Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Walden Dissertations and Doctoral Studies

Databases and Information Systems

Business administration

Publication Year

Articles 1 - 10 of 10

Full-Text Articles in Business

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Acceptance And Usage Of Electronic Health Record Systems In Small Medical Practices, Ritu Tannan Jan 2011

Acceptance And Usage Of Electronic Health Record Systems In Small Medical Practices, Ritu Tannan

Walden Dissertations and Doctoral Studies

One of the objectives of the U.S. government has been the development of a nationwide health information infrastructure, including adoption and use of an electronic health records (EHR) system. However, a 2008 survey conducted by the National Center for Health Statistics indicated a 41.5% usage of the EHR system by physicians in office-based practices. The purpose of this study was to explore opinions and beliefs on the barriers to the diffusion of an ERH system using Q-methodology. Specifically, the research questions examined the subjectivity in the patterns of perspectives at the preadoption stage of the nonusers and at the postadoption …


Data-Driven Decision Making As A Tool To Improve Software Development Productivity, Mary Erin Brown Jan 2011

Data-Driven Decision Making As A Tool To Improve Software Development Productivity, Mary Erin Brown

Walden Dissertations and Doctoral Studies

The worldwide software project failure rate, based on a survey of information technology software manager's view of user satisfaction, product quality, and staff productivity, is estimated to be between 24% and 36% and software project success has not kept pace with the advances in hardware. The problem addressed by this study was the limited information about software managers' experiences with data-driven decision making (DDD) in agile software organizations as a tool to improve software development productivity. The purpose of this phenomenological study was to explore how agile software managers view DDD as a tool to improve software development productivity and …


An Empirical Study On User Acceptance Of Simulation Techniques For Business Process, Olurotimi Adeboye Ladeinde Jan 2011

An Empirical Study On User Acceptance Of Simulation Techniques For Business Process, Olurotimi Adeboye Ladeinde

Walden Dissertations and Doctoral Studies

Non acceptance of technology may result in serious damages to organizations. For example, non acceptance of simulation technology cost Merrill Lynch Bank over {dollar}50 billion in 2008, while statistics in 2 separate studies showed that non acceptance of technology was responsible for a 57% decrease in performance level for physicians practicing in public tertiary hospitals in Hong Kong, and a 39% decrease in productivity for hotel workers in Seoul, Korea. The problem addressed in this research was non acceptance of simulation technology by project managers. This research investigated the correlation among personal innovativeness, organizational innovativeness, perceived usefulness, perceived ease of …


The Potential Role Of Business Intelligence In Church Organizations, Charmaine Felder Jan 2011

The Potential Role Of Business Intelligence In Church Organizations, Charmaine Felder

Walden Dissertations and Doctoral Studies

Business intelligence (BI) involves transforming data into actionable information to make better business decisions that may help improve operations. Although businesses have experienced success with BI, how leaders of church organizations might be able to exploit the advantages of BI in church organizations remains largely unexplored. The purpose of the phenomenological study was to explore the perceptions of pastoral leaders concerning the potential usefulness of BI in church organizations. Conceptual support for the study was based on the premise that churches may also benefit from BI that helps improve decision making and organizational performance. Three research questions were used to …


Entropy In Postmerger And Acquisition Integration From An Information Technology Perspective, Gloria S. Williams Jan 2011

Entropy In Postmerger And Acquisition Integration From An Information Technology Perspective, Gloria S. Williams

Walden Dissertations and Doctoral Studies

Mergers and acquisitions have historically experienced failure rates from 50% to more than 80%. Successful integration of information technology (IT) systems can be the difference between postmerger success or failure. The purpose of this phenomenological study was to explore the entropy phenomenon during postmerger IT integration. To that end, a purposive sample of 14 midlevel and first-line managers in a manufacturing environment was interviewed to understand how the negative effects of entropy affect the ultimate success of the IT integration process. Using the theoretical framework of the process school of thought, interview data were iteratively examined by using keywords, phrases, …


A Correlational Study Of Telework Frequency, Information Communication Technology, And Job Satisfaction Of Home-Based Teleworkers, Shana P. Webster-Trotman Jan 2010

A Correlational Study Of Telework Frequency, Information Communication Technology, And Job Satisfaction Of Home-Based Teleworkers, Shana P. Webster-Trotman

Walden Dissertations and Doctoral Studies

In 2008, 33.7 million Americans teleworked from home. The Telework Enhancement Act (S. 707) and the Telework Improvements Act (H.R. 1722) of 2009 were designed to increase the number of teleworkers. The research problem addressed was the lack of understanding of factors that influence home-based teleworkers' job satisfaction. Job dissatisfaction has been found to have a significant impact on voluntary turnover. The purpose of the study was to assess the relationship among telework frequency, information communication technology (ICT), and job satisfaction. The research questions were designed to answer whether correlational relationships exist among telework frequency, ICT, and job satisfaction and …


A Structural Equation Model Of The Factors Associated With Influence And Power Of It Departments And Their Relationship To Firm's It Orientation And Business Performance, Raghu V. Kowshik Jan 2010

A Structural Equation Model Of The Factors Associated With Influence And Power Of It Departments And Their Relationship To Firm's It Orientation And Business Performance, Raghu V. Kowshik

Walden Dissertations and Doctoral Studies

Although few firms can function without an information technology (IT) department, senior executives often consider IT as secondary. Historically, studies have found IT departments to have low influence and power status compared to other departments. Few, if any, studies have investigated what factors contribute to this subservient position. Three research questions that inspired this study regarding the IT department's influence and power included factors that shape the IT influence and power, the consequences for the firm's IT orientation and business performance, and how firm's IT orientation affects business performance. This quantitative study explored the notion that accountability, innovativeness, customer connectedness …


An Analysis Of The Impact Of Information Systems On The Level Of Trust In The Construction Industry, Michael Wayne Jones Jan 2009

An Analysis Of The Impact Of Information Systems On The Level Of Trust In The Construction Industry, Michael Wayne Jones

Walden Dissertations and Doctoral Studies

Even though the current level of communication and information sharing is greater than it has ever been throughout the history of the construction industry, the problem under investigation stems from the results of current research that indicate that many major projects have difficulty in achieving client expectations, resulting in a negative image of the construction industry. The purpose of this study was to analyze the impact on the level of trust in the use of information systems between construction firms and their clients. The theoretical foundations of this research were based in interdependence and coordination theories. While information systems enable …