Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 13 of 13
Full-Text Articles in Business
Strategies Of Successful Government It Projects Based On Cost And Time, Ullice John Pelican
Strategies Of Successful Government It Projects Based On Cost And Time, Ullice John Pelican
Walden Dissertations and Doctoral Studies
From 2001 through 2015, some information technology (IT) project managers failed to deliver U.S. Government IT projects on time and within budget. The failure of IT project managers to complete projects on time and within budget provoked the U.S. Government Accountability Office to classify IT projects as high risk. This multiple case study explored strategies government contracted IT project managers use to reduce cost overruns and improve on-time delivery. The participants in this study were government contracted IT project managers from organizations that provide IT project management in the Maryland area. Employing purposeful sampling of the explicit population, 5 selected …
Strategies For Successfully Managing Organizational It Projects, Joseph Rathbun
Strategies For Successfully Managing Organizational It Projects, Joseph Rathbun
Walden Dissertations and Doctoral Studies
Over 70% of information technology (IT) projects in large organizations in the United States run over budget or fail to reach completion primarily due to a lack of effective strategies. The purpose of this single case study was to explore strategies that IT project managers used to successfully complete IT projects. Hersey and Blanchard's situational leadership theory was the conceptual framework. Purposive sampling method was used to identify 2 successful IT project managers in Central Texas. Data gathered from semistructed interviews and collected from publicly available documents were analyzed using coding techniques, constant comparison, and key word phrases. Member checking …
Strategies For Reducing Professional Turnover In Information Technology, Brett Grosshans
Strategies For Reducing Professional Turnover In Information Technology, Brett Grosshans
Walden Dissertations and Doctoral Studies
The information technology (IT) industry workforce in the United States is expected to increase by approximately 50,000 jobs through the year 2024, creating opportunities for employees to change jobs if they are not satisfied. Replacing talented IT professionals can cost a business as much as 150% of the salary of the outgoing employee. The purpose of this descriptive single case study was to identify strategies successful IT business leaders used to reduce voluntary turnover among IT professionals. The research population was 4 leaders from an IT business in southeastern Virginia, who oversee supervisory and hiring. The conceptual framework was Herzberg's …
Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez
Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez
Walden Dissertations and Doctoral Studies
Project managers who fail to apply strategies to prevent counterproductive work behavior in information technology projects could negatively affect users, budget costs, timelines, or projects. The purpose of this multiple case study was to explore strategies that project managers used to prevent counterproductive work behavior that put project success at risk. Social learning theory was the conceptual framework for this study. Data were collected through document review of published Project Management Institute (PMI) material as well as semistructured interviews with 10 project managers who were members of a PMI chapter in the southeastern United States, and who held a project …
Strategies For Recruiting Cybersecurity Professionals In The Financial Service Industry, Iva Walters
Strategies For Recruiting Cybersecurity Professionals In The Financial Service Industry, Iva Walters
Walden Dissertations and Doctoral Studies
The cybersecurity market is the fastest growing market in the United States; as such, leaders in financial institutions recognize their businesses are vulnerable, as money is accessible within computerized banking systems. The purpose of this multiple case study was to explore what strategies financial service leaders- use to recruit cybersecurity professionals. The conceptual framework for this study was the hierarchy of needs and stakeholder management theory. Data collection involved company archival documents and semistructured, open-ended interviews with 5 financial service leaders in the Midlands area of South Carolina who recruited skilled cybersecurity professionals to support long-term business sustainability. Coding, clustering, …
The Relationship Between Technology Threat Avoidance And Innovation In Health Care Organizations, Melvin R. Fenner Jr
The Relationship Between Technology Threat Avoidance And Innovation In Health Care Organizations, Melvin R. Fenner Jr
Walden Dissertations and Doctoral Studies
Most leaders of healthcare delivery organizations have increased their rate of technological innovation, but some still struggle to keep pace with other industries. The problem addressed in this study was that senior leaders in some rural ambulatory healthcare facilities failed to innovate, even with recent healthcare technological innovations, which could lead to increased medical errors and a loss of efficiency. The purpose of the study was to examine if a relationship exists between the avoidance of technology threats by senior leaders in ambulatory healthcare organizations and the innovation propensity of the organization. Technology threat avoidance theory served as the theoretical …
The Core Competencies Necessary For Global Information Technology Project Management, Gregory Michael Von Schleh
The Core Competencies Necessary For Global Information Technology Project Management, Gregory Michael Von Schleh
Walden Dissertations and Doctoral Studies
