Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Walden Dissertations and Doctoral Studies

Business Administration, Management, and Operations

Information technology

Articles 1 - 4 of 4

Full-Text Articles in Business

A Qualitative Exploration Of The Security Practices Of Registered Nurses, Beth Ann Savage Jan 2017

A Qualitative Exploration Of The Security Practices Of Registered Nurses, Beth Ann Savage

Walden Dissertations and Doctoral Studies

Increased breach occurrences in healthcare cause concern for health information as reported by the Federal Government. Significant effort, regulations, and safeguards are in place to protect the systems used in the healthcare industry. Employee handling of security remains an area of vulnerability related to security protocols. The unified theory of acceptance and usage of technology (UTAUT) served as the model for this qualitative exploratory study with the purpose of understanding registered nurse (RN) perceptions and lived experiences related to IT security. Face-to-face interviews were conducted with 20 participants from the Three Rivers Chapter American Association Critical Care Nurses. Transcribed data …


Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster Jan 2017

Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster

Walden Dissertations and Doctoral Studies

The decision to implement information technology (IT) initiatives to enhance collaboration among veterans, baby boomers, Generation X, Generation Y, and Fifth Generation employees continues to challenge organizational leaders. The purpose of this nonexperimental study was to identify how the implementation of information technology initiatives, coupled with the knowledge of learning styles, might enhance collaboration among generational cohort employees. The generational cohort theory, Maslow's hierarchy of needs theory, and the technology acceptance model were the theoretical frameworks used to develop an understanding of the relationships among the cohorts and the acceptance of technology to enhance collaboration. Data were collected from a …


Effective Stakeholder Management Strategies For Information Technology Projects, Andrew Stephen Williams Jan 2017

Effective Stakeholder Management Strategies For Information Technology Projects, Andrew Stephen Williams

Walden Dissertations and Doctoral Studies

Information Technology (IT) projects have become critical to business strategy. However, one major issue is that, historically, IT projects have high failure rates, with scholars asserting that ineffective stakeholder management strategies were a major factor for project failure. The purpose of this multiple case study was to explore strategies IT executives use for managing IT project stakeholders by exploring the experiences of 2 CIOs and 4 IT directors in two multinational companies, based in Switzerland. Stakeholder theory was the conceptual framework for this study. Data were collected through semistructured interviews and company documentation, and analyzed using Yin's 5-step data analysis …


Project Risk Management Strategies For It Project Managers, John Stephen Cabral Jan 2017

Project Risk Management Strategies For It Project Managers, John Stephen Cabral

Walden Dissertations and Doctoral Studies

Utilizing information technology (IT) to enable new organizational capabilities to achieve near-term objectives and long-term sustainability is a top priority for many business leaders seeking to maintain or increase market share. However, organizational leaders face significant challenges to their strategy execution because the percentage of challenged IT projects has remained relatively static for decades. The purpose of this qualitative case study was to explore risk management strategies used by 7 purposely selected IT project managers (PMs) from a pharmaceutical company located in the northeastern United States who have effectively managed IT project performance by using risk management strategies, leading to …