Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Information Technology

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 47

Full-Text Articles in Databases and Information Systems

How It Professionals Acquire Soft Skills, Paul Majett Jan 2023

How It Professionals Acquire Soft Skills, Paul Majett

Walden Dissertations and Doctoral Studies

AbstractIn this study, I investigated how information technology (IT) professionals learn/acquire soft skills. Little is understood about how IT professionals describe and apply the soft skills that they consider necessary for their own employability. Exploring how IT professionals describe and apply soft skills is important to their future work and career advancement. The purpose of this basic qualitative study was to better understand how IT professionals learn/acquire soft skills. Bandura’s 1986, social learning theory served as the organizational conceptual framework of this study and guided the research question, which asked how IT professionals acquire learn/acquire soft skills. This research question …


Strategies Information Technology Leaders Used In Implementing Remote Work During The Covid-19, Jouliana Kamal Barghouth Jan 2023

Strategies Information Technology Leaders Used In Implementing Remote Work During The Covid-19, Jouliana Kamal Barghouth

Walden Dissertations and Doctoral Studies

With the imposed lockdown in many countries due to the spread of COVID-19, many leaders were forced to adopt online technologies in transitioning employees to remote work. Leaders not adopting online technologies or remote work during a pandemic are highly susceptible to business closure. Grounded in the technology acceptance model, the purpose of this qualitative single case study was to explore strategies information technology (IT) leaders in Kuwait used to successfully transition employees to remote work during the pandemic. The participants were six IT leaders from a single multinational IT organization who contributed to strategy development during the pandemic to …


An Empirical Assessment Of The Use Of Password Workarounds And The Cybersecurity Risk Of Data Breaches, Michael Joseph Rooney Jan 2023

An Empirical Assessment Of The Use Of Password Workarounds And The Cybersecurity Risk Of Data Breaches, Michael Joseph Rooney

CCE Theses and Dissertations

Passwords have been used for a long time to grant controlled access to classified spaces, electronics, networks, and more. However, the dramatic increase in user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure a high level of IS security; this leaves the end-users holding a critical role in protecting their organization and personal information. The increased use of IS as a working tool for employees increases the number of accounts and passwords required. Despite being more aware of password entropy, users still often participate in deviant password behaviors, known as ‘password workarounds’ …


Strategies To Increase Competitive Advantage In The Automotive Manufacturing Supply Chain, Amber Willis Jan 2023

Strategies To Increase Competitive Advantage In The Automotive Manufacturing Supply Chain, Amber Willis

Walden Dissertations and Doctoral Studies

Some automotive manufacturing supply chain leaders lack strategies that are needed to implement information technology (IT) systems. Business leaders are concerned with implementing IT systems to achieve and maintain a competitive advantage. Grounded in the resource-based view theory (RBV), the purpose of this qualitative single case study was to explore information system strategies used by leaders in the automotive manufacturing supply chain to achieve competitive advantage. Participants were five leaders of an automotive manufacturing supply chain organization who implemented IT systems. Data were collected through semistructured interviews and a review of organization project documents. Through thematic analysis, five themes were …


Pad Beyond The Classroom: Integrating Pad In The Scrum Workplace, Jade S. Weiss Mar 2022

Pad Beyond The Classroom: Integrating Pad In The Scrum Workplace, Jade S. Weiss

USF Tampa Graduate Theses and Dissertations

Purpose: The “story” format used in Scrum ticket writing is confusing to developers and leadsto insufficient ticket content, which lends to miscommunication between team members and administrators, and disrupts workflow from the bottom up. A burgeoning methodology in Technical Writing, Purpose, Audience, Design (PAD) is an alternative ticket format that is easier to teach developers and improves the aforementioned conditions than the existing “story” format. The goal of this paper is to lay out why and how PAD can benefit developers on smaller Scrum teams who are tasked with writing their own tickets. This paper does not offer solutions for …


Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte Jan 2022

Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte

Walden Dissertations and Doctoral Studies

Small businesses are the foundation of an economy and spawn innovation, but small business owners fail at an alarming rate because they lack strategies to sustain business operations. Since 50% of small businesses fail within the first 5 years, small business sustainability research is critical to support small business owners. Grounded in entrepreneurial theory, the purpose of this multiple case study was to identify strategies information technology (IT) small business owners use to sustain operation beyond the first 5 years. The participants included four IT small business owners in the Southwestern United States who sustained operations beyond the first 5 …


Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams Jan 2022

Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams

Walden Dissertations and Doctoral Studies

Information technology infrastructure library (ITIL) business leaders lack strategies for implementing critical success factors (CSFs) to promote organizational effectiveness and project success. As a result, ITIL leaders may experience less project success if CSF strategies are not effectively implemented. Grounded in the balanced scorecard (BSC) theory, this qualitative multiple case study aimed to explore strategies ITIL business leaders use to implement CSFs successfully to improve organizational efficiency for project success. The participants comprised five ITIL business leaders in the financial industry located in the southwestern region of the United States who successfully implemented strategies to implement CSFs to improve organizational …


Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham Jan 2022

Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham

Walden Dissertations and Doctoral Studies

AbstractAfter organizations successfully adopt the internet of things (IoT) technology, many corporate information technology (IT) leaders face challenges during the implementation phase. Corporate IT leaders' potential failures in implementing IoT devices may impede organizations from integrating IoT solutions and promoting business benefits. Grounded in technology-organization-environment (TOE) theory, the purpose of this qualitative, pragmatic inquiry study was to explore strategies that corporate IT leaders use to implement IoT technology in their organizations. The participants were six corporate healthcare IT leaders who successfully used implementation strategies for implementing IoT solutions for their organizations. Data were collected using semistructured interviews and industry security …


Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham Jan 2022

Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham

Walden Dissertations and Doctoral Studies

AbstractAfter organizations successfully adopt the internet of things (IoT) technology, many corporate information technology (IT) leaders face challenges during the implementation phase. Corporate IT leaders' potential failures in implementing IoT devices may impede organizations from integrating IoT solutions and promoting business benefits. Grounded in technology-organization-environment (TOE) theory, the purpose of this qualitative, pragmatic inquiry study was to explore strategies that corporate IT leaders use to implement IoT technology in their organizations. The participants were six corporate healthcare IT leaders who successfully used implementation strategies for implementing IoT solutions for their organizations. Data were collected using semistructured interviews and industry security …


Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith Jan 2022

Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith

Walden Dissertations and Doctoral Studies

Business leaders do not often consider investing in informational technology (IT) to increase performance. These business leaders lack knowledge of innovative IT adoption strategies to expand their revenue and reduce costs to sustain a competitive advantage. Grounded in the technology-organization-environment (TOE) theory, the purpose of this qualitative multiple case study was to explore IT innovation adoption strategies business leaders use to increase performance. The participants were four successful business leaders selected from finalists for international entrepreneurial awards presented annually in the Mid-Atlantic region of the United States. The data were collected using semistructured telephone interviews, media releases, and online publications. …


Analysis Of Driving Forces That Ensures The Sustainability Of Voter Accreditation Technology, Lawrence Oluwagbenga Bayode Jan 2020

Analysis Of Driving Forces That Ensures The Sustainability Of Voter Accreditation Technology, Lawrence Oluwagbenga Bayode

Walden Dissertations and Doctoral Studies

Nigeria’s electoral body, the independent national electoral commission (INEC), deployed a novel information technology (IT) based voter accreditation technology in 2015. Benefits realized included transparency and curtailed electoral malpractices. The purpose of this quantitative correlational study was to examine the relationship(s) between some variables categorized into technological, organizational, and economic factors, and Sustainability of voter accreditation technology (SVAT). The theoretical framework for the study was the e-voting system adoption model in combination with constructs from three other theories. A total of 138 IT experts participated and were asked (via SurveyMonkey) of the relationships between the following factors and SVAT: ease …


Strategies Used By It Project Managers To Integrate Icts In The Eastern Caribbean, Carl St. Aubin Roberts Jan 2020

Strategies Used By It Project Managers To Integrate Icts In The Eastern Caribbean, Carl St. Aubin Roberts

Walden Dissertations and Doctoral Studies

Current practices used to guide information and communication technology (ICT) projects in the Caribbean and developing countries lead to high project failure rates. Project managers must adopt new innovative approaches for transformation towards a 21st-century information society and sustainable digital economies. Grounded in the technology acceptance model (TAM), the purpose of this qualitative multiple-case study was to explore strategies information technology (IT) project managers use to implement IT frameworks designed to guide Caribbean ICT integration. Data were collected from face to face interviews and company documents and analyzed using coding, thematic analysis, and methodological triangulation. The participants were 12 IT …


