Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 35

Full-Text Articles in Library and Information Science

Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall Jan 2023

Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall

Walden Dissertations and Doctoral Studies

Finance and information technology scholars wrote that there is a literature gap on what factors drive investors in Western financial markets to use a Robo-advisor to manage their investments. The purpose of this qualitative, single case study with embedded units is to understand the adoption intentions of retail investors in U.S. markets to use a Robo-advisor instead of a human advisor. A single case study design addressed the literature gap, and qualitative data from seven semi=structured interviews, reflective field notes, and archival data were triangulated to answer the research question. This study was grounded in a theoretical framework that includes …


Strategies Information Technology Managers Use To Retain Qualified Information Technology Employees, Wayne Arnold Reu Jan 2023

Strategies Information Technology Managers Use To Retain Qualified Information Technology Employees, Wayne Arnold Reu

Walden Dissertations and Doctoral Studies

Retaining qualified information technology (IT) personnel can take time and effort, given the high demand for skilled positions. Business leaders are concerned with the high turnover of IT employees because of the cost of recruiting and training personnel and the disruption to organizational processes and performance. Grounded in job characteristics theory, the purpose of this qualitative pragmatic inquiry was to explore IT managers' strategies to retain qualified IT employees in organizations across the southwestern United States. Eight IT leaders participated because of their years of experience implementing strategies to retain qualified IT professionals. Data were collected using semistructured interviews and …


Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore Jan 2023

Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore

Walden Dissertations and Doctoral Studies

Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …


Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore Jan 2023

Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore

Walden Dissertations and Doctoral Studies

Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …


Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall Jan 2023

Understanding U.S. Customers' Intention To Adopt Robo-Advisor Technology, Deborah Wall

Walden Dissertations and Doctoral Studies

Finance and information technology scholars wrote that there is a literature gap on what factors drive investors in Western financial markets to use a Robo-advisor to manage their investments. The purpose of this qualitative, single case study with embedded units is to understand the adoption intentions of retail investors in U.S. markets to use a Robo-advisor instead of a human advisor. A single case study design addressed the literature gap, and qualitative data from seven semi=structured interviews, reflective field notes, and archival data were triangulated to answer the research question. This study was grounded in a theoretical framework that includes …


Examination Of Strategies To Implementing Chip-And-Personal Identification Number Credit Card Authentication Infrastructures, Neville Arthur Gallimore Jan 2022

Examination Of Strategies To Implementing Chip-And-Personal Identification Number Credit Card Authentication Infrastructures, Neville Arthur Gallimore

Walden Dissertations and Doctoral Studies

Chip-and-Personal Identification Number (PIN) technology is seen as a game changer in many e-commerce industries and a transformational technology in the 21st century. However, security concerns have made chip-and-PIN adoption relatively slow. Massive unauthorized card payment transactions in the United States (U.S.) cost victims an estimate totaling billions of dollars. Information Technology (IT) managers are concerned with credit card fraud's financial loss and liability cost. Grounded in Rogers’s diffusion of innovation theory, the purpose of this qualitative pragmatic study was to explore strategies used by IT managers to transition their e-commerce organizations to chip-and-PIN credit card authentication infrastructures. The participants …


Modernization Of Legacy Information Technology Systems, Rabie Khabouze Jan 2022

Modernization Of Legacy Information Technology Systems, Rabie Khabouze

Walden Dissertations and Doctoral Studies

Large enterprises spend a large portion of their Information Technology (IT) budget on maintaining their legacy systems. Legacy systems modernization projects are a catalyst for IT architects to save cost, provide new and efficient systems that increase profitability, and create value for their organization. Grounded in sociotechnical systems theory, the purpose of this qualitative multiple case study was to explore strategies IT architects use to modernize their legacy systems. The population included IT architects in large enterprises involved in legacy systems modernization projects, one in healthcare, and one in the financial services industry in the San Antonio-New Braunfels, Texas metropolitan …


Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly Jan 2021

Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly

Walden Dissertations and Doctoral Studies

Some information technology (IT) managers working for small businesses are struggling to monitor and deter cyberloafing. Strategies are needed to help IT practitioners to discourage cyberloafing and improve productivity while maintaining employee satisfaction. Grounded in adaptive structuration theory, the purpose of this qualitative multiple-case study was to explore strategies some small business IT managers use to monitor and deter cyberloafing. The participants were nine IT managers who successfully implemented cyberloafing monitoring and deterrence strategies in the United States. Data were collected via semistructured interviews and organization employee policy handbooks (n = 4) provided by the participants. Data were analyzed using …


Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu Jan 2020

Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu

Walden Dissertations and Doctoral Studies

Information technology (IT) employees of small business organizations have been the driving force for the implementation of innovative standardized IT service management and process improvement initiatives. Competitiveness amongst small business IT organizations in the market for quality IT service delivery led small business IT leaders toward the implementation of an information technology infrastructure library (ITIL) as an IT service management framework. The problem addressed in this research encompassed the needs of small business IT leaders and ITIL designers to understand the perceptions of IT operation employees following ITIL implementation. The purpose of this qualitative multiple case study was to explore …


Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon Jan 2020

Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon

Walden Dissertations and Doctoral Studies

The cyber threat landscape has led some cybersecurity leaders to focus on a holistic approach encompassing people, processes, and technology to make their government agencies and organizations more responsive to a more diverse and inclusive cyber workforce to protect critical infrastructure from hackers or cybercriminals intent on causing harm. This qualitative multiple case study used Schein’s organizational culture theory to explore strategies used by cybersecurity leaders to attract, recruit, and retain diverse cybersecurity professionals to effectively and efficiently protect sensitive systems from rising cyber threats. The study's population consisted of cybersecurity leaders from 3 government agencies and 9 organizations in …


Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove Jan 2020

Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove

Walden Dissertations and Doctoral Studies

Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …


Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham Jan 2020

Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham

Walden Dissertations and Doctoral Studies

Consumer online activities can generate massive volumes of data that private companies may collect and use for business purposes. Consumer personal data need to be protected from unauthorized access and misuse. The specific problem is that consumers have little control regarding their data being collected and used by private companies. The purpose of this qualitative archival research was to explore business practices involving collection and use of consumer data without an individual’s consent. This study used the big data ethical conceptual framework to focus on various privacy issues, including those related to ownership, transparency, ethics, and consumer privacy laws. Archival …


Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten Jan 2020

Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten

Walden Dissertations and Doctoral Studies

Cloud computing adoption rates have not grown commensurate with several well-known and substantially tangible benefits such as horizontal distribution and reduced cost, the latter both in terms of infrastructure and specialized personnel. The lack of adoption presents a challenge to both service providers from a sales perspective and service consumers from a usability focus. The purpose of this quantitative correlational study utilizing the technological, organizational, and environmental framework was to examine the relationship between shared technology (ST), malicious insiders (MI), account hijacking, data leakage, data protection, service partner trust (SP), regulatory concerns and the key decision-makers intention to adopt cloud …


Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde Jan 2020

Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde

Walden Dissertations and Doctoral Studies

Some financial institutions in Nigeria have not deployed strategies that mitigate cyber exploitation risks in the financial services industry. Financial institution leaders are concerned because cyber exploitation contributed to the reduction in the adult banking population to a low 38%. Grounded in the integrated systems theory of information security management, the purpose of this multiple case study was to explore strategies some financial institution leaders in Nigeria use to prevent cyber exploitations. The participants included 6 chief information security officers of 6 financial institutions. Data were collected from semistructured interviews and company and public documents. A thematic analysis identified themes …


Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii Jan 2020

Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii

Walden Dissertations and Doctoral Studies

Many data scientists are struggling to adopt effective data governance practices as they transition from traditional data analysis to big data analytics. Data governance of big data requires new strategies to deal with the volume, variety, and velocity attributes of big data. The purpose of this qualitative multiple case study was to explore big data governance strategies employed by data scientists to provide a holistic perspective of those data for making decisions. The participants were 10 data scientists employed in multiple mid-market companies in the greater Salt Lake City, Utah area who have strategies to govern big data. This study’s …


Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey Jan 2019

Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey

Walden Dissertations and Doctoral Studies

There is a significant technology deficiency within the U.S. manufacturing industry compared to other countries. To adequately compete in the global market, lean manufacturing organizations in the United States need to look beyond their traditional methods of evaluating their processes to optimize their assembly cells for efficiency. Utilizing the task-technology fit theory this quantitative correlational study examined the relationships among software using probabilistic algorithms, lean methodology techniques, and manufacturer cell optimization results. Participants consisted of individuals performing the role of the systems analyst within a manufacturing organization using lean methodologies in the Southwestern United States. Data were collected from 118 …


Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe Jan 2019

Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe

Walden Dissertations and Doctoral Studies

In retail, the explosion of data sources and data has provided incentive to invest in information systems (IS), which enable leaders to understand the market and make timely decisions to improve performance. Given that users’ perceptions of IS affects their use of IS, understanding the factors influencing user acceptance is critical to acquiring an effective business intelligence system (BIS) for an organization. Grounded in the technology acceptance model theory, the purpose of this correlational study was to examine the relationship between perceived usefulness (PU), perceived ease of use (PEOU), and user acceptance of business intelligence systems (BIS) in retail organizations. …


Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias Jan 2019

Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias

Walden Dissertations and Doctoral Studies

Despite the increased cost of data breaches due to advanced, persistent threats from malicious sources, the adoption of big data security analytics among U.S. small businesses has been slow. Anchored in a diffusion of innovation theory, the purpose of this correlational study was to examine ways to increase the adoption of big data security analytics among small businesses in the United States by examining the relationship between small business leaders' perceptions of big data security analytics and their adoption. The research questions were developed to determine how to increase the adoption of big data security analytics, which can be measured …


Black Business Owners Overcoming Barriers In Texas, Henry Williams Jan 2018

Black Business Owners Overcoming Barriers In Texas, Henry Williams

Walden Dissertations and Doctoral Studies

Black entrepreneurs in the state of Texas reported that they did not achieve the same level of success as nonminority enterprises. Many Black entrepreneurs have obtained education from top tier institutions and have the managerial experiences, skills, and working knowledge that facilitate business success, but they are not able to sustain business growth. The purpose of this phenomenological study was to explore the lived experiences of Black Texan entrepreneurs. This research was established using the conceptual framework of human capital. The overarching research question concerned the lived experiences of Black Texas entrepreneurs who were not as successful in business as …


Effect Of Early Exposure To Technology On Student Satisfaction With Online Education, Mohamed Boudalia Jan 2018

Effect Of Early Exposure To Technology On Student Satisfaction With Online Education, Mohamed Boudalia

Walden Dissertations and Doctoral Studies

U.S. student enrollment in online classes in the higher education sector has grown rapidly since 2001. Researchers have found that student satisfaction often leads to higher student retention, yet more research was needed to understand reasons for student satisfaction with online education. The purpose of this nonexperimental study was to examine the relationship between students' early exposure to technology (i.e., before college) and their satisfaction with online education in college. The unified theory of acceptance and use of technology were the theoretical framework. A convenience sample of 103 participants from the population of online students at colleges and universities in …


Staff Education Module For Bar Code Medication Administration, Francoise Juste Jan 2018

Staff Education Module For Bar Code Medication Administration, Francoise Juste

Walden Dissertations and Doctoral Studies

Bar Code Medication Administration (BCMA) is a technology-supported nursing tool that has become the standard of practice for medication administration. When used effectively and efficiently, this tool has the potential to reduce medication errors in acute care settings. In a pediatric unit at a major urban hospital in the northeast region of the United States, the absence of a BCMA nursing staff educational module affected the use of this safety tool leading to an increase of medication errors. The purpose of this DNP project was to develop a comprehensive educational module to promote BCMA in the pediatric unit of the …


User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim Jan 2018

User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim

Walden Dissertations and Doctoral Studies

The use of banking automated teller machine (ATM) technological innovations have significant importance and benefits in Nigeria, but numerous investigations have shown that illiterate and semiliterate Nigerians do not perceive them as useful or easy-to-use. Developing easy-to-use banking ATM system interfaces is essential to accommodate over 40% illiterate and semiliterate Nigerians, who are potential users of banking ATM systems. The purpose of this study was to identify strategies software developers of banking ATM systems in Nigeria use to create easy-to-use banking ATM system interfaces for a variety of people with varying abilities and literacy levels. The technology acceptance model was …


Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price Jan 2018

Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price

Walden Dissertations and Doctoral Studies

Telehealth and remote medical treatments have begun to be more commonly used in healthcare systems. Researchers have theorized that providers' abilities to treat patients are not directly tied to the proximity of the patient to the doctor, but by the identification and treatment of the patient's symptoms. Although the treatment and cure rates are being established within individual health systems and professional medical associations, empirical research is lacking regarding patient satisfaction with this remote treatment situation. The purpose of this quantitative study was to address this gap by examining satisfaction ratings of patients between virtual provider visits and face-to-face provider …


Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan Jan 2018

Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan

Walden Dissertations and Doctoral Studies

From 2006 to 2016, an estimated average of 50% of big data analytics and decision support projects failed to deliver acceptable and actionable outputs to business users. The resulting management inefficiency came with high cost, and wasted investments estimated at $2.7 trillion in 2016 for companies in the United States. The purpose of this quantitative descriptive study was to examine the data model of a typical data analytics project in a big data environment for opportunities to improve the information created for management problem-solving. The research questions focused on finding artifacts within enterprise data to model key business scenarios for …


Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii Jan 2018

Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii

Walden Dissertations and Doctoral Studies

The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The …


Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley Jan 2017

Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley

Walden Dissertations and Doctoral Studies

The cost of resolving user requests for IT assistance rises annually. Researchers have demonstrated that data warehouse analytic techniques can improve service, but they have not established the benefit of using global organizational data to reduce reported IT incidents. The purpose of this quantitative, quasi-experimental study was to examine the extent to which IT staff use of organizational knowledge generated from data warehouse analytical measures reduces the number of IT incidents over a 30-day period, as reported by global users of IT within an international pharmaceutical company headquartered in Germany. Organizational learning theory was used to approach the theorized relationship …


Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin Jan 2017

Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin

Walden Dissertations and Doctoral Studies

Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government …


Social Influence And Organizational Innovation Characteristics On Enterprise Social Computing Adoption, Vincent Di Palermo Jan 2016

Social Influence And Organizational Innovation Characteristics On Enterprise Social Computing Adoption, Vincent Di Palermo

Walden Dissertations and Doctoral Studies

Ample research has been conducted to identify the determinants of information technology (IT) adoption. No previous quantitative researchers have explored IT adoption in the context of enterprise social computing (ESC). The purpose of this study was to test and extend the social influence model of IT adoption. In addition, this study addressed a gap in the research literature and presented a model that relates the independent variables of social action, social consensus, social authority, social cooperation, perceived relative advantage, perceived compatibility, perceived ease of use, perceived usefulness, and organizational commitment to the dependent variables of social embracement and embedment. A …


Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr. Jan 2016

Adoption Of Electronic Health Record Systems Within Primary Care Practices, Marvin Leon Reid, Jr.

Walden Dissertations and Doctoral Studies

Primary care physicians (PCPPs) have been slow to implement electronic health records (EHRs), even though there is a U.S. federal requirement to implement EHRs. The purpose of this phenomenological study was to determine why PCPPs have been slow to adopt electronic health record (EHR) systems despite the potential to increase efficiency and quality of health care. The complex adaptive systems theory (CAS) served as the conceptual framework for this study. Twenty-six PCPPs were interviewed from primary care practices (PCPs) based in southwestern Ohio. The data were collected through a semistructured interview format and analyzed using a modified van Kaam method. …


Exploring Leader-Initiated Change Management For Adopting Cloud Services, Nancy Marie Landreville Jan 2016

Exploring Leader-Initiated Change Management For Adopting Cloud Services, Nancy Marie Landreville

Walden Dissertations and Doctoral Studies

Cloud technology requires a virtualized ubiquitous and scalable environment with shared resources. The general problem in cloud adoption is the absence of standardization across organizations. A standardized approach remained elusive since the inception of the Cloud First mandate. The purpose of this study was to explore leader-initiated change management (LICM) practices in cloud adoption within organizations. The theoretical framework included the classical theories of Kurt Lewin's organization change management, leader-member exchange, intentional change, and appreciative inquiry. A multiple case study design approach facilitated the exploration of LICM-value added practices to identify standardization in cloud adoption practices. Data collection included semistructured …