Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Management (21)
- Information Technology (19)
- Project Management (15)
- Information technology (12)
- Business administration (10)
-
- Strategies (10)
- Leadership (9)
- Cybersecurity (8)
- Innovation (7)
- Small Business (6)
- Technology (6)
- Healthcare (5)
- Information security (5)
- And operations;management sciences and quantitative methods (4)
- Competitive Advantage (4)
- E-commerce (4)
- Entrepreneurship (4)
- ICT (4)
- Knowledge Management (4)
- Manufacturing (4)
- Project management (4)
- Sustainability (4)
- Absorptive Capacity (3)
- Adoption (3)
- And operations;management sciences and quantitative methods;databases and information systems (3)
- Cloud (3)
- Communication (3)
- Data breaches (3)
- Human Resources (3)
- Information Security (3)
Articles 1 - 30 of 184
Full-Text Articles in Business
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Walden Dissertations and Doctoral Studies
Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …
How It Professionals Acquire Soft Skills, Paul Majett
How It Professionals Acquire Soft Skills, Paul Majett
Walden Dissertations and Doctoral Studies
AbstractIn this study, I investigated how information technology (IT) professionals learn/acquire soft skills. Little is understood about how IT professionals describe and apply the soft skills that they consider necessary for their own employability. Exploring how IT professionals describe and apply soft skills is important to their future work and career advancement. The purpose of this basic qualitative study was to better understand how IT professionals learn/acquire soft skills. Bandura’s 1986, social learning theory served as the organizational conceptual framework of this study and guided the research question, which asked how IT professionals acquire learn/acquire soft skills. This research question …
Strategies To Increase Competitive Advantage In The Automotive Manufacturing Supply Chain, Amber Willis
Strategies To Increase Competitive Advantage In The Automotive Manufacturing Supply Chain, Amber Willis
Walden Dissertations and Doctoral Studies
Some automotive manufacturing supply chain leaders lack strategies that are needed to implement information technology (IT) systems. Business leaders are concerned with implementing IT systems to achieve and maintain a competitive advantage. Grounded in the resource-based view theory (RBV), the purpose of this qualitative single case study was to explore information system strategies used by leaders in the automotive manufacturing supply chain to achieve competitive advantage. Participants were five leaders of an automotive manufacturing supply chain organization who implemented IT systems. Data were collected through semistructured interviews and a review of organization project documents. Through thematic analysis, five themes were …
Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei
Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei
Walden Dissertations and Doctoral Studies
Small- and medium-sized enterprise (SME) manufacturing executives and managers are concerned with the rapid technological changes involving artificial intelligence (AI), machine learning, and big data. To compete in the global landscape, effectively managing digital and artificial intelligence changes among SME manufacturing executives and managers is critical for leaders to compete in 2023 and beyond. Grounded in the dynamic capabilities view theory, the purpose of this quantitative correlation study was to examine the relationship between strategic dexterity, absorptive capacity, and competitive advantage. The participants were 66 executives and managers of SME manufacturing organizations who use big data and analytics daily and …
Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law
Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law
Walden Dissertations and Doctoral Studies
Small business owners who lack effective strategies to incorporate telecommuting may be unable to retain teleworking employees, create a flexible working environment, or improve workforce morale, negatively impacting company productivity and profitability. Grounded in transformational leadership theory and sociotechnical systems theory, the purpose of this qualitative multiple case study was to explore strategies small business owners use to incorporate telecommuting to retain teleworking employees. Data were collected from five small business owners in Texas with at least 1 year of management experience and created and maintained remote working strategies. Data collection included semistructured interviews and company documents. Three themes emerged …
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Walden Dissertations and Doctoral Studies
All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …
Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei
Relationship Between Strategic Dexterity, Absorptive Capacity, And Competitive Advantage, Ifechide Monyei
Walden Dissertations and Doctoral Studies
Small- and medium-sized enterprise (SME) manufacturing executives and managers are concerned with the rapid technological changes involving artificial intelligence (AI), machine learning, and big data. To compete in the global landscape, effectively managing digital and artificial intelligence changes among SME manufacturing executives and managers is critical for leaders to compete in 2023 and beyond. Grounded in the dynamic capabilities view theory, the purpose of this quantitative correlation study was to examine the relationship between strategic dexterity, absorptive capacity, and competitive advantage. The participants were 66 executives and managers of SME manufacturing organizations who use big data and analytics daily and …
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda
Walden Dissertations and Doctoral Studies
All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo
Walden Dissertations and Doctoral Studies
Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …
The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams
The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams
Walden Dissertations and Doctoral Studies
