Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 7 of 7
Full-Text Articles in Physical Sciences and Mathematics
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Walden Dissertations and Doctoral Studies
Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Analyzing Small Business Strategies To Prevent External Cybersecurity Threats, Dr. Kevin E. Moore
Walden Dissertations and Doctoral Studies
Some small businesses’ cybersecurity analysts lack strategies to prevent their organizations from compromising personally identifiable information (PII) via external cybersecurity threats. Small business leaders are concerned, as they are the most targeted critical infrastructures in the United States and are a vital part of the economic system as data breaches threaten the viability of these organizations. Grounded in routine activity theory, the purpose of this pragmatic qualitative inquiry was to explore strategies small business organizations utilize to prevent external cybersecurity threats. The participants were nine cybersecurity analysts who utilized strategies to defend small businesses from external threats. Data were collected …
Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa
Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa
Walden Dissertations and Doctoral Studies
Small business owners employ over half the U.S. labor force, yet only 50% of small businesses survive beyond 5 years. When small business owners understand the factors that lead to their business failure, they can develop strategies to remain sustainable and profitable within the first 5 years, thus reducing the potential of business failure. Grounded in the resource-based theory, the purpose of this qualitative multiple case study was to explore strategies five small construction owners in central Georgia used to remain in business beyond 5 years. Data were collected from semi structured interviews, a review of organization income statements and …
A Case Study On Social Media As An Effective Management Tool, Appolloh Omolloh
A Case Study On Social Media As An Effective Management Tool, Appolloh Omolloh
Walden Dissertations and Doctoral Studies
In small businesses in the United States, specifically those with fewer than 10 employees,
leaders may be skeptical of and resistant to the use of social media in their management
operations. Management literature does not indicate clear and effective guidelines and
policies detailing small marketing firms use of social media. The purpose of this
qualitative case study was to explore the perceptions of small marketing firm leaders
about the resources and knowledge needed for effective use of social media as a
management tool. Emerson's social exchange theory grounded the study. The study
targeted owners and managers of small marketing firms …
Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias
Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias
Walden Dissertations and Doctoral Studies
Despite the increased cost of data breaches due to advanced, persistent threats from malicious sources, the adoption of big data security analytics among U.S. small businesses has been slow. Anchored in a diffusion of innovation theory, the purpose of this correlational study was to examine ways to increase the adoption of big data security analytics among small businesses in the United States by examining the relationship between small business leaders' perceptions of big data security analytics and their adoption. The research questions were developed to determine how to increase the adoption of big data security analytics, which can be measured …
Cyber-Security Policy Decisions In Small Businesses, Joanna Patterson
Cyber-Security Policy Decisions In Small Businesses, Joanna Patterson
Walden Dissertations and Doctoral Studies
Cyber-attacks against small businesses are on the rise yet small business owners often lack effective strategies to avoid these attacks. The purpose of this qualitative multiple case study was to explore the strategies small business owners use to make cyber-security decisions. Bertalanffy's general systems theory provided the conceptual framework for this study. A purposive sample of 10 small business owners participated in the interview process and shared their decision-making methodologies and influencers. The small business owners were vetted to ensure their strategies were effective through a series of qualification questions. The intent of the research question and corresponding interview questions …
Small Business Use Of Internet Marketing: Findings From Case Studies, Maya Demishkevich
Small Business Use Of Internet Marketing: Findings From Case Studies, Maya Demishkevich
Walden Dissertations and Doctoral Studies
Internet marketing is critical for meeting changing consumer needs and staying competitive in the business environment. Small business owners need strategies on how to use Internet marketing to promote their products or services. The purpose of this multiple case study was to explore how 5 small business owners in Maryland developed and implemented an online marketing strategy. Participants were recruited for their roles as the chief decision maker of their business; additional prerequisites for their participation were that they used Internet marketing, represented different industries, and had fewer than 20 employees. Data came from semi-structured interviews with the small business …