Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Management (3)
- Security (3)
- Analytics (2)
- Big Data (2)
- Big data (2)
-
- Electronic health records (2)
- ATM (1)
- Accountable care organizations (1)
- Adoption (1)
- Adoption of security analytics (1)
- Africa (1)
- Analytic extension (1)
- Analytic formulation (1)
- And operations;management sciences and quantitative methods (1)
- And operations;management sciences and quantitative methods;databases and information systems;library and information science (1)
- BI (1)
- Balanced Control Theory (1)
- Bar Code Medication Administration (1)
- Big data analytics (1)
- Big data security analytics (1)
- Biometrics (1)
- Business administration (1)
- CPOE alerts (1)
- Change management strategies (1)
- Clinical decision support (1)
- Cloud (1)
- Cloud adoption (1)
- Cloud decision-making (1)
- Cloud implementation strategies (1)
- Competitive Intelligence (1)
Articles 1 - 30 of 30
Full-Text Articles in Library and Information Science
Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly
Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly
Walden Dissertations and Doctoral Studies
Some information technology (IT) managers working for small businesses are struggling to monitor and deter cyberloafing. Strategies are needed to help IT practitioners to discourage cyberloafing and improve productivity while maintaining employee satisfaction. Grounded in adaptive structuration theory, the purpose of this qualitative multiple-case study was to explore strategies some small business IT managers use to monitor and deter cyberloafing. The participants were nine IT managers who successfully implemented cyberloafing monitoring and deterrence strategies in the United States. Data were collected via semistructured interviews and organization employee policy handbooks (n = 4) provided by the participants. Data were analyzed using …
Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu
Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu
Walden Dissertations and Doctoral Studies
Information technology (IT) employees of small business organizations have been the driving force for the implementation of innovative standardized IT service management and process improvement initiatives. Competitiveness amongst small business IT organizations in the market for quality IT service delivery led small business IT leaders toward the implementation of an information technology infrastructure library (ITIL) as an IT service management framework. The problem addressed in this research encompassed the needs of small business IT leaders and ITIL designers to understand the perceptions of IT operation employees following ITIL implementation. The purpose of this qualitative multiple case study was to explore …
Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii
Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii
Walden Dissertations and Doctoral Studies
Many data scientists are struggling to adopt effective data governance practices as they transition from traditional data analysis to big data analytics. Data governance of big data requires new strategies to deal with the volume, variety, and velocity attributes of big data. The purpose of this qualitative multiple case study was to explore big data governance strategies employed by data scientists to provide a holistic perspective of those data for making decisions. The participants were 10 data scientists employed in multiple mid-market companies in the greater Salt Lake City, Utah area who have strategies to govern big data. This studyâs …
Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove
Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove
Walden Dissertations and Doctoral Studies
Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …
Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon
Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon
Walden Dissertations and Doctoral Studies
The cyber threat landscape has led some cybersecurity leaders to focus on a holistic approach encompassing people, processes, and technology to make their government agencies and organizations more responsive to a more diverse and inclusive cyber workforce to protect critical infrastructure from hackers or cybercriminals intent on causing harm. This qualitative multiple case study used Schein’s organizational culture theory to explore strategies used by cybersecurity leaders to attract, recruit, and retain diverse cybersecurity professionals to effectively and efficiently protect sensitive systems from rising cyber threats. The study's population consisted of cybersecurity leaders from 3 government agencies and 9 organizations in …
Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde
Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde
Walden Dissertations and Doctoral Studies
Some financial institutions in Nigeria have not deployed strategies that mitigate cyber exploitation risks in the financial services industry. Financial institution leaders are concerned because cyber exploitation contributed to the reduction in the adult banking population to a low 38%. Grounded in the integrated systems theory of information security management, the purpose of this multiple case study was to explore strategies some financial institution leaders in Nigeria use to prevent cyber exploitations. The participants included 6 chief information security officers of 6 financial institutions. Data were collected from semistructured interviews and company and public documents. A thematic analysis identified themes …
Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten
Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten
Walden Dissertations and Doctoral Studies
Cloud computing adoption rates have not grown commensurate with several well-known and substantially tangible benefits such as horizontal distribution and reduced cost, the latter both in terms of infrastructure and specialized personnel. The lack of adoption presents a challenge to both service providers from a sales perspective and service consumers from a usability focus. The purpose of this quantitative correlational study utilizing the technological, organizational, and environmental framework was to examine the relationship between shared technology (ST), malicious insiders (MI), account hijacking, data leakage, data protection, service partner trust (SP), regulatory concerns and the key decision-makers intention to adopt cloud …
Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham
Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham
Walden Dissertations and Doctoral Studies