The role that the information technology (IT) department serves is governed by the corporate culture and how it values the use of knowledge, including IT, to achieve a strategic competitive advantage. The purpose of this quantitative study was to examine the potential relationships between information acquisition, knowledge dissemination, shared interpretation, organizational memory, and organizational flexibility. Two theories served as the theoretical foundation for this study: contingency theory and the resource-based view of the firm. To answer the question of possible correlation between organizational flexibility and components of knowledge management, a randomly selected sample of 193 IT professionals employed at small- …
Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law
Effective Strategies For Using Telecommuting By Owners Of Small Businesses, Thomas Law
Walden Dissertations and Doctoral Studies
Small business owners who lack effective strategies to incorporate telecommuting may be unable to retain teleworking employees, create a flexible working environment, or improve workforce morale, negatively impacting company productivity and profitability. Grounded in transformational leadership theory and sociotechnical systems theory, the purpose of this qualitative multiple case study was to explore strategies small business owners use to incorporate telecommuting to retain teleworking employees. Data were collected from five small business owners in Texas with at least 1 year of management experience and created and maintained remote working strategies. Data collection included semistructured interviews and company documents. Three themes emerged …
Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte
Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte
Walden Dissertations and Doctoral Studies
Small businesses are the foundation of an economy and spawn innovation, but small business owners fail at an alarming rate because they lack strategies to sustain business operations. Since 50% of small businesses fail within the first 5 years, small business sustainability research is critical to support small business owners. Grounded in entrepreneurial theory, the purpose of this multiple case study was to identify strategies information technology (IT) small business owners use to sustain operation beyond the first 5 years. The participants included four IT small business owners in the Southwestern United States who sustained operations beyond the first 5 …
Successful Strategies For Adopting Electronic Medical Records Systems At Hospitals, Vazi Okhandiar
Successful Strategies For Adopting Electronic Medical Records Systems At Hospitals, Vazi Okhandiar
Walden Dissertations and Doctoral Studies
Some healthcare leaders lack strategies to successfully implement electronic medical record (EMR) systems to improve patient care efficiency and effectiveness. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore strategies healthcare leaders use to implement EMR systems. The participants comprised five healthcare leaders who implemented EMRs in U.S. hospitals. Data were collected using semistructured interviews, government websites, and relevant documents and analyzed using Yin’s five-step data analysis method. Three themes emerged: (a) adequate training, (b) workflow analysis, and (c) technical support. A key recommendation is for management to provide customized training to …
Strategies Business Leaders Use To Mitigate Online Credit Card Fraud, Clarissa Rosario-Tavarez
Strategies Business Leaders Use To Mitigate Online Credit Card Fraud, Clarissa Rosario-Tavarez
Walden Dissertations and Doctoral Studies
Online credit card fraud targeting banks, customers, and businesses costs millions of U.S. dollars annually. Online business leaders face challenges securing and regulating the online payment processing environment. Grounded in the situational crime prevention theory, the purpose of this qualitative multiple case study was to explore strategies online business leaders use to mitigate the loss of revenue caused by online credit card fraud. The participants comprised five online business leaders of an organization in the Southwest of the United States, who implemented strategies that successfully mitigated revenue losses due to online credit card fraud. The data were collected from semistructured …
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Walden Dissertations and Doctoral Studies
Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …
Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao
Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao
Walden Dissertations and Doctoral Studies
User Experience (UX) design improvement can alter business results. Information technology (IT) company leaders are concerned with UX design improvement, as it is the number one indication of product innovation success and user satisfaction. Grounded in Christensen’s disruptive innovation theory, the purpose of the qualitative single case study was to explore strategies IT company leaders and UX designers used to identify critical UX design elements that lead to improved product innovations. The participants were five IT company leaders and a focus group of four UX designers employed by a sizeable telecom organization in Beijing, China. The data were collected from …
Enterprise Resource Planning Implementation Strategies In Small- And Medium-Sized Manufacturing Enterprises, Tatianna Gilliam
Enterprise Resource Planning Implementation Strategies In Small- And Medium-Sized Manufacturing Enterprises, Tatianna Gilliam
Walden Dissertations and Doctoral Studies
The difficulty SME leaders of manufacturing firms experience in the executing of enterprise resource planning (ERP) systems threatens the longevity of innovative change within firms seeking to adopt ERP systems. Grounded in the diffusion of innovation theory, the purpose of this multiple case study was to examine critical success factors used to successfully implement ERP systems. The participants were four ERP business leaders of small to medium size manufacturing firms based on the east and west coasts of the United States. Data were collected using semistructured online interviews and a review of company documents. Through thematic analysis, five themes were …
