Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Business

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams Jan 2023

The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams

Walden Dissertations and Doctoral Studies

The role that the information technology (IT) department serves is governed by the corporate culture and how it values the use of knowledge, including IT, to achieve a strategic competitive advantage. The purpose of this quantitative study was to examine the potential relationships between information acquisition, knowledge dissemination, shared interpretation, organizational memory, and organizational flexibility. Two theories served as the theoretical foundation for this study: contingency theory and the resource-based view of the firm. To answer the question of possible correlation between organizational flexibility and components of knowledge management, a randomly selected sample of 193 IT professionals employed at small- …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson Jan 2022

Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson

Walden Dissertations and Doctoral Studies

Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …


Effective Risk Management Strategies For Information Technology Project Managers, Amath Sarr Jan 2020

Effective Risk Management Strategies For Information Technology Project Managers, Amath Sarr

Walden Dissertations and Doctoral Studies

A high rate of information technology (IT) projects in the telecommunication industry fail because of ineffective risk management strategies. Effective risk management strategies are important to IT project managers for the improvement of project success rates. Grounded in the actor-network theory, the purpose of this qualitative multiple case study was to explore risk management strategies used by IT project managers in the telecommunication industry for improving project success rates. Data were collected using semistructured interviews and reviews of companies’ documentation on project risk management. The participants were 5 IT project managers in Dakar, Senegal, and had more than 8 years …


The Impact Of Technological Advances On Older Workers, Toni Mcintosh Jan 2020

The Impact Of Technological Advances On Older Workers, Toni Mcintosh

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was the treatment of older workers in the information technology industry that contributes to age discrimination in the workplace. Age discrimination is against the law irrespective of whether it is aimed at older workers in the workforce or becoming job candidates at an advanced age. Although previous research has shown that age discrimination is prevalent in work environments, little has been suggested to eradicate the issue in the workplace. The purpose of this qualitative case study was to investigate the issue of age discrimination as it relates to workers over the age of …


New Venture Modeling Strategies For Information Technology Business Startups, Jude Thomas Jan 2020

New Venture Modeling Strategies For Information Technology Business Startups, Jude Thomas

Walden Dissertations and Doctoral Studies

Information technology (IT) startup owners often lack new venture modeling strategies to sustain their businesses beyond 5 years. Information technology startup owners with backgrounds in software development, IT project management, and computer engineering need to know about the strategies discovered in the study to make operational, modeling, and project level decisions that ensure sustained organizational profitability. Grounded in Kim and Mauborgne's blue ocean theory, the purpose of this qualitative multiple case study was to explore new venture modeling strategies some information technology startup owners use to sustain their businesses beyond 5 years. Study participants comprised 3 IT startup business owners …


Small Business Strategies For Information Technology Implementation In Developing Countries, William Archibold Kwabiah Jan 2019

Small Business Strategies For Information Technology Implementation In Developing Countries, William Archibold Kwabiah

Walden Dissertations and Doctoral Studies

Leaders of small businesses need dynamic capabilities created through careful implementation of information technologies (ITs) to enhance efficiency, performance, and output. The purpose of this multicase study was to explore strategies leaders of small businesses used in developing countries to implement ITs for improved business performance. The framework for this study was the technology, organization, and environment model. The sample population consisted of 10 leaders of small businesses located in the Accra region of Ghana. The study participants had at least 5 years of experience working with small businesses that implemented IT. Data were collected from semistructured interviews and review …


Exploring Management Practices Of The Health Care System For Contractors, Gary L. Williams Jan 2018

Exploring Management Practices Of The Health Care System For Contractors, Gary L. Williams

Walden Dissertations and Doctoral Studies

Researchers have found that military members serving in war experienced changes in physical and mental health. Military members' healthcare is managed by the Department of Defense. The problem was that management practices of the system for providing long-term healthcare for employees of a contracting company working in foreign combat zones is either minimal or nonexistent. The purpose of this case study was to explore ways that contractor managers and government managers can work together to provide healthcare for those contract employees who will be deployed with the U.S. military. The primary research question was to determine what managers of contractors …


Strategies For E-Commerce Adoption In A Travel Agency, Anita Smith Jan 2018

Strategies For E-Commerce Adoption In A Travel Agency, Anita Smith

Walden Dissertations and Doctoral Studies

In 2016, online travel sales increased 8%, resulting in profits increasing to over 565 billion U.S. dollars. Traditional travel agencies in brick-and-mortar storefronts are facing challenges related to competing with online travel agencies (OTAs), attracting new customers, and retaining existing customers. The purpose of this qualitative case study was to explore the e-commerce processes, business models, and strategies that leaders of traditional travel agencies use to compete with OTAs. The study sample consisted of 8 travel professionals from 3 small travel agencies located in the mid-Atlantic region of the United States. The conceptual framework for this study was Rogers's diffusion …


A Qualitative Exploration Of The Security Practices Of Registered Nurses, Beth Ann Savage Jan 2017

