Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Walden University

Discipline
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 50

Full-Text Articles in Library and Information Science

Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly Jan 2021

Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly

Walden Dissertations and Doctoral Studies

Some information technology (IT) managers working for small businesses are struggling to monitor and deter cyberloafing. Strategies are needed to help IT practitioners to discourage cyberloafing and improve productivity while maintaining employee satisfaction. Grounded in adaptive structuration theory, the purpose of this qualitative multiple-case study was to explore strategies some small business IT managers use to monitor and deter cyberloafing. The participants were nine IT managers who successfully implemented cyberloafing monitoring and deterrence strategies in the United States. Data were collected via semistructured interviews and organization employee policy handbooks (n = 4) provided by the participants. Data were analyzed using …


The Power Of Exogenous Variables In Predicting West Nile Virus In South Carolina, Christopher Lee Glaze Jan 2021

The Power Of Exogenous Variables In Predicting West Nile Virus In South Carolina, Christopher Lee Glaze

Walden Dissertations and Doctoral Studies

Despite the availability of medical data, environmental surveillance tools, and heightened public awareness, West Nile Virus (WNv) remains a global health hazard. Reliable methods for predicting WNv outbreaks remain elusive, and environmental health managers must take preventive actions without the benefit of simple predictive tools. The purpose of this ex post facto research was to examine the accuracy and timeliness of exogenous data in predicting outbreaks of WNv in South Carolina. Decision theory, the CYNEFIN construct, and systems theory provided the theoretical framework for this study, allowing the researcher to broaden traditional decision theory concepts with powerful system-level precepts. Using …


Predictors Of Community Physicians’ Digital Information Retrieval At Point Of Care, Jumana Antoun Jan 2021

Predictors Of Community Physicians’ Digital Information Retrieval At Point Of Care, Jumana Antoun

Walden Dissertations and Doctoral Studies

Efficient digital information retrieval at the point of care is essential for better health care delivery. The problem is the lack of knowledge about the community physician’s digital information retrieval at the point of care. The purpose of this study was to examine the characteristics of the community physicians’ digital information retrieval at the point of care in eight Arab countries in the Eastern Mediterranean and whether a set of factors predicted the digital information retrieval. This study was guided by the Smith model that links professional digital practices to professional competencies, digital literacy, and technological affordances. The descriptive research …


Deterrence And Response Improvements For A Large-Scale Cyberterrorism Attack, Harrison Cunningham Jan 2021

Deterrence And Response Improvements For A Large-Scale Cyberterrorism Attack, Harrison Cunningham

Walden Dissertations and Doctoral Studies

A successful large-scale cyberterrorism attack has never been conducted against the United States, yet cyberterrorism is a real and evolving threat. The United States assumes a largely defensive posture toward the thousands of daily cyberattacks conducted against the country, allowing cyberterrorists to probe and execute cyberattacks with broad impunity. The United States would most likely respond to a successful large-scale cyberterrorism attack within a framework of regulations concerning physical acts of terrorism since no policy exists on how to respond to major cyberterrorism attacks. The purpose of this qualitative study was to explore the perceptions of U.S. terrorism and cybersecurity …


Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu Jan 2020

Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu

Walden Dissertations and Doctoral Studies

Information technology (IT) employees of small business organizations have been the driving force for the implementation of innovative standardized IT service management and process improvement initiatives. Competitiveness amongst small business IT organizations in the market for quality IT service delivery led small business IT leaders toward the implementation of an information technology infrastructure library (ITIL) as an IT service management framework. The problem addressed in this research encompassed the needs of small business IT leaders and ITIL designers to understand the perceptions of IT operation employees following ITIL implementation. The purpose of this qualitative multiple case study was to explore …


Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii Jan 2020

Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii

Walden Dissertations and Doctoral Studies

Many data scientists are struggling to adopt effective data governance practices as they transition from traditional data analysis to big data analytics. Data governance of big data requires new strategies to deal with the volume, variety, and velocity attributes of big data. The purpose of this qualitative multiple case study was to explore big data governance strategies employed by data scientists to provide a holistic perspective of those data for making decisions. The participants were 10 data scientists employed in multiple mid-market companies in the greater Salt Lake City, Utah area who have strategies to govern big data. This study’s …


Public Librarians' Adoption Of Technology In Two Southeastern States, Ashley Ea Dowdy Jan 2020

Public Librarians' Adoption Of Technology In Two Southeastern States, Ashley Ea Dowdy

