Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Databases and Information Systems

An Empirical Assessment Of The Use Of Password Workarounds And The Cybersecurity Risk Of Data Breaches, Michael Joseph Rooney Jan 2023

An Empirical Assessment Of The Use Of Password Workarounds And The Cybersecurity Risk Of Data Breaches, Michael Joseph Rooney

CCE Theses and Dissertations

Passwords have been used for a long time to grant controlled access to classified spaces, electronics, networks, and more. However, the dramatic increase in user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure a high level of IS security; this leaves the end-users holding a critical role in protecting their organization and personal information. The increased use of IS as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as ‘password workarounds’ …


How It Professionals Acquire Soft Skills, Paul Majett Jan 2023

How It Professionals Acquire Soft Skills, Paul Majett

Walden Dissertations and Doctoral Studies

AbstractIn this study, I investigated how information technology (IT) professionals learn/acquire soft skills. Little is understood about how IT professionals describe and apply the soft skills that they consider necessary for their own employability. Exploring how IT professionals describe and apply soft skills is important to their future work and career advancement. The purpose of this basic qualitative study was to better understand how IT professionals learn/acquire soft skills. Bandura’s 1986, social learning theory served as the organizational conceptual framework of this study and guided the research question, which asked how IT professionals acquire learn/acquire soft skills. This research question …


Strategies To Increase Competitive Advantage In The Automotive Manufacturing Supply Chain, Amber Willis Jan 2023

Strategies To Increase Competitive Advantage In The Automotive Manufacturing Supply Chain, Amber Willis

Walden Dissertations and Doctoral Studies

Some automotive manufacturing supply chain leaders lack strategies that are needed to implement information technology (IT) systems. Business leaders are concerned with implementing IT systems to achieve and maintain a competitive advantage. Grounded in the resource-based view theory (RBV), the purpose of this qualitative single case study was to explore information system strategies used by leaders in the automotive manufacturing supply chain to achieve competitive advantage. Participants were five leaders of an automotive manufacturing supply chain organization who implemented IT systems. Data were collected through semistructured interviews and a review of organization project documents. Through thematic analysis, five themes were …


Strategies Information Technology Leaders Used In Implementing Remote Work During The Covid-19, Jouliana Kamal Barghouth Jan 2023

Strategies Information Technology Leaders Used In Implementing Remote Work During The Covid-19, Jouliana Kamal Barghouth

Walden Dissertations and Doctoral Studies

With the imposed lockdown in many countries due to the spread of COVID-19, many leaders were forced to adopt online technologies in transitioning employees to remote work. Leaders not adopting online technologies or remote work during a pandemic are highly susceptible to business closure. Grounded in the technology acceptance model, the purpose of this qualitative single case study was to explore strategies information technology (IT) leaders in Kuwait used to successfully transition employees to remote work during the pandemic. The participants were six IT leaders from a single multinational IT organization who contributed to strategy development during the pandemic to …