Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 83

Full-Text Articles in Social and Behavioral Sciences

Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall Jan 2023

Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall

Walden Dissertations and Doctoral Studies

Finance and information technology scholars wrote that there is a literature gap on what factors drive investors in Western financial markets to use a Robo-advisor to manage their investments. The purpose of this qualitative, single case study with embedded units is to understand the adoption intentions of retail investors in U.S. markets to use a Robo-advisor instead of a human advisor. A single case study design addressed the literature gap, and qualitative data from seven semi=structured interviews, reflective field notes, and archival data were triangulated to answer the research question. This study was grounded in a theoretical framework that includes …


Generational Information Security Awareness And The Role Of Big Five Personality Traits, Gloria Mccue Jan 2023

Generational Information Security Awareness And The Role Of Big Five Personality Traits, Gloria Mccue

Walden Dissertations and Doctoral Studies

AbstractTechnological change drives organizations to safeguard information systems. However, such safeguards are dependent upon people to follow security rules. This study examined generational cohorts and personality traits and their impact on information security awareness. Participants in this study were 137 volunteers who completed an anonymous survey online. Two tools were utilized to collect data from the participants: the Human Aspects of Information Security Questionnaire and the Big Five Inventory, which captured behaviors and personality traits, respectively. The three main generational cohorts represented in the study, Baby Boomers, Generation X, and Generation Y, were in today’s workforce. The results of the …


Strategies Information Technology Managers Use To Retain Qualified Information Technology Employees, Wayne Arnold Reu Jan 2023

Strategies Information Technology Managers Use To Retain Qualified Information Technology Employees, Wayne Arnold Reu

Walden Dissertations and Doctoral Studies

Retaining qualified information technology (IT) personnel can take time and effort, given the high demand for skilled positions. Business leaders are concerned with the high turnover of IT employees because of the cost of recruiting and training personnel and the disruption to organizational processes and performance. Grounded in job characteristics theory, the purpose of this qualitative pragmatic inquiry was to explore IT managers' strategies to retain qualified IT employees in organizations across the southwestern United States. Eight IT leaders participated because of their years of experience implementing strategies to retain qualified IT professionals. Data were collected using semistructured interviews and …


A Sociotechnical Systems View Of Computer Self-Efficacy And Usability Determinants Of Technical Readiness, Stefani L. Tucker Jan 2023

A Sociotechnical Systems View Of Computer Self-Efficacy And Usability Determinants Of Technical Readiness, Stefani L. Tucker

Walden Dissertations and Doctoral Studies

The specific research problem was that it is unknown whether computer self-efficacy and usability determine technical readiness in hourly and exempt information technology support employees in the United States. The purpose of this correlational study was to examine the relationship between computer self-efficacy and technical readiness, usability and technical readiness, and computer self-efficacy, usability, and technical readiness in hourly and exempt information technology support employees in the United States. Sociotechnical system theory suggests that every transaction has a human and technical aspect; thus, the theoretical framework. The convenience sample included 136 information technology support employees aged 18-70. The regression results …


Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore Jan 2023

Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore

Walden Dissertations and Doctoral Studies

Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …


Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore Jan 2023

Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore

Walden Dissertations and Doctoral Studies

Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …


Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall Jan 2023

Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall

Walden Dissertations and Doctoral Studies

Finance and information technology scholars wrote that there is a literature gap on what factors drive investors in Western financial markets to use a Robo-advisor to manage their investments. The purpose of this qualitative, single case study with embedded units is to understand the adoption intentions of retail investors in U.S. markets to use a Robo-advisor instead of a human advisor. A single case study design addressed the literature gap, and qualitative data from seven semi=structured interviews, reflective field notes, and archival data were triangulated to answer the research question. This study was grounded in a theoretical framework that includes …


A Sociotechnical Systems View Of Computer Self-Efficacy And Usability Determinants Of Technical Readiness, Stefani L. Tucker Jan 2023