Walden Dissertations and Doctoral Studies

Public libraries have become community hubs of technology, changing the responsibilities of public librarians. The problem is a gap between public library technology needs, the skills librarians have with technologies, and the strategies they use to acquire skills. The purpose of this predictive, sequential, explanatory mixed method study was to examine public librarians' attitudes about learning new technology and their behavioral intention to adopt it. Two frameworks guided this study: the unified theory of acceptance and use of technology model and the diffusion of innovations theory. Quantitative data (N= 202) were collected by survey and analyzed through multiple linear regression …


Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove Jan 2020

Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove

Walden Dissertations and Doctoral Studies

Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …


Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon Jan 2020

Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon

Walden Dissertations and Doctoral Studies

The cyber threat landscape has led some cybersecurity leaders to focus on a holistic approach encompassing people, processes, and technology to make their government agencies and organizations more responsive to a more diverse and inclusive cyber workforce to protect critical infrastructure from hackers or cybercriminals intent on causing harm. This qualitative multiple case study used Schein’s organizational culture theory to explore strategies used by cybersecurity leaders to attract, recruit, and retain diverse cybersecurity professionals to effectively and efficiently protect sensitive systems from rising cyber threats. The study's population consisted of cybersecurity leaders from 3 government agencies and 9 organizations in …


Effective Strategies Small Business Leaders Use To Address Ransomware, William Jason Tuttle Jan 2020

Effective Strategies Small Business Leaders Use To Address Ransomware, William Jason Tuttle

Walden Dissertations and Doctoral Studies

Small business leaders face a wide range of cybersecurity threats. Ransomware is a specific cybersecurity threat that cybercriminals can use to deny small business leaders’ access to data in exchange for a ransom payment. Grounded in routine activity conceptual framework, the purpose of this qualitative multiple case study was to explore effective strategies small business leaders use to address ransomware. Data were collected from 5 leaders of small businesses in the southeast region of the United States. Data sources included interviews and archival documents. Data were analyzed using Yin’s 5 step process. The analysis revealed 3 primary themes: ransomware strategy, …


Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde Jan 2020

Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde

Walden Dissertations and Doctoral Studies

Some financial institutions in Nigeria have not deployed strategies that mitigate cyber exploitation risks in the financial services industry. Financial institution leaders are concerned because cyber exploitation contributed to the reduction in the adult banking population to a low 38%. Grounded in the integrated systems theory of information security management, the purpose of this multiple case study was to explore strategies some financial institution leaders in Nigeria use to prevent cyber exploitations. The participants included 6 chief information security officers of 6 financial institutions. Data were collected from semistructured interviews and company and public documents. A thematic analysis identified themes …


Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten Jan 2020

Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten

Walden Dissertations and Doctoral Studies

Cloud computing adoption rates have not grown commensurate with several well-known and substantially tangible benefits such as horizontal distribution and reduced cost, the latter both in terms of infrastructure and specialized personnel. The lack of adoption presents a challenge to both service providers from a sales perspective and service consumers from a usability focus. The purpose of this quantitative correlational study utilizing the technological, organizational, and environmental framework was to examine the relationship between shared technology (ST), malicious insiders (MI), account hijacking, data leakage, data protection, service partner trust (SP), regulatory concerns and the key decision-makers intention to adopt cloud …


Understanding Self-Managed Teams Using Biomimicking, Mohammad Nozari Jan 2020

Understanding Self-Managed Teams Using Biomimicking, Mohammad Nozari

Walden Dissertations and Doctoral Studies

AbstractThe potential high performance of self-managed teams can only materialize with implementing such teams properly and differently from traditional manager-led teams. This qualitative descriptive multiple case study presents biomimicking as a unique and untapped resource to achieve that potential by applying a biomimicking lens to help understand successful decision-making patterns for self-managed teams. The study population included team members of self-managed teams working in information technology companies in Toronto, Ontario, as the technology hub of Canada with a tendency to apply the latest approaches for teamwork performance and output. The conceptual framework of the study included teamwork, self-management, social choice, …


Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham Jan 2020

Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham

Walden Dissertations and Doctoral Studies

Consumer online activities can generate massive volumes of data that private companies may collect and use for business purposes. Consumer personal data need to be protected from unauthorized access and misuse. The specific problem is that consumers have little control regarding their data being collected and used by private companies. The purpose of this qualitative archival research was to explore business practices involving collection and use of consumer data without an individual’s consent. This study used the big data ethical conceptual framework to focus on various privacy issues, including those related to ownership, transparency, ethics, and consumer privacy laws. Archival …


Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias Jan 2019

Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias

Walden Dissertations and Doctoral Studies

Despite the increased cost of data breaches due to advanced, persistent threats from malicious sources, the adoption of big data security analytics among U.S. small businesses has been slow. Anchored in a diffusion of innovation theory, the purpose of this correlational study was to examine ways to increase the adoption of big data security analytics among small businesses in the United States by examining the relationship between small business leaders' perceptions of big data security analytics and their adoption. The research questions were developed to determine how to increase the adoption of big data security analytics, which can be measured …


Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe Jan 2019

Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe

Walden Dissertations and Doctoral Studies

In retail, the explosion of data sources and data has provided incentive to invest in information systems (IS), which enable leaders to understand the market and make timely decisions to improve performance. Given that users’ perceptions of IS affects their use of IS, understanding the factors influencing user acceptance is critical to acquiring an effective business intelligence system (BIS) for an organization. Grounded in the technology acceptance model theory, the purpose of this correlational study was to examine the relationship between perceived usefulness (PU), perceived ease of use (PEOU), and user acceptance of business intelligence systems (BIS) in retail organizations. …


Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey Jan 2019

Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey

Walden Dissertations and Doctoral Studies

There is a significant technology deficiency within the U.S. manufacturing industry compared to other countries. To adequately compete in the global market, lean manufacturing organizations in the United States need to look beyond their traditional methods of evaluating their processes to optimize their assembly cells for efficiency. Utilizing the task-technology fit theory this quantitative correlational study examined the relationships among software using probabilistic algorithms, lean methodology techniques, and manufacturer cell optimization results. Participants consisted of individuals performing the role of the systems analyst within a manufacturing organization using lean methodologies in the Southwestern United States. Data were collected from 118 …


Organizational Learning For Libraries At For-Profit Colleges And Universities: A Manual, Julie Evener Jan 2018

Organizational Learning For Libraries At For-Profit Colleges And Universities: A Manual, Julie Evener

Walden Faculty and Staff Publications

The purpose of this manual is an introduction to the concept of organizational learning for librarians working in for-profit colleges and universities, though the suggestions and ideas herein are applicable to librarians working in a variety of institutions. Information in this manual was collected through a literature review, as well as the author’s original research focusing on organizational learning in libraries of for-profit colleges and universities in the United States. The content of the manual includes why organizational learning is important for libraries, factors that contribute to organizational learning, challenges to organizational learning and strategies to overcome the challenges, and …


User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim Jan 2018

User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim

Walden Dissertations and Doctoral Studies

The use of banking automated teller machine (ATM) technological innovations have significant importance and benefits in Nigeria, but numerous investigations have shown that illiterate and semiliterate Nigerians do not perceive them as useful or easy-to-use. Developing easy-to-use banking ATM system interfaces is essential to accommodate over 40% illiterate and semiliterate Nigerians, who are potential users of banking ATM systems. The purpose of this study was to identify strategies software developers of banking ATM systems in Nigeria use to create easy-to-use banking ATM system interfaces for a variety of people with varying abilities and literacy levels. The technology acceptance model was …


Organizational Learning In Libraries At For-Profit Colleges And Universities, Julie Evener Jan 2018

Organizational Learning In Libraries At For-Profit Colleges And Universities, Julie Evener

Walden Dissertations and Doctoral Studies

Academic libraries contribute to student engagement, student learning, and retention; therefore, the effects of improved library services for students may be positive and long lasting. However, despite successful application of organizational learning (OL), a strategic process for improvement, to enhance services in academic libraries, little is known about OL in libraries of for-profit colleges and universities (FPCUs). The purpose of this sequential explanatory mixed-methods study was to assess and explore the use of OL in libraries at FPCUs. Argyris and Schön's theory of organizational learning grounded this study. Responses to Chen's Processes and Phases of Organizational Learning Questionnaire, completed online …


Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price Jan 2018

Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price

Walden Dissertations and Doctoral Studies

Telehealth and remote medical treatments have begun to be more commonly used in healthcare systems. Researchers have theorized that providers' abilities to treat patients are not directly tied to the proximity of the patient to the doctor, but by the identification and treatment of the patient's symptoms. Although the treatment and cure rates are being established within individual health systems and professional medical associations, empirical research is lacking regarding patient satisfaction with this remote treatment situation. The purpose of this quantitative study was to address this gap by examining satisfaction ratings of patients between virtual provider visits and face-to-face provider …


Black Business Owners Overcoming Barriers In Texas, Henry Williams Jan 2018

Black Business Owners Overcoming Barriers In Texas, Henry Williams

Walden Dissertations and Doctoral Studies

Black entrepreneurs in the state of Texas reported that they did not achieve the same level of success as nonminority enterprises. Many Black entrepreneurs have obtained education from top tier institutions and have the managerial experiences, skills, and working knowledge that facilitate business success, but they are not able to sustain business growth. The purpose of this phenomenological study was to explore the lived experiences of Black Texan entrepreneurs. This research was established using the conceptual framework of human capital. The overarching research question concerned the lived experiences of Black Texas entrepreneurs who were not as successful in business as …