Strategies For Small-And Medium-Sized Business Growth And Survival, Abiodun Nestamanuel Ogunmuyiwa
Strategies For Small-And Medium-Sized Business Growth And Survival, Abiodun Nestamanuel Ogunmuyiwa
Walden Dissertations and Doctoral Studies
In the United States, approximately 50% of small businesses fail within the first five years (Small Business Administration, 2018b). Small and medium sized enterprises (SMEs) owners and managers would benefit from strategies to identify and mitigate constraints to sustain their business beyond the first five years of business operation. Grounded in the system theory framework, the purpose of this qualitative multiple case study was to explore strategies leaders of small and medium sized enterprises (SMEs) in Austin, Texas, used to grow and sustain their business’s operations beyond five years. The participants were five small and medium sized businesses owners in …
Strategies For Cryptocurrency Adoption In Contemporary Businesses, Jacqueline Rodriguez
Strategies For Cryptocurrency Adoption In Contemporary Businesses, Jacqueline Rodriguez
Walden Dissertations and Doctoral Studies
Millions of Bitcoin transactions occur daily, worth nearly $2 billion annually. With the proliferation of cryptocurrency markets, the reluctance to adopt the currency as an alternate payment method could cause businesses to forgo growth opportunities within this expanding market. Grounded in the diffusion of innovation theory, the purpose of this qualitative multiple-case study was to explore strategies business leaders use to respond to the alternative payment concerns perpetuated by cryptocurrency markets. The participants comprised 6 business leaders who effectively employed cryptocurrency adoption strategies. Data were collected through semistructured interviews, corporate documents, and other company social media resources. Thematic analysis of …
Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith
Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith
Walden Dissertations and Doctoral Studies
Business leaders do not often consider investing in informational technology (IT) to increase performance. These business leaders lack knowledge of innovative IT adoption strategies to expand their revenue and reduce costs to sustain a competitive advantage. Grounded in the technology-organization-environment (TOE) theory, the purpose of this qualitative multiple case study was to explore IT innovation adoption strategies business leaders use to increase performance. The participants were four successful business leaders selected from finalists for international entrepreneurial awards presented annually in the Mid-Atlantic region of the United States. The data were collected using semistructured telephone interviews, media releases, and online publications. …
Increasing Nurse Leader Knowledge And Awareness Of Information And Communication Technologies, Cory Stephens
Increasing Nurse Leader Knowledge And Awareness Of Information And Communication Technologies, Cory Stephens
Walden Dissertations and Doctoral Studies
Due to the recent coronavirus disease (COVID-19) pandemic, rapid technological innovation and nursing practice transformation exposed a deepening divide in the knowledge and awareness of information and communication technologies (ICT) among nurses. This technological skills gap undermines the benefits of ICT to nursing practice such as increased nurse satisfaction, improved care quality, and reduced costs. Nurse leaders are positioned to promote the use of ICT among nurses but may suffer from the same knowledge deficit of ICT as their followers. Guided by Locsin’s technological competencies as caring in nursing theory, Staggers and Parks’ nurse-computer interaction framework, and Covell’s nursing intellectual …
Strategies For Cybercrime Prevention In Information Technology Businesses, Sophfronia G. Tucker
Strategies For Cybercrime Prevention In Information Technology Businesses, Sophfronia G. Tucker
Walden Dissertations and Doctoral Studies
Cybercrime continues to be a devastating phenomenon, impacting individuals and businesses across the globe. Information technology (IT) businesses need solutions to defend and secure their data and networks from cyberattacks. Grounded in general systems theory and transformational leadership theory, the purpose of this qualitative multiple case study was to explore strategies IT business leaders use to protect their systems from a cyberattack. The participants included six IT business leaders with experience in cybersecurity or system security in the Midlands region of South Carolina. Data were collected using semistructured interviews and reviews of government standards documents; data were analyzed using thematic …
Employee Training Strategies For New Technology Implementation In Small Business, Eddy Varela
Employee Training Strategies For New Technology Implementation In Small Business, Eddy Varela
Walden Dissertations and Doctoral Studies
Failure to implement new technology creates a barrier to success for small businesses. Small business owners must create competitive advantages by implementing new technology as there is a need to maintain an advantage when competing in the local market economy. Grounded in the human capital theory, the purpose of this qualitative multiple case study was to explore the employee training strategies small business owners use to implement new technology. The participants were five small business owners in Central Florida who used employee training strategies to implement new technologies Data were collected using (a) semistructured interviews, (b) member checking interviews, (c) …
Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams
Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams
Walden Dissertations and Doctoral Studies
