Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Social and Behavioral Sciences

Exploring The Value Of Technology Within Cross-Departmental Communications, Brian J. Luckey Jan 2021

Exploring The Value Of Technology Within Cross-Departmental Communications, Brian J. Luckey

Walden Dissertations and Doctoral Studies

While many midsized businesses have invested in technology to support business operations, most have not realized the potential value of using technology to collaborate cross-departmentally. There is a lack of knowledge concerning strategies for using technology to facilitate effective organizational communications, which has resulted in operating technology investments being made without corresponding investments in communication technologies. The purpose of this qualitative case study was to fill the knowledge gap concerning the impact of technology for cross-departmental communications. The theoretical foundation for this study was based on systems theory, organizational theory, and stakeholder theory. The key research question involved the impact …


Insider Threats' Behaviors And Data Security Management Strategies, Gladys C. Cooley Jan 2021

Insider Threats' Behaviors And Data Security Management Strategies, Gladys C. Cooley

Walden Dissertations and Doctoral Studies

As insider threats and data security management concerns become more prevalent, the identification of risky behaviors in the workplace is crucial for the privacy of individuals and the survival of organizations. The purpose of this three-round qualitative Delphi study was to identify real-time consensus among 25 information technology (IT) subject matter experts (SMEs) in the Washington metropolitan area about insider threats and data security management. The SMEs participating in this study were adult IT professionals and senior managers with certification in their area of specialization and at least 5 years of practical experience. The dark triad theory was the conceptual …


The Effect Of Social Media Use On Physical Isolation In Individuals With Borderline Personality Disorder, Davena Limitless Longshore Jan 2021

The Effect Of Social Media Use On Physical Isolation In Individuals With Borderline Personality Disorder, Davena Limitless Longshore

Walden Dissertations and Doctoral Studies

Individuals with borderline personality disorder (BPD) experience extreme interpersonal conflict, crippling their ability to sustain successful relationships. Consequently, clinicians within the psychological field face difficulty in devising treatments plans which can assist these individuals with suffering minimal relationship loss. The purpose of this study was to understand how current technological methods of social interaction affect individuals who suffer from BPD to improve treatment outcomes. This research was guided by the principles of attachment theory and social baseline theory. A quantitative correlational design using social network analysis and multiple regression analysis was used to examine data from surveys. Participants were solicited …


Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly Jan 2021

Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly

Walden Dissertations and Doctoral Studies

Some information technology (IT) managers working for small businesses are struggling to monitor and deter cyberloafing. Strategies are needed to help IT practitioners to discourage cyberloafing and improve productivity while maintaining employee satisfaction. Grounded in adaptive structuration theory, the purpose of this qualitative multiple-case study was to explore strategies some small business IT managers use to monitor and deter cyberloafing. The participants were nine IT managers who successfully implemented cyberloafing monitoring and deterrence strategies in the United States. Data were collected via semistructured interviews and organization employee policy handbooks (n = 4) provided by the participants. Data were analyzed using …