Open Access. Powered by Scholars. Published by Universities.®

Library and Information Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Library and Information Science

Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly Jan 2021

Strategies To Monitor And Deter Cyberloafing In Small Businesses: A Case Study, Veronica Pugh Dooly

Walden Dissertations and Doctoral Studies

Some information technology (IT) managers working for small businesses are struggling to monitor and deter cyberloafing. Strategies are needed to help IT practitioners to discourage cyberloafing and improve productivity while maintaining employee satisfaction. Grounded in adaptive structuration theory, the purpose of this qualitative multiple-case study was to explore strategies some small business IT managers use to monitor and deter cyberloafing. The participants were nine IT managers who successfully implemented cyberloafing monitoring and deterrence strategies in the United States. Data were collected via semistructured interviews and organization employee policy handbooks (n = 4) provided by the participants. Data were analyzed using …


The Power Of Exogenous Variables In Predicting West Nile Virus In South Carolina, Christopher Lee Glaze Jan 2021

The Power Of Exogenous Variables In Predicting West Nile Virus In South Carolina, Christopher Lee Glaze

Walden Dissertations and Doctoral Studies

Despite the availability of medical data, environmental surveillance tools, and heightened public awareness, West Nile Virus (WNv) remains a global health hazard. Reliable methods for predicting WNv outbreaks remain elusive, and environmental health managers must take preventive actions without the benefit of simple predictive tools. The purpose of this ex post facto research was to examine the accuracy and timeliness of exogenous data in predicting outbreaks of WNv in South Carolina. Decision theory, the CYNEFIN construct, and systems theory provided the theoretical framework for this study, allowing the researcher to broaden traditional decision theory concepts with powerful system-level precepts. Using …


Predictors Of Community Physicians’ Digital Information Retrieval At Point Of Care, Jumana Antoun Jan 2021

Predictors Of Community Physicians’ Digital Information Retrieval At Point Of Care, Jumana Antoun

Walden Dissertations and Doctoral Studies

Efficient digital information retrieval at the point of care is essential for better health care delivery. The problem is the lack of knowledge about the community physician’s digital information retrieval at the point of care. The purpose of this study was to examine the characteristics of the community physicians’ digital information retrieval at the point of care in eight Arab countries in the Eastern Mediterranean and whether a set of factors predicted the digital information retrieval. This study was guided by the Smith model that links professional digital practices to professional competencies, digital literacy, and technological affordances. The descriptive research …


Deterrence And Response Improvements For A Large-Scale Cyberterrorism Attack, Harrison Cunningham Jan 2021

Deterrence And Response Improvements For A Large-Scale Cyberterrorism Attack, Harrison Cunningham

Walden Dissertations and Doctoral Studies

A successful large-scale cyberterrorism attack has never been conducted against the United States, yet cyberterrorism is a real and evolving threat. The United States assumes a largely defensive posture toward the thousands of daily cyberattacks conducted against the country, allowing cyberterrorists to probe and execute cyberattacks with broad impunity. The United States would most likely respond to a successful large-scale cyberterrorism attack within a framework of regulations concerning physical acts of terrorism since no policy exists on how to respond to major cyberterrorism attacks. The purpose of this qualitative study was to explore the perceptions of U.S. terrorism and cybersecurity …