristics Of Authentic Entrepreneurial Leadership Within Information Technology Startups In Kenya, Christine Mukhwana
Walden Dissertations and Doctoral Studies
In Kenya, over 60% of nascent entrepreneurs start businesses with minimal leadership experience, engendering founder-CEOs who cannot sustain a business beyond its formative years. The problem is the nascent entrepreneurs’ lack of understanding of effective leadership. The purpose of this qualitative, phenomenological study was to develop a more nuanced understanding of authentic leadership behavior from the perspective of nascent entrepreneurs. Authentic leadership theory and the three-factor model were used to conceptualize the study. The research question focused on nascent entrepreneurs’ lived experiences and understanding of authentic leadership. The participants in the study were entrepreneurs from the information technology industry in …
Mobile Network Infrastructure Security In Developing Countries – A Kenya Case Study, James M. Omanwa
Mobile Network Infrastructure Security In Developing Countries – A Kenya Case Study, James M. Omanwa
Walden Dissertations and Doctoral Studies
The usage of mobile network infrastructure to access internet resources for organizations is getting higher year by year in sub-Saharan Africa. However, there was an increase in malicious attacks on mobile networks and devices accessing mobile network infrastructure, targeting organizations’ private information. Grounded in Bandura’s social cognitive theory, the purpose of this multiple case study was to explore strategies security managers used to secure mobile network infrastructures from cyberattacks. Participants comprised four security managers in Kenya in two major cities who successfully implemented strategies to mitigate cyberattacks on the mobile network infrastructures. Data were gathered from video conference, face-to-face, semi-structured …
Successful Strategies For Adopting Open-Source Software, Balla Barro
Successful Strategies For Adopting Open-Source Software, Balla Barro
Walden Dissertations and Doctoral Studies
Middle-level information systems managers (ISMs) in small-scale organizations often have challenges in determining the most appropriate strategy for adopting open-source software (OSS) in their organizations. The ISMs need to determine the right strategy for adopting OSS to protect the organizations’ information technology infrastructure. Grounded in the diffusion of innovation theory, the objective of this multiple case study was to explore strategies middle-level ISMs used to adopt OSS in their small-scale organizations. Six middle-level ISMs from three small-scale organizations with experience of not less than six years in OSS adoption strategy in the city of Frederick, Maryland, shared their strategies during …