Staff Education Module For Bar Code Medication Administration, Francoise Juste Jan 2018

Staff Education Module For Bar Code Medication Administration, Francoise Juste

Walden Dissertations and Doctoral Studies

Bar Code Medication Administration (BCMA) is a technology-supported nursing tool that has become the standard of practice for medication administration. When used effectively and efficiently, this tool has the potential to reduce medication errors in acute care settings. In a pediatric unit at a major urban hospital in the northeast region of the United States, the absence of a BCMA nursing staff educational module affected the use of this safety tool leading to an increase of medication errors. The purpose of this DNP project was to develop a comprehensive educational module to promote BCMA in the pediatric unit of the …


Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii Jan 2018

Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii

Walden Dissertations and Doctoral Studies

The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The …


Effect Of Attentional Capture And Cross-Modal Interference In Multisensory Cognitive Processing, Michael Jennings Jan 2018

Effect Of Attentional Capture And Cross-Modal Interference In Multisensory Cognitive Processing, Michael Jennings

Walden Dissertations and Doctoral Studies

Despite considerable research, the effects of common types of noise on verbal and spatial information processing are still relatively unknown. Three experiments, using convenience sampling were conducted to investigate the effect of auditory interference on the cognitive performance of 24 adult men and women during the Stroop test, perception of object recognition and spatial location tasks, and the perception of object size, shape, and spatial location tasks. The data were analyzed using univariate analysis of variance and 1-way multivariate analysis of variance. The Experiment 1 findings indicated reaction time performance for gender and age group was affected by auditory interference …


Effect Of Early Exposure To Technology On Student Satisfaction With Online Education, Mohamed Boudalia Jan 2018

Effect Of Early Exposure To Technology On Student Satisfaction With Online Education, Mohamed Boudalia

Walden Dissertations and Doctoral Studies

U.S. student enrollment in online classes in the higher education sector has grown rapidly since 2001. Researchers have found that student satisfaction often leads to higher student retention, yet more research was needed to understand reasons for student satisfaction with online education. The purpose of this nonexperimental study was to examine the relationship between students' early exposure to technology (i.e., before college) and their satisfaction with online education in college. The unified theory of acceptance and use of technology were the theoretical framework. A convenience sample of 103 participants from the population of online students at colleges and universities in …


Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan Jan 2018

Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan

Walden Dissertations and Doctoral Studies

From 2006 to 2016, an estimated average of 50% of big data analytics and decision support projects failed to deliver acceptable and actionable outputs to business users. The resulting management inefficiency came with high cost, and wasted investments estimated at $2.7 trillion in 2016 for companies in the United States. The purpose of this quantitative descriptive study was to examine the data model of a typical data analytics project in a big data environment for opportunities to improve the information created for management problem-solving. The research questions focused on finding artifacts within enterprise data to model key business scenarios for …


Improving The Quality Of Electronic Documentation In Critical Care Nursing, Brent Alan Stevens Jan 2017

Improving The Quality Of Electronic Documentation In Critical Care Nursing, Brent Alan Stevens

Walden Dissertations and Doctoral Studies

Electronic nursing documentation systems can facilitate complete, accurate, timely documentation practices, but without effective policies and procedures in place, a gap in practice exists and quality of care may be impacted. This systematic review of literature examined current evidence regarding electronic nursing documentation quality. General systems theory and the Donabedian model of health care quality provided the framework for the project. Electronic databases PubMed and the Cumulative Index of Nursing and Allied Health were searched for articles addressing electronic nursing documentation practices. The Cochrane systematic review methodology was used to analyze the articles. Articles were excluded if published before 2001 …


Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley Jan 2017

Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley

Walden Dissertations and Doctoral Studies

The cost of resolving user requests for IT assistance rises annually. Researchers have demonstrated that data warehouse analytic techniques can improve service, but they have not established the benefit of using global organizational data to reduce reported IT incidents. The purpose of this quantitative, quasi-experimental study was to examine the extent to which IT staff use of organizational knowledge generated from data warehouse analytical measures reduces the number of IT incidents over a 30-day period, as reported by global users of IT within an international pharmaceutical company headquartered in Germany. Organizational learning theory was used to approach the theorized relationship …


Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin Jan 2017

Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin

Walden Dissertations and Doctoral Studies

Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government …