Consumer online activities can generate massive volumes of data that private companies may collect and use for business purposes. Consumer personal data need to be protected from unauthorized access and misuse. The specific problem is that consumers have little control regarding their data being collected and used by private companies. The purpose of this qualitative archival research was to explore business practices involving collection and use of consumer data without an individual’s consent. This study used the big data ethical conceptual framework to focus on various privacy issues, including those related to ownership, transparency, ethics, and consumer privacy laws. Archival …
Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias
Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias
Walden Dissertations and Doctoral Studies
Despite the increased cost of data breaches due to advanced, persistent threats from malicious sources, the adoption of big data security analytics among U.S. small businesses has been slow. Anchored in a diffusion of innovation theory, the purpose of this correlational study was to examine ways to increase the adoption of big data security analytics among small businesses in the United States by examining the relationship between small business leaders' perceptions of big data security analytics and their adoption. The research questions were developed to determine how to increase the adoption of big data security analytics, which can be measured …
Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe
Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe
Walden Dissertations and Doctoral Studies
In retail, the explosion of data sources and data has provided incentive to invest in information systems (IS), which enable leaders to understand the market and make timely decisions to improve performance. Given that users’ perceptions of IS affects their use of IS, understanding the factors influencing user acceptance is critical to acquiring an effective business intelligence system (BIS) for an organization. Grounded in the technology acceptance model theory, the purpose of this correlational study was to examine the relationship between perceived usefulness (PU), perceived ease of use (PEOU), and user acceptance of business intelligence systems (BIS) in retail organizations. …
Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey
Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey
Walden Dissertations and Doctoral Studies
There is a significant technology deficiency within the U.S. manufacturing industry compared to other countries. To adequately compete in the global market, lean manufacturing organizations in the United States need to look beyond their traditional methods of evaluating their processes to optimize their assembly cells for efficiency. Utilizing the task-technology fit theory this quantitative correlational study examined the relationships among software using probabilistic algorithms, lean methodology techniques, and manufacturer cell optimization results. Participants consisted of individuals performing the role of the systems analyst within a manufacturing organization using lean methodologies in the Southwestern United States. Data were collected from 118 …
User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim
User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim
Walden Dissertations and Doctoral Studies
The use of banking automated teller machine (ATM) technological innovations have significant importance and benefits in Nigeria, but numerous investigations have shown that illiterate and semiliterate Nigerians do not perceive them as useful or easy-to-use. Developing easy-to-use banking ATM system interfaces is essential to accommodate over 40% illiterate and semiliterate Nigerians, who are potential users of banking ATM systems. The purpose of this study was to identify strategies software developers of banking ATM systems in Nigeria use to create easy-to-use banking ATM system interfaces for a variety of people with varying abilities and literacy levels. The technology acceptance model was …
Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price
Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price
Walden Dissertations and Doctoral Studies
Telehealth and remote medical treatments have begun to be more commonly used in healthcare systems. Researchers have theorized that providers' abilities to treat patients are not directly tied to the proximity of the patient to the doctor, but by the identification and treatment of the patient's symptoms. Although the treatment and cure rates are being established within individual health systems and professional medical associations, empirical research is lacking regarding patient satisfaction with this remote treatment situation. The purpose of this quantitative study was to address this gap by examining satisfaction ratings of patients between virtual provider visits and face-to-face provider …
Black Business Owners Overcoming Barriers In Texas, Henry Williams
Black Business Owners Overcoming Barriers In Texas, Henry Williams
Walden Dissertations and Doctoral Studies
Black entrepreneurs in the state of Texas reported that they did not achieve the same level of success as nonminority enterprises. Many Black entrepreneurs have obtained education from top tier institutions and have the managerial experiences, skills, and working knowledge that facilitate business success, but they are not able to sustain business growth. The purpose of this phenomenological study was to explore the lived experiences of Black Texan entrepreneurs. This research was established using the conceptual framework of human capital. The overarching research question concerned the lived experiences of Black Texas entrepreneurs who were not as successful in business as …
Staff Education Module For Bar Code Medication Administration, Francoise Juste
Staff Education Module For Bar Code Medication Administration, Francoise Juste
Walden Dissertations and Doctoral Studies
Bar Code Medication Administration (BCMA) is a technology-supported nursing tool that has become the standard of practice for medication administration. When used effectively and efficiently, this tool has the potential to reduce medication errors in acute care settings. In a pediatric unit at a major urban hospital in the northeast region of the United States, the absence of a BCMA nursing staff educational module affected the use of this safety tool leading to an increase of medication errors. The purpose of this DNP project was to develop a comprehensive educational module to promote BCMA in the pediatric unit of the …
Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii
Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii
Walden Dissertations and Doctoral Studies
The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The …
