Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Social and Behavioral Sciences

Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall Jan 2023

Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall

Walden Dissertations and Doctoral Studies

Finance and information technology scholars wrote that there is a literature gap on what factors drive investors in Western financial markets to use a Robo-advisor to manage their investments. The purpose of this qualitative, single case study with embedded units is to understand the adoption intentions of retail investors in U.S. markets to use a Robo-advisor instead of a human advisor. A single case study design addressed the literature gap, and qualitative data from seven semi=structured interviews, reflective field notes, and archival data were triangulated to answer the research question. This study was grounded in a theoretical framework that includes …


Generational Information Security Awareness And The Role Of Big Five Personality Traits, Gloria Mccue Jan 2023

Generational Information Security Awareness And The Role Of Big Five Personality Traits, Gloria Mccue

Walden Dissertations and Doctoral Studies

AbstractTechnological change drives organizations to safeguard information systems. However, such safeguards are dependent upon people to follow security rules. This study examined generational cohorts and personality traits and their impact on information security awareness. Participants in this study were 137 volunteers who completed an anonymous survey online. Two tools were utilized to collect data from the participants: the Human Aspects of Information Security Questionnaire and the Big Five Inventory, which captured behaviors and personality traits, respectively. The three main generational cohorts represented in the study, Baby Boomers, Generation X, and Generation Y, were in today’s workforce. The results of the …


Strategies Information Technology Managers Use To Retain Qualified Information Technology Employees, Wayne Arnold Reu Jan 2023

Strategies Information Technology Managers Use To Retain Qualified Information Technology Employees, Wayne Arnold Reu

Walden Dissertations and Doctoral Studies

Retaining qualified information technology (IT) personnel can take time and effort, given the high demand for skilled positions. Business leaders are concerned with the high turnover of IT employees because of the cost of recruiting and training personnel and the disruption to organizational processes and performance. Grounded in job characteristics theory, the purpose of this qualitative pragmatic inquiry was to explore IT managers' strategies to retain qualified IT employees in organizations across the southwestern United States. Eight IT leaders participated because of their years of experience implementing strategies to retain qualified IT professionals. Data were collected using semistructured interviews and …


A Sociotechnical Systems View Of Computer Self-Efficacy And Usability Determinants Of Technical Readiness, Stefani L. Tucker Jan 2023

A Sociotechnical Systems View Of Computer Self-Efficacy And Usability Determinants Of Technical Readiness, Stefani L. Tucker

Walden Dissertations and Doctoral Studies

The specific research problem was that it is unknown whether computer self-efficacy and usability determine technical readiness in hourly and exempt information technology support employees in the United States. The purpose of this correlational study was to examine the relationship between computer self-efficacy and technical readiness, usability and technical readiness, and computer self-efficacy, usability, and technical readiness in hourly and exempt information technology support employees in the United States. Sociotechnical system theory suggests that every transaction has a human and technical aspect; thus, the theoretical framework. The convenience sample included 136 information technology support employees aged 18-70. The regression results …


Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore Jan 2023

Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore

Walden Dissertations and Doctoral Studies

Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …


Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore Jan 2023

Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore

Walden Dissertations and Doctoral Studies

Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …


Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall Jan 2023

Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall

Walden Dissertations and Doctoral Studies

Finance and information technology scholars wrote that there is a literature gap on what factors drive investors in Western financial markets to use a Robo-advisor to manage their investments. The purpose of this qualitative, single case study with embedded units is to understand the adoption intentions of retail investors in U.S. markets to use a Robo-advisor instead of a human advisor. A single case study design addressed the literature gap, and qualitative data from seven semi=structured interviews, reflective field notes, and archival data were triangulated to answer the research question. This study was grounded in a theoretical framework that includes …


A Sociotechnical Systems View Of Computer Self-Efficacy And Usability Determinants Of Technical Readiness, Stefani L. Tucker Jan 2023

A Sociotechnical Systems View Of Computer Self-Efficacy And Usability Determinants Of Technical Readiness, Stefani L. Tucker

Walden Dissertations and Doctoral Studies

The specific research problem was that it is unknown whether computer self-efficacy and usability determine technical readiness in hourly and exempt information technology support employees in the United States. The purpose of this correlational study was to examine the relationship between computer self-efficacy and technical readiness, usability and technical readiness, and computer self-efficacy, usability, and technical readiness in hourly and exempt information technology support employees in the United States. Sociotechnical system theory suggests that every transaction has a human and technical aspect; thus, the theoretical framework. The convenience sample included 136 information technology support employees aged 18-70. The regression results …