Global information technology (IT) project management organizations can create more value in their operations by presenting the core competencies possessed by global IT project managers (PMs) who are successful in their respective projects. The purpose of this multiple case study was to explore the core competencies and business strategies that IT PMs use to meet global IT project deadlines and budgets. This study involved 5 IT PMs from the Pacific Northwest (United States and Canada) who increased the quality of outsourced IT projects from 4 different companies. The data collection method included in-person semistructured interviews of participants and review of …
Challenges And Implications Of Implementing Strategic Intelligence Systems In Mexico, Hector De Jesus Rivera Ochoa
Challenges And Implications Of Implementing Strategic Intelligence Systems In Mexico, Hector De Jesus Rivera Ochoa
Walden Dissertations and Doctoral Studies
Business intelligence (BI) allows companies to make faster and better-informed decisions. Unfortunately, implementing BI systems in companies in developing countries is minimal. Limited and costly access to the technology, coupled with the cultural background affecting how people perceive BI, has restricted such implementations. The purpose of this phenomenological study was to explore and describe the lived experiences of chief executive officers (CEOs) in northern Mexico to obtain insight into the challenges of implementing BI systems. Research questions focused on the reasons behind the lack of BI systems implementation and the challenges faced by these officers when implementing a new system. …
Exploring Strategies For Retaining Information Technology Professionals: A Case Study, Shannon J. Thomas
Exploring Strategies For Retaining Information Technology Professionals: A Case Study, Shannon J. Thomas
Walden Dissertations and Doctoral Studies
In the 21st century, retaining information technology (IT) professionals is critical to a company's productivity and overall success. Senior IT leaders need effective strategies to retain skilled IT professionals. Guided by the general systems theory and the transformational leadership theory, the purpose of this qualitative exploratory case study was to explore the retention strategies used by 2 senior IT leaders in Atlanta, Georgia to retain IT professionals. Semistructured interviews were employed to elicit detailed narratives from these IT leaders on their experiences in retaining IT professionals. A review of company documents, as well as member-checking of initial interview transcripts, helped …
Success Factors For Women Of Color Information Technology Leaders In Corporate America, Annette Skervin
Success Factors For Women Of Color Information Technology Leaders In Corporate America, Annette Skervin
Walden Dissertations and Doctoral Studies
The 2013 United States Census data documents the significant underrepresentation of women of color in the information technology (IT) field. Women of color (Black, Hispanic, Asian or self-classified as non-White) represent an untapped resource in an industry with a low unemployment rate, high starting salaries, and a projected 18% growth rate by the year 2022. Prior researchers have studied White women in IT and have not provided a voice to women of color leaders. The specific problem addressed was the under-representation of women of color IT leaders in corporate America. The purpose of this phenomenological study was to investigate the …
Employees' Perceptions Of Managerial Transformational Leadership Behaviors And Effectiveness Among Information Technology Managers, Olusesan Ogunsakin
Employees' Perceptions Of Managerial Transformational Leadership Behaviors And Effectiveness Among Information Technology Managers, Olusesan Ogunsakin
Walden Dissertations and Doctoral Studies
The selection of effective leaders is critical to improving organizations' performance in the current dynamic global business landscape; however, the inadequacy of leadership selection criteria in many organizations had led to an increase in the rate of chief executive officers' dismissals within the last 3 decades in the United States. The purpose of this correlational study was to examine the relationship between employees' assessments of their managers' transformational leadership behaviors and employees' perceptions of managerial leadership effectiveness for improved leadership selection. Bass' transformational leadership theory and Herzberg's motivation-hygiene theory guided the study with data gathered, using an online survey, from …
Factors Contributing To The Limited Use Of Information Technology In State Courtrooms, Concetta Manker
Factors Contributing To The Limited Use Of Information Technology In State Courtrooms, Concetta Manker
Walden Dissertations and Doctoral Studies
Few state courtrooms in the United States have integrated information technology (IT) in court trials. Despite jurors' beliefs that using courtroom technology improves their abilities to serve as jurors, the attitudes and experiences among attorneys and judges toward the utility of IT continue to pose barriers. The purpose of this phenomenological study was to explore and describe the experiences of attorneys and judges in the State of Virginia with regard limited use of IT in state courtrooms. The conceptual framework included Davis, Bagozzi, and Warshaw's (1989) technology acceptance model; Rogers's (2003) diffusion of innovation theory; and Venkatesh, Morris, Davis, and …
Supporting And Securing Personal Mobile Devices Within An Existing Information Technology Environment, George Allen Patton
Supporting And Securing Personal Mobile Devices Within An Existing Information Technology Environment, George Allen Patton
Walden Dissertations and Doctoral Studies
Personal mobile devices are becoming integrated into the daily operations of business. Managers are realizing that employees who are allowed to use personal mobile devices to access corporate information systems may reduce costs as users buy their own devices. The problem was that managers have a limited understanding of the need to secure or support personal mobile devices. The purpose of this survey study was to examine the relationship between employees' desire to use personal mobile devices and corporation needs for security and support. Hypotheses were tested by examining the relationships between the requirement to support and secure personal mobile …