A Sociotechnical Systems View Of Computer Self-Efficacy And Usability Determinants Of Technical Readiness, Stefani L. Tucker

Walden Dissertations and Doctoral Studies

The specific research problem was that it is unknown whether computer self-efficacy and usability determine technical readiness in hourly and exempt information technology support employees in the United States. The purpose of this correlational study was to examine the relationship between computer self-efficacy and technical readiness, usability and technical readiness, and computer self-efficacy, usability, and technical readiness in hourly and exempt information technology support employees in the United States. Sociotechnical system theory suggests that every transaction has a human and technical aspect; thus, the theoretical framework. The convenience sample included 136 information technology support employees aged 18-70. The regression results …


Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii Jan 2022

Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii

Walden Dissertations and Doctoral Studies

Supply chain inflexibility results in reduced efficiency and profitability. Without supply chain flexibility, supply chain managers in manufacturing firms risk the loss of competitive advantage due to reduced efficiency and profitability. Grounded in business process engineering conceptual framework, the purpose of this qualitative multiple case study was to explore strategies supply chain leaders in manufacturing organizations use to achieve supply chain flexibility. The participants were five supply chain leaders in the manufacturing industry in the midwestern United States and successfully implemented innovative solutions to achieve supply chain flexibility. Data were collected using semistructured interviews and a review of company documents …


Examination Of Strategies To Implementing Chip-And-Personal Identification Number Credit Card Authentication Infrastructures, Neville Arthur Gallimore Jan 2022

Examination Of Strategies To Implementing Chip-And-Personal Identification Number Credit Card Authentication Infrastructures, Neville Arthur Gallimore

Walden Dissertations and Doctoral Studies

Chip-and-Personal Identification Number (PIN) technology is seen as a game changer in many e-commerce industries and a transformational technology in the 21st century. However, security concerns have made chip-and-PIN adoption relatively slow. Massive unauthorized card payment transactions in the United States (U.S.) cost victims an estimate totaling billions of dollars. Information Technology (IT) managers are concerned with credit card fraud's financial loss and liability cost. Grounded in Rogers’s diffusion of innovation theory, the purpose of this qualitative pragmatic study was to explore strategies used by IT managers to transition their e-commerce organizations to chip-and-PIN credit card authentication infrastructures. The participants …


Forward-Looking Strategies For Safely Adopting Digital Transformation In Aviation, Melissa King Jan 2022

Forward-Looking Strategies For Safely Adopting Digital Transformation In Aviation, Melissa King

Walden Dissertations and Doctoral Studies

Aviation leaders in the U.S. federal government face challenges in adopting technical evolution and advancing modernization while adhering to the rigor of a deeply entrenched safety culture. The purpose of this qualitative modified Delphi study was to determine how a panel of 21 aerospace experts based in Washington, DC viewed strategies for adopting to new technologies while ensuring safety. The management concepts that framed the study were safety culture and digital transformation. The study addressed the research question of how a panel of aviation experts viewed the desirability, feasibility, and importance of forward-looking strategies for adopting digital transformation while adhering …


Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii Jan 2022

Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii

Walden Dissertations and Doctoral Studies

Supply chain inflexibility results in reduced efficiency and profitability. Without supply chain flexibility, supply chain managers in manufacturing firms risk the loss of competitive advantage due to reduced efficiency and profitability. Grounded in business process engineering conceptual framework, the purpose of this qualitative multiple case study was to explore strategies supply chain leaders in manufacturing organizations use to achieve supply chain flexibility. The participants were five supply chain leaders in the manufacturing industry in the midwestern United States and successfully implemented innovative solutions to achieve supply chain flexibility. Data were collected using semistructured interviews and a review of company documents …