Effect Of Early Exposure To Technology On Student Satisfaction With Online Education, Mohamed Boudalia
Effect Of Early Exposure To Technology On Student Satisfaction With Online Education, Mohamed Boudalia
Walden Dissertations and Doctoral Studies
U.S. student enrollment in online classes in the higher education sector has grown rapidly since 2001. Researchers have found that student satisfaction often leads to higher student retention, yet more research was needed to understand reasons for student satisfaction with online education. The purpose of this nonexperimental study was to examine the relationship between students' early exposure to technology (i.e., before college) and their satisfaction with online education in college. The unified theory of acceptance and use of technology were the theoretical framework. A convenience sample of 103 participants from the population of online students at colleges and universities in …
Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan
Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan
Walden Dissertations and Doctoral Studies
From 2006 to 2016, an estimated average of 50% of big data analytics and decision support projects failed to deliver acceptable and actionable outputs to business users. The resulting management inefficiency came with high cost, and wasted investments estimated at $2.7 trillion in 2016 for companies in the United States. The purpose of this quantitative descriptive study was to examine the data model of a typical data analytics project in a big data environment for opportunities to improve the information created for management problem-solving. The research questions focused on finding artifacts within enterprise data to model key business scenarios for …
Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley
Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley
Walden Dissertations and Doctoral Studies
The cost of resolving user requests for IT assistance rises annually. Researchers have demonstrated that data warehouse analytic techniques can improve service, but they have not established the benefit of using global organizational data to reduce reported IT incidents. The purpose of this quantitative, quasi-experimental study was to examine the extent to which IT staff use of organizational knowledge generated from data warehouse analytical measures reduces the number of IT incidents over a 30-day period, as reported by global users of IT within an international pharmaceutical company headquartered in Germany. Organizational learning theory was used to approach the theorized relationship …
Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin
Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin
Walden Dissertations and Doctoral Studies
Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government …
Exploring Leader-Initiated Change Management For Adopting Cloud Services, Nancy Marie Landreville
Exploring Leader-Initiated Change Management For Adopting Cloud Services, Nancy Marie Landreville
Walden Dissertations and Doctoral Studies
Cloud technology requires a virtualized ubiquitous and scalable environment with shared resources. The general problem in cloud adoption is the absence of standardization across organizations. A standardized approach remained elusive since the inception of the Cloud First mandate. The purpose of this study was to explore leader-initiated change management (LICM) practices in cloud adoption within organizations. The theoretical framework included the classical theories of Kurt Lewin's organization change management, leader-member exchange, intentional change, and appreciative inquiry. A multiple case study design approach facilitated the exploration of LICM-value added practices to identify standardization in cloud adoption practices. Data collection included semistructured …
The Impact Of Technology Acceptance And Openess To Innovaion On Software Implementation, Michael Marin Bertini
The Impact Of Technology Acceptance And Openess To Innovaion On Software Implementation, Michael Marin Bertini
Walden Dissertations and Doctoral Studies
Senior management decisions to foster innovation and adopt new technology solutions have serious implications for the success of their organization change initiatives. This project examined the issue of senior management decision or reasons of their decision to adopt new Enterprise Resource Planning (ERP) systems as a solution to solve their business problems. This project investigated the degree that perceived ease of use and usefulness of the ERP system influenced decisions made by senior managers to innovate. Roger's diffusion of innovations theory and Davis technology acceptance model theory were used to predict when senior managers were open to innovation, and whether …
Social Influence And Organizational Innovation Characteristics On Enterprise Social Computing Adoption, Vincent Di Palermo
Social Influence And Organizational Innovation Characteristics On Enterprise Social Computing Adoption, Vincent Di Palermo
Walden Dissertations and Doctoral Studies
Ample research has been conducted to identify the determinants of information technology (IT) adoption. No previous quantitative researchers have explored IT adoption in the context of enterprise social computing (ESC). The purpose of this study was to test and extend the social influence model of IT adoption. In addition, this study addressed a gap in the research literature and presented a model that relates the independent variables of social action, social consensus, social authority, social cooperation, perceived relative advantage, perceived compatibility, perceived ease of use, perceived usefulness, and organizational commitment to the dependent variables of social embracement and embedment. A …
Innovation Difussion Of Smartphone In Nigeria, Olukunle Ariyo Iyanda
Innovation Difussion Of Smartphone In Nigeria, Olukunle Ariyo Iyanda
Walden Dissertations and Doctoral Studies
Rapid diffusion and use of smartphones in Africa are challenging, given the state of its infrastructural facilities. The problem addressed was a lack of information on the adoption behavior and the sociodevelopmental effect of smartphone acceptance among rural and urban users in Nigeria. The purpose of this study was to examine the adoption behavior and the sociodevelopmental effect of smartphone acceptance among rural and urban residents. Research questions examined the relationship of performance expectancy, social influence, price value, and habit on adopters' intentions to use smartphones, continued use of smartphones, and the sociodevelopmental effect on smartphone users lives and standard …
Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr.
Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr.
Walden Dissertations and Doctoral Studies
Primary care physicians (PCPPs) have been slow to implement electronic health records (EHRs), even though there is a U.S. federal requirement to implement EHRs. The purpose of this phenomenological study was to determine why PCPPs have been slow to adopt electronic health record (EHR) systems despite the potential to increase efficiency and quality of health care. The complex adaptive systems theory (CAS) served as the conceptual framework for this study. Twenty-six PCPPs were interviewed from primary care practices (PCPs) based in southwestern Ohio. The data were collected through a semistructured interview format and analyzed using a modified van Kaam method. …
Assessing Clinical Software User Needs For Improved Clinical Decision Support Tools, Kimberly B. Denney
Assessing Clinical Software User Needs For Improved Clinical Decision Support Tools, Kimberly B. Denney
Walden Dissertations and Doctoral Studies
Consolidating patient and clinical data to support better-informed clinical decisions remains a primary function of electronic health records (EHRs). In the United States, nearly 6 million patients receive care from an accountable care organization (ACO). Knowledge of clinical decision support (CDS) tool design for use by physicians participating in ACOs remains limited. The purpose of this quantitative study was to examine whether a significant correlation exists between characteristics of alert content and alert timing (the independent variables) and physician perceptions of improved ACO quality measure adherence during electronic ordering (the dependent variable). Sociotechnical theory supported the theoretical framework for this …
Evaluating Success Factors In Implementing E-Maintenance In Maintenance, Repair, And Overhaul (Mro) Organizations, Peter Rocky Toves
Evaluating Success Factors In Implementing E-Maintenance In Maintenance, Repair, And Overhaul (Mro) Organizations, Peter Rocky Toves
Walden Dissertations and Doctoral Studies
Despite more than a decade-long process to transition aircraft maintenance practices from paper-to electronic-based systems, some organizations remain unable to complete this transition. Researchers have indicated that while organizations have invested resources in technology improvements, there remains a limited understanding of the factors that contribute to effectively managing technology-enabled change. The purpose of this case study was to identify and explore socio-technical (ST) factors that inhibit an effective transition from a paper-based system to an electronic-based system for aircraft maintenance. A conceptual model applying theories of change management, technology acceptance, systems thinking, and ST theory informed the research. Thirteen participants …
Data-Driven Decision Making As A Tool To Improve Software Development Productivity, Mary Erin Brown
Data-Driven Decision Making As A Tool To Improve Software Development Productivity, Mary Erin Brown
Walden Dissertations and Doctoral Studies
The worldwide software project failure rate, based on a survey of information technology software manager's view of user satisfaction, product quality, and staff productivity, is estimated to be between 24% and 36% and software project success has not kept pace with the advances in hardware. The problem addressed by this study was the limited information about software managers' experiences with data-driven decision making (DDD) in agile software organizations as a tool to improve software development productivity. The purpose of this phenomenological study was to explore how agile software managers view DDD as a tool to improve software development productivity and …
Asset Reuse Of Images From A Repository, Deirdre Herman
Asset Reuse Of Images From A Repository, Deirdre Herman
Walden Dissertations and Doctoral Studies
According to Markus's theory of reuse, when digital repositories are deployed to collect and distribute organizational assets, they supposedly help ensure accountability, extend information exchange, and improve productivity. Such repositories require a large investment due to the continuing costs of hardware, software, user licenses, training, and technical support. The problem addressed in this study was the lack of evidence in the literature on whether users in fact reused enough digital assets in repositories to justify the investment. The objective of the study was to investigate the organizational value of repositories to better inform architectural, construction, software and other industries whether …
A Fuzzy Hierarchical Decision Model And Its Application In Networking Datacenters And In Infrastructure Acquisitions And Design, Michael Khader
A Fuzzy Hierarchical Decision Model And Its Application In Networking Datacenters And In Infrastructure Acquisitions And Design, Michael Khader
Walden Dissertations and Doctoral Studies
According to several studies, an inordinate number of major business decisions to acquire, design, plan, and implement networking infrastructures fail. A networking infrastructure is a collaborative group of telecommunications systems providing services needed for a firm's operations and business growth. The analytical hierarchy process (AHP) is a well established decision-making process used to analyze decisions related to networking infrastructures. AHP is concerned with decomposing complex decisions into a set of factors and solutions. However, AHP has difficulties in handling uncertainty in decision information. This study addressed the research question of solutions to AHP deficiencies. The solutions were accomplished through the …