Information technology infrastructure library (ITIL) business leaders lack strategies for implementing critical success factors (CSFs) to promote organizational effectiveness and project success. As a result, ITIL leaders may experience less project success if CSF strategies are not effectively implemented. Grounded in the balanced scorecard (BSC) theory, this qualitative multiple case study aimed to explore strategies ITIL business leaders use to implement CSFs successfully to improve organizational efficiency for project success. The participants comprised five ITIL business leaders in the financial industry located in the southwestern region of the United States who successfully implemented strategies to implement CSFs to improve organizational …
Consumers Perspectives On Using Biometric Technology With Mobile Banking, Rodney Alston Clark
Consumers Perspectives On Using Biometric Technology With Mobile Banking, Rodney Alston Clark
Walden Dissertations and Doctoral Studies
The need for applying biometric technology in mobile banking is increasing due to emerging security issues, and many banks’ chief executive officers have integrated biometric solutions into their mobile application protocols to address these evolving security risks. This quantitative study was performed to evaluate how the opinions and beliefs of banking customers in the Mid-Atlantic region of the United States might influence their adoption of mobile banking applications that included biometric technology. The research question was designed to explore how performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC), perceived credibility (PC), and task-technology fit (TTF) affected …
A Multicase Study Of Critical Success Factors Of Self-Service Business Intelligence Initiatives, Eva Shepherd
A Multicase Study Of Critical Success Factors Of Self-Service Business Intelligence Initiatives, Eva Shepherd
Walden Dissertations and Doctoral Studies
Information technology (IT) managers have sparse information on the critical success factors (CSFs) needed for self-service business intelligence (SSBI) initiatives among casual users. The purpose of this qualitative, multicase study was to describe Business Intelligence (BI) experts’ views on the CSFs needed for self-service BI initiatives among casual users in the post-implementation stage. To meet this purpose, a multicase study design was used to collect data from a purposeful sample of 10 BI experts. Semistructured interviews, archival data, and reflective field notes drove the credibility of the multicase study’s findings through data triangulation. Two conceptual models framed this study: Lennerholt …
Enhancing Employee Engagement To Improve Financial Performance, Christine Lamacchia
Enhancing Employee Engagement To Improve Financial Performance, Christine Lamacchia
Walden Dissertations and Doctoral Studies
Business leaders are negatively affected when many employees are not engaged in their jobs. Business leaders who struggle to achieve employee engagement suffer decreased profitability, sales, employee retention, and customer satisfaction. Grounded in employee engagement theory, the purpose of this qualitative single case study was to explore strategies IT business leaders use to engage employees. The participants were five IT business leaders who successfully developed strategies to engage employees. Data were collected from semistructured interviews, company documents, and artifacts. Thematic analysis was used to analyze the data. Two themes emerged: creating a company culture conducive to employee engagement and using …
Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa
Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa
Walden Dissertations and Doctoral Studies
Small business owners employ over half the U.S. labor force, yet only 50% of small businesses survive beyond 5 years. When small business owners understand the factors that lead to their business failure, they can develop strategies to remain sustainable and profitable within the first 5 years, thus reducing the potential of business failure. Grounded in the resource-based theory, the purpose of this qualitative multiple case study was to explore strategies five small construction owners in central Georgia used to remain in business beyond 5 years. Data were collected from semi structured interviews, a review of organization income statements and …
Strategies Project Managers Use That Reduce Information Technology Project Failures In The Insurance Industry, Jamarcus Snipes
Strategies Project Managers Use That Reduce Information Technology Project Failures In The Insurance Industry, Jamarcus Snipes
Walden Dissertations and Doctoral Studies
The worldwide failure rate of information technology (IT) projects is approximately 65%. Insurance project managers who fail to successfully implement IT projects negatively impact organizational performance and profitability. Grounded in the management by objectives theory, the purpose of this qualitative multiple case study was to explore strategies project managers use to reduce IT project failures in the insurance industry. The participants comprised four IT project managers in Alabama who successfully used strategies to reduce IT project failures in the insurance industry. Data were collected from virtual semistructured interviews, company documents, existing literature, and journal notes. Thematic analysis was used to …
Characteristics Of Authentic Entrepreneurial Leadership Within Information Technology Startups In Kenya, Christine Mukhwana
Characteristics Of Authentic Entrepreneurial Leadership Within Information Technology Startups In Kenya, Christine Mukhwana
Walden Dissertations and Doctoral Studies
In Kenya, over 60% of nascent entrepreneurs start businesses with minimal leadership experience, engendering founder-CEOs who cannot sustain a business beyond its formative years. The problem is the nascent entrepreneurs’ lack of understanding of effective leadership. The purpose of this qualitative, phenomenological study was to develop a more nuanced understanding of authentic leadership behavior from the perspective of nascent entrepreneurs. Authentic leadership theory and the three-factor model were used to conceptualize the study. The research question focused on nascent entrepreneurs’ lived experiences and understanding of authentic leadership. The participants in the study were entrepreneurs from the information technology industry in …