Modernization Of Legacy Information Technology Systems, Rabie Khabouze Jan 2022

Modernization Of Legacy Information Technology Systems, Rabie Khabouze

Walden Dissertations and Doctoral Studies

Large enterprises spend a large portion of their Information Technology (IT) budget on maintaining their legacy systems. Legacy systems modernization projects are a catalyst for IT architects to save cost, provide new and efficient systems that increase profitability, and create value for their organization. Grounded in sociotechnical systems theory, the purpose of this qualitative multiple case study was to explore strategies IT architects use to modernize their legacy systems. The population included IT architects in large enterprises involved in legacy systems modernization projects, one in healthcare, and one in the financial services industry in the San Antonio-New Braunfels, Texas metropolitan …


Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao Jan 2022

Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao

Walden Dissertations and Doctoral Studies

User Experience (UX) design improvement can alter business results. Information technology (IT) company leaders are concerned with UX design improvement, as it is the number one indication of product innovation success and user satisfaction. Grounded in Christensen’s disruptive innovation theory, the purpose of the qualitative single case study was to explore strategies IT company leaders and UX designers used to identify critical UX design elements that lead to improved product innovations. The participants were five IT company leaders and a focus group of four UX designers employed by a sizeable telecom organization in Beijing, China. The data were collected from …


Information Systems Management And Sustainable Urban Development: A Case Study, Endris A. Suraj Jan 2022

Information Systems Management And Sustainable Urban Development: A Case Study, Endris A. Suraj

Walden Dissertations and Doctoral Studies

Sustainable Urban Development of Ethiopia lacks strategies to implement information systems management (ISM). Lacking appropriate ISM implementation has influenced the government’s plan on the four indicators of urban sustainability - Water, Air, Climate Change, and Population Growth. Grounded in the conceptual frameworks of Technology Acceptance Model (TAM) and Diffusion Of Innovation (DOI), the purpose of this qualitative single case study aims to explore ISM for sustainable urban development in Ethiopia. The participants were 12 Development Associates (DAs) who have been participating in implementing of ISM. Data was collected through a one-to-one interview, National documents, the Environmental Protection Office of Ethiopia, …


Exploring The Value Of Technology Within Cross-Departmental Communications, Brian J. Luckey Jan 2021

Exploring The Value Of Technology Within Cross-Departmental Communications, Brian J. Luckey

Walden Dissertations and Doctoral Studies

While many midsized businesses have invested in technology to support business operations, most have not realized the potential value of using technology to collaborate cross-departmentally. There is a lack of knowledge concerning strategies for using technology to facilitate effective organizational communications, which has resulted in operating technology investments being made without corresponding investments in communication technologies. The purpose of this qualitative case study was to fill the knowledge gap concerning the impact of technology for cross-departmental communications. The theoretical foundation for this study was based on systems theory, organizational theory, and stakeholder theory. The key research question involved the impact …


Insider Threats' Behaviors And Data Security Management Strategies, Gladys C. Cooley Jan 2021

Insider Threats' Behaviors And Data Security Management Strategies, Gladys C. Cooley

Walden Dissertations and Doctoral Studies

As insider threats and data security management concerns become more prevalent, the identification of risky behaviors in the workplace is crucial for the privacy of individuals and the survival of organizations. The purpose of this three-round qualitative Delphi study was to identify real-time consensus among 25 information technology (IT) subject matter experts (SMEs) in the Washington metropolitan area about insider threats and data security management. The SMEs participating in this study were adult IT professionals and senior managers with certification in their area of specialization and at least 5 years of practical experience. The dark triad theory was the conceptual …


The Effect Of Social Media Use On Physical Isolation In Individuals With Borderline Personality Disorder, Davena Limitless Longshore Jan 2021

The Effect Of Social Media Use On Physical Isolation In Individuals With Borderline Personality Disorder, Davena Limitless Longshore

Walden Dissertations and Doctoral Studies

Individuals with borderline personality disorder (BPD) experience extreme interpersonal conflict, crippling their ability to sustain successful relationships. Consequently, clinicians within the psychological field face difficulty in devising treatments plans which can assist these individuals with suffering minimal relationship loss. The purpose of this study was to understand how current technological methods of social interaction affect individuals who suffer from BPD to improve treatment outcomes. This research was guided by the principles of attachment theory and social baseline theory. A quantitative correlational design using social network analysis and multiple regression analysis was used to examine data from surveys. Participants were solicited …


Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly Jan 2021

Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly

Walden Dissertations and Doctoral Studies

Some information technology (IT) managers working for small businesses are struggling to monitor and deter cyberloafing. Strategies are needed to help IT practitioners to discourage cyberloafing and improve productivity while maintaining employee satisfaction. Grounded in adaptive structuration theory, the purpose of this qualitative multiple-case study was to explore strategies some small business IT managers use to monitor and deter cyberloafing. The participants were nine IT managers who successfully implemented cyberloafing monitoring and deterrence strategies in the United States. Data were collected via semistructured interviews and organization employee policy handbooks (n = 4) provided by the participants. Data were analyzed using …


Customer And Employee Social Media Comments/Feedback And Stock Purchasing Decisions Enhanced By Sentiment Analysis, Drew Mikel Hall Jan 2020

Customer And Employee Social Media Comments/Feedback And Stock Purchasing Decisions Enhanced By Sentiment Analysis, Drew Mikel Hall

Walden Dissertations and Doctoral Studies

The U.S. Securities and Exchange Commission (SEC) warns professional investors that sentiment analysis tools may lead to impulsive investment decision-making. This warning comes despite evidence showing that aided social sentiment investment decision tools can increase accurate investment decision-making by 18%. Using Fama's theory of efficient market hypothesis, the purpose of this quantitative correlational study was to examine whether customer Twitter comments and employee Glassdoor feedback sentiment predicted successful investing decisions measured by business stock prices. Two thousand records from 3 archival U.S. public NASDAQ 100 datasets from March 28, 2016, to June 15, 2016 (79 days) of 53 companies with …


Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon Jan 2020

Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon

Walden Dissertations and Doctoral Studies

The cyber threat landscape has led some cybersecurity leaders to focus on a holistic approach encompassing people, processes, and technology to make their government agencies and organizations more responsive to a more diverse and inclusive cyber workforce to protect critical infrastructure from hackers or cybercriminals intent on causing harm. This qualitative multiple case study used Schein’s organizational culture theory to explore strategies used by cybersecurity leaders to attract, recruit, and retain diverse cybersecurity professionals to effectively and efficiently protect sensitive systems from rising cyber threats. The study's population consisted of cybersecurity leaders from 3 government agencies and 9 organizations in …


Exploring Cybersecurity Awareness And Training Strategies To Protect Information Systems And Data, Michael Hanna Jan 2020

Exploring Cybersecurity Awareness And Training Strategies To Protect Information Systems And Data, Michael Hanna

Walden Dissertations and Doctoral Studies

Ineffective security education, training, and awareness (SETA) programs contribute to compromises of organizational information systems and data. Inappropriate actions from users due to ineffective SETA programs may result in legal consequences, fines, reputational damage, adverse impacts on national security, and criminal acts. Grounded in social cognitive theory, the purpose of this qualitative multiple case study was to explore strategies hospitality organizational information technology (IT) leaders utilized to implement SETA successfully. The participants were organizational IT leaders from four organizations in Hampton Roads, Virginia. Data collection was performed using telephone and video teleconference interviews with organizational IT leaders (n = 6) …


Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu Jan 2020

Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu

Walden Dissertations and Doctoral Studies

Information technology (IT) employees of small business organizations have been the driving force for the implementation of innovative standardized IT service management and process improvement initiatives. Competitiveness amongst small business IT organizations in the market for quality IT service delivery led small business IT leaders toward the implementation of an information technology infrastructure library (ITIL) as an IT service management framework. The problem addressed in this research encompassed the needs of small business IT leaders and ITIL designers to understand the perceptions of IT operation employees following ITIL implementation. The purpose of this qualitative multiple case study was to explore …


Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove Jan 2020

Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove

Walden Dissertations and Doctoral Studies

Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …


The Impact Of Technological Advances On Older Workers, Toni Mcintosh Jan 2020

The Impact Of Technological Advances On Older Workers, Toni Mcintosh

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was the treatment of older workers in the information technology industry that contributes to age discrimination in the workplace. Age discrimination is against the law irrespective of whether it is aimed at older workers in the workforce or becoming job candidates at an advanced age. Although previous research has shown that age discrimination is prevalent in work environments, little has been suggested to eradicate the issue in the workplace. The purpose of this qualitative case study was to investigate the issue of age discrimination as it relates to workers over the age of …


Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham Jan 2020

Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham

Walden Dissertations and Doctoral Studies

Consumer online activities can generate massive volumes of data that private companies may collect and use for business purposes. Consumer personal data need to be protected from unauthorized access and misuse. The specific problem is that consumers have little control regarding their data being collected and used by private companies. The purpose of this qualitative archival research was to explore business practices involving collection and use of consumer data without an individual’s consent. This study used the big data ethical conceptual framework to focus on various privacy issues, including those related to ownership, transparency, ethics, and consumer privacy laws. Archival …


Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten Jan 2020

Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten

Walden Dissertations and Doctoral Studies

Cloud computing adoption rates have not grown commensurate with several well-known and substantially tangible benefits such as horizontal distribution and reduced cost, the latter both in terms of infrastructure and specialized personnel. The lack of adoption presents a challenge to both service providers from a sales perspective and service consumers from a usability focus. The purpose of this quantitative correlational study utilizing the technological, organizational, and environmental framework was to examine the relationship between shared technology (ST), malicious insiders (MI), account hijacking, data leakage, data protection, service partner trust (SP), regulatory concerns and the key decision-makers intention to adopt cloud …


Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde Jan 2020

Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde

Walden Dissertations and Doctoral Studies

Some financial institutions in Nigeria have not deployed strategies that mitigate cyber exploitation risks in the financial services industry. Financial institution leaders are concerned because cyber exploitation contributed to the reduction in the adult banking population to a low 38%. Grounded in the integrated systems theory of information security management, the purpose of this multiple case study was to explore strategies some financial institution leaders in Nigeria use to prevent cyber exploitations. The participants included 6 chief information security officers of 6 financial institutions. Data were collected from semistructured interviews and company and public documents. A thematic analysis identified themes …


Reducing Payment-Card Fraud, Chares R. Ross Jan 2020

Reducing Payment-Card Fraud, Chares R. Ross

Walden Dissertations and Doctoral Studies

Critical public data in the United States are vulnerable to theft, creating severe financial and legal implications for payment-card acceptors. When security analysts and managers who work for payment card processing organizations implement strategies to reduce or eliminate payment-card fraud, they protect their organizations, consumers, and the local and national economy. Grounded in Cressey’s fraud theory, the purpose of this qualitative single case study was to explore strategies business owners and card processors use to reduce or eliminate payment-card fraud. The participants were 3 data security analysts and 1 manager working for an international payment card processing organization with 10 …


Information Security Ambassadors’ Perceptions Of Peer-Led Motivation In Phishing Detection, Kingkane Malmquist Jan 2020

Information Security Ambassadors’ Perceptions Of Peer-Led Motivation In Phishing Detection, Kingkane Malmquist

Walden Dissertations and Doctoral Studies

Phishing rates are increasing yearly and continue to compromise data integrity. The need to guard business information is vital for organizations to meet their business objectives and legal obligations. The purpose of this phenomenological study was to explore security ambassadors’ perceptions of motivating their peers to adopt safe internet behaviors in a large medical campus in Minnesota. Hackman and Oldham’s job characteristic motivation theory was used to frame the study. Data were collected from semistructured interviews with 20 security ambassadors. Data coding and analysis yielded 7 themes: rewarding, value, personal interest, limited information security knowledge, increased interest, communication, and topics …