A Qualitative Exploration Of The Security Practices Of Registered Nurses, Beth Ann Savage

Walden Dissertations and Doctoral Studies

Increased breach occurrences in healthcare cause concern for health information as reported by the Federal Government. Significant effort, regulations, and safeguards are in place to protect the systems used in the healthcare industry. Employee handling of security remains an area of vulnerability related to security protocols. The unified theory of acceptance and usage of technology (UTAUT) served as the model for this qualitative exploratory study with the purpose of understanding registered nurse (RN) perceptions and lived experiences related to IT security. Face-to-face interviews were conducted with 20 participants from the Three Rivers Chapter American Association Critical Care Nurses. Transcribed data …


Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster Jan 2017

Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster

Walden Dissertations and Doctoral Studies

The decision to implement information technology (IT) initiatives to enhance collaboration among veterans, baby boomers, Generation X, Generation Y, and Fifth Generation employees continues to challenge organizational leaders. The purpose of this nonexperimental study was to identify how the implementation of information technology initiatives, coupled with the knowledge of learning styles, might enhance collaboration among generational cohort employees. The generational cohort theory, Maslow's hierarchy of needs theory, and the technology acceptance model were the theoretical frameworks used to develop an understanding of the relationships among the cohorts and the acceptance of technology to enhance collaboration. Data were collected from a …


Strategies To Manage Enterprise Information Technology Projects, Mario West Jan 2017

Strategies To Manage Enterprise Information Technology Projects, Mario West

Walden Dissertations and Doctoral Studies

Since 2005, most midsize company information technology (IT) projects had a 62.4% failure rate because of wrong project team communication skills or cost overruns. IT leaders expect negative IT project outcomes will cost over $2 billion by 2020. Using the actor-network theory, the purpose of this single case study was to explore strategies used by IT leaders from a midsize IT company in Washington, D.C. to plan and execute projects under budget and on time. Using purposeful sampling, 5 IT leaders were selected for this study because of their experience in implementing successful strategies for projects. Data were collected using …


Effective Stakeholder Management Strategies For Information Technology Projects, Andrew Stephen Williams Jan 2017

Effective Stakeholder Management Strategies For Information Technology Projects, Andrew Stephen Williams

Walden Dissertations and Doctoral Studies

Information Technology (IT) projects have become critical to business strategy. However, one major issue is that, historically, IT projects have high failure rates, with scholars asserting that ineffective stakeholder management strategies were a major factor for project failure. The purpose of this multiple case study was to explore strategies IT executives use for managing IT project stakeholders by exploring the experiences of 2 CIOs and 4 IT directors in two multinational companies, based in Switzerland. Stakeholder theory was the conceptual framework for this study. Data were collected through semistructured interviews and company documentation, and analyzed using Yin's 5-step data analysis …


Project Risk Management Strategies For It Project Managers, John Stephen Cabral Jan 2017

Project Risk Management Strategies For It Project Managers, John Stephen Cabral

Walden Dissertations and Doctoral Studies

Utilizing information technology (IT) to enable new organizational capabilities to achieve near-term objectives and long-term sustainability is a top priority for many business leaders seeking to maintain or increase market share. However, organizational leaders face significant challenges to their strategy execution because the percentage of challenged IT projects has remained relatively static for decades. The purpose of this qualitative case study was to explore risk management strategies used by 7 purposely selected IT project managers (PMs) from a pharmaceutical company located in the northeastern United States who have effectively managed IT project performance by using risk management strategies, leading to …


Relationships Among Administrative Computerization, Hospital Size, And Administrative Expenses, Pamela J. Gallagher Jan 2016

Relationships Among Administrative Computerization, Hospital Size, And Administrative Expenses, Pamela J. Gallagher

Walden Dissertations and Doctoral Studies

The healthcare industry is computerizing administrative functions in an attempt to reduce expenses and remain competitive. This correlational study of 3,088 Medicare-certified, short-term, acute-care hospitals in the United States was based on a general systems theory framework; it sought to examine the relationships among the independent variables of hospital size and administrative computerization and the dependent variable of administrative expenses. Secondary data from Health Information Management Systems Society's surveys and cost reports from the Centers for Medicare and Medicaid services were used. Correlation analyses with an alpha of .05 were used to test 3 of the 4 hypotheses; regression analysis …


Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey Jan 2015

Communication Constructs That Influence Information Technology Project Failure, Vanessa Lajuan Ruth Mackey

Walden Dissertations and Doctoral Studies

Ineffective communication behavioral constructs in the workplace that lead to information technology (IT) project failure and in some cases organization failure are increasingly becoming a management concern. Despite this trend, there is little research on the communication behavioral constructs that contribute to IT project failure rates. The purpose of this phenomenological study was to explore the lived experiences of business analysts, programmers, and programmer analysts pertaining to the behavioral constructs associated with effective and ineffective communication. The research questions addressed these behaviors from a conceptual framework based on communication theory, organizational information processing theory, and critical social theory. This framework …