Strategies For The Development Of It Disaster Recovery Plans In The Manufacturing Industry, Michael Landry Sartwell Jan 2020

Strategies For The Development Of It Disaster Recovery Plans In The Manufacturing Industry, Michael Landry Sartwell

Walden Dissertations and Doctoral Studies

Information technology (IT) leaders have reported technology disruptions because of natural disasters, terror attacks, or adversarial threats. Information technology leaders are concerned with technology disruptions, as these disruptions are costing organizations as much as $22,000 per minute. Grounded in Zachman’s framework, the purpose of this qualitative multiple case study was to explore strategies IT managers in the manufacturing industry use to develop IT disaster recovery (DR) plans to support business operations. The participants included 3 manufacturing IT professionals, 2 Department of Defense manufacturing infrastructure specialists, and 1outsourcing contractor, each from firms located in the central United States who successfully developed …


It Security Managers' Strategies For Mitigating Data Breaches In Texas School Districts, Mercy Ikhuoria Nwankwo Jan 2020

It Security Managers' Strategies For Mitigating Data Breaches In Texas School Districts, Mercy Ikhuoria Nwankwo

Walden Dissertations and Doctoral Studies

School districts are increasingly becoming a prime target for cybercriminals. As a result, information technology (IT) security managers in Texas school districts are concerned about hackers gaining access to network resources that could lead to data breaches on their network. Grounded in the technology threat avoidance theory, the purpose of this qualitative multiple case study was to explore strategies IT security managers use to mitigate data breaches in school district networks in Texas. The participants comprised 6 IT security managers in 3 Texas school districts whose roles involved managing and implementing data security strategies. Data collection involved conducting semistructured interviews …


Key Strategies For Successful Information Technology Projects, David Morris Jan 2020

Key Strategies For Successful Information Technology Projects, David Morris

Walden Dissertations and Doctoral Studies

AbstractThe successful implementation of information technology (IT) projects globally depends on the increasing reliance of project managers on IT innovations. Some project managers and business leaders do not possess the strategies to effectively manage and successfully implement IT projects. Grounded in coordination theory, the purpose of this qualitative multiple case study was to explore strategies used to successfully implement IT projects. Data were collected using semistructured interviews and from company documents. The participants comprised 6 IT project managers in Northeast Ohio who successfully implemented IT projects. Thematic analysis was used to analyze the data. Four themes emerged: communication amongst all …


Strategies To Implement Big Data Analytics In Telecommunications Organizations, Delton Aneato Jan 2020

Strategies To Implement Big Data Analytics In Telecommunications Organizations, Delton Aneato

Walden Dissertations and Doctoral Studies

Information Technology (IT) leaders who do not invest in big data projects may struggle to gain a competitive advantage and business insights to improve performance. Grounded in the Kotter’s change and Six Sigma models, the purpose of this qualitative multiple case study was to explore strategies IT leaders used to implement big data analytics successfully. The participants comprised 4 IT leaders from 2 telecommunication organizations in the United States of America, who effectively used strategies to promote and maximize competitive advantage using big data analytics. Data were collected from semistructured interviews, company documents, and project-related documents and were analyzed using …


Strategizing Effective Succession Planning For Information Technology Executives, Michael Barr Jan 2019

Strategizing Effective Succession Planning For Information Technology Executives, Michael Barr

Walden Dissertations and Doctoral Studies

Organizations across the United States lose hundreds of millions of dollars each year due to the lack of effective succession planning for information technology executives. The purpose of this single case study was to explore strategies for the development and implementation of effective succession plans for future information technology executives. Bass and Avolio's transformational leadership theory was the conceptual framework for this study. The 3 participants were selected based upon their roles as executives in technology-related positions and their experiences with succession planning. Data were collected using semistructured interviews with these executives from a company headquartered in Kansas City, Missouri. …


Leadership Characteristics In Flexible Information Technology Environments, Chrisilia Bristow Jan 2019

Leadership Characteristics In Flexible Information Technology Environments, Chrisilia Bristow

Walden Dissertations and Doctoral Studies

Researchers have found that a positive correlation exists between information technology (IT) flexibility, IT effectiveness, and strategic alignment in organizations. It has been determined that within inflexible IT environments maintainability is reduced and key business factors become at risk. An IT flexibility measurement matrix was developed to assess IT flexibility however leadership characteristics were not identified for measurement with that model. Determining the leadership characteristics needed for IT flexibility was the purpose of this multiple case study. Leveraging the empowerment, situational leadership, IT-business equilibrium, and complexity change theories, the research questions were focused on the leadership characteristics exhibited by organizational …


Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome Jan 2019

Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome

Walden Dissertations and Doctoral Studies

In the United States, women remain underrepresented in senior level positions in the information technology (IT) field. Despite this challenge, a few women have successfully ascended into senior leadership in IT. Using the social cognitive theory as the conceptual framework, the purpose of this qualitative transcendental phenomenological study was to understand the lived experiences of senior women leaders in the IT field. The research question explored the lived personal and professional experiences of senior women leaders in IT to gain an understanding of their career advancement into senior leadership positions. Through the use of the modified Van Kaam method of …


Exploring Information Technology Return On Investment Reports For Planning, Budgeting, And Implementation, Constantine Bitwayiki Jan 2019

Exploring Information Technology Return On Investment Reports For Planning, Budgeting, And Implementation, Constantine Bitwayiki

Walden Dissertations and Doctoral Studies

The failure rate of new government information technology (IT) projects in developing countries is high, with 35% classified as total failures and approximately 50% as partial failures. The population for this study was 10 senior managers of a public sector organization in Uganda selected because of high IT project successes achieved through leveraging IT return on investment (ROI) reports. The purpose of this qualitative single-case study was to explore the strategies Ugandan senior public sector officials used to leverage IT ROI reports during planning, budgeting, and implementation of IT projects to reduce failure rates. The conceptual frameworks were the strategic …


Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome Jan 2019

Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome

Walden Dissertations and Doctoral Studies

In the United States, women remain underrepresented in senior level positions in the information technology (IT) field. Despite this challenge, a few women have successfully ascended into senior leadership in IT. Using the social cognitive theory as the conceptual framework, the purpose of this qualitative transcendental phenomenological study was to understand the lived experiences of senior women leaders in the IT field. The research question explored the lived personal and professional experiences of senior women leaders in IT to gain an understanding of their career advancement into senior leadership positions. Through the use of the modified Van Kaam method of …


Exploring Industry Cybersecurity Strategy In Protecting Critical Infrastructure, Mark Boutwell Jan 2019

Exploring Industry Cybersecurity Strategy In Protecting Critical Infrastructure, Mark Boutwell

Walden Dissertations and Doctoral Studies

Successful attacks on critical infrastructure have increased in occurrence and sophistication. Many cybersecurity strategies incorporate conventional best practices but often do not consider organizational circumstances and nonstandard critical infrastructure protection needs. The purpose of this qualitative multiple case study was to explore cybersecurity strategies used by information technology (IT) managers and compliance officers to mitigate cyber threats to critical infrastructure. The population for this study comprised IT managers and compliance officers of 4 case organizations in the Pacific Northwest United States. The routine activity theory developed by criminologist Cohen and Felson in 1979 was used as the conceptual framework. Data …


Strategies For Successfully Managing Organizational It Projects, Joseph Rathbun Jan 2018

Strategies For Successfully Managing Organizational It Projects, Joseph Rathbun

Walden Dissertations and Doctoral Studies

Over 70% of information technology (IT) projects in large organizations in the United States run over budget or fail to reach completion primarily due to a lack of effective strategies. The purpose of this single case study was to explore strategies that IT project managers used to successfully complete IT projects. Hersey and Blanchard's situational leadership theory was the conceptual framework. Purposive sampling method was used to identify 2 successful IT project managers in Central Texas. Data gathered from semistructed interviews and collected from publicly available documents were analyzed using coding techniques, constant comparison, and key word phrases. Member checking …


Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti Jan 2018

Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti

Walden Dissertations and Doctoral Studies

Despite the high rate of failure in merger and acquisition (M&A) transactions, many organizations continue to rely on M&As as their primary growth strategy and to address market competition. The purpose of this qualitative single case study was to explore strategies managers from a large healthcare payer in the midwestern United States used to achieve operational and strategic synergies during the postacquisition information technology (IT) integration phase. Haspeslagh and Jemison's acquisition integration approaches model was the conceptual framework for the study. Methodological triangulation was established by analyzing the data from the semistructured interviews of 6 senior executives and 6 IT …


Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez Jan 2018

Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez

Walden Dissertations and Doctoral Studies

Project managers who fail to apply strategies to prevent counterproductive work behavior in information technology projects could negatively affect users, budget costs, timelines, or projects. The purpose of this multiple case study was to explore strategies that project managers used to prevent counterproductive work behavior that put project success at risk. Social learning theory was the conceptual framework for this study. Data were collected through document review of published Project Management Institute (PMI) material as well as semistructured interviews with 10 project managers who were members of a PMI chapter in the southeastern United States, and who held a project …


Employee Retention Strategies In The Information Technology Industry, Corey Harris Jan 2018

Employee Retention Strategies In The Information Technology Industry, Corey Harris

Walden Dissertations and Doctoral Studies

Productivity declines when employees voluntarily leave an organization. The purpose of this case study was to explore strategies that business leaders use to reduce turnover among their skilled information technology (IT) professionals in the Dallas-Fort Worth area. Six business leaders were selected because they had implemented strategies to retain skilled IT professionals. Herzberg's 2-factor theory was the conceptual framework for this doctoral study. Data were collected from semistructured interviews and review of the organization's policies, procedures, and personnel handbook. Data analysis consisted of assembling the data, organizing the data into codes, compiling the data into themes, and interpreting and disclosing …


Strategies To Improve Engagement Among Public Sector Information Technology Employees, Michelle Dawn Benham Jan 2017

Strategies To Improve Engagement Among Public Sector Information Technology Employees, Michelle Dawn Benham

Walden Dissertations and Doctoral Studies

Disengaged employees decrease organizations' efficiencies and profitability. Engaged employees provide greater productivity and performance while being less likely to incur job burnout and exhaustion. However, public sector organizational leaders still struggle to engage their information technology (IT) employees. Partnering with a large public sector organization in the Phoenix, Arizona, metropolitan area, in a case study design, this study explored the strategies that public sector business leaders use to increase productivity through engaging IT employees. The conceptual framework for this study was the job demands-resources framework. Four participants were selected through purposeful sampling from a population of 7 IT leaders who …


The Relationship Between Technology Threat Avoidance And Innovation In Health Care Organizations, Melvin R. Fenner Jr Jan 2017

The Relationship Between Technology Threat Avoidance And Innovation In Health Care Organizations, Melvin R. Fenner Jr

Walden Dissertations and Doctoral Studies

Most leaders of healthcare delivery organizations have increased their rate of technological innovation, but some still struggle to keep pace with other industries. The problem addressed in this study was that senior leaders in some rural ambulatory healthcare facilities failed to innovate, even with recent healthcare technological innovations, which could lead to increased medical errors and a loss of efficiency. The purpose of the study was to examine if a relationship exists between the avoidance of technology threats by senior leaders in ambulatory healthcare organizations and the innovation propensity of the organization. Technology threat avoidance theory served as the theoretical …


The Core Competencies Necessary For Global Information Technology Project Management, Gregory Michael Von Schleh Jan 2017

The Core Competencies Necessary For Global Information Technology Project Management, Gregory Michael Von Schleh

Walden Dissertations and Doctoral Studies

Global information technology (IT) project management organizations can create more value in their operations by presenting the core competencies possessed by global IT project managers (PMs) who are successful in their respective projects. The purpose of this multiple case study was to explore the core competencies and business strategies that IT PMs use to meet global IT project deadlines and budgets. This study involved 5 IT PMs from the Pacific Northwest (United States and Canada) who increased the quality of outsourced IT projects from 4 different companies. The data collection method included in-person semistructured interviews of participants and review of …


Organizational And Systems Factors Leading To Systems Integration Success After Merger And Acquisition, Monika Glazar-Stavnicky Jan 2016

Organizational And Systems Factors Leading To Systems Integration Success After Merger And Acquisition, Monika Glazar-Stavnicky

ETD Archive

Mergers and acquisitions (M&A) are a common technique used by companies to grow and enter new markets. The success rate of these transactions continues to be less than desired. Information Systems (IS) have been proven to be a key component influencing the success of mergers. While numerous factors have been found to lead to systems integration success, the studies have not analyzed the fit that is required when two organizations and systems are joined. This research focuses on the match between organizational variables of competencies and processes of two merging companies, as well as the match between systems variables of …