Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 54

Full-Text Articles in Physical Sciences and Mathematics

Strategizing Effective Succession Planning For Information Technology Executives, Michael Barr Jan 2019

Strategizing Effective Succession Planning For Information Technology Executives, Michael Barr

Walden Dissertations and Doctoral Studies

Organizations across the United States lose hundreds of millions of dollars each year due to the lack of effective succession planning for information technology executives. The purpose of this single case study was to explore strategies for the development and implementation of effective succession plans for future information technology executives. Bass and Avolio's transformational leadership theory was the conceptual framework for this study. The 3 participants were selected based upon their roles as executives in technology-related positions and their experiences with succession planning. Data were collected using semistructured interviews with these executives from a company headquartered in Kansas City, Missouri. …


Managing Security Objectives For Effective Organizational Performance Information Security Management, Ramamohan Gutta Jan 2019

Managing Security Objectives For Effective Organizational Performance Information Security Management, Ramamohan Gutta

Walden Dissertations and Doctoral Studies

Information is a significant asset to organizations, and a data breach from a cyberattack harms reputations and may result in a massive financial loss. Many senior managers lack the competencies to implement an enterprise risk management system and align organizational resources such as people, processes, and technology to prevent cyberattacks on enterprise assets. The purpose of this Delphi study was to explore how the managerial competencies for information security and risk management senior managers help in managing security objectives and practices to mitigate security risks. The National Institute of Standards and Technology framework served as the foundation for this study. …


Strategies For Cloud Services Adoption In Saudi Arabia, Wessam Hussein Abdulghani Mahmoud Jan 2019

Strategies For Cloud Services Adoption In Saudi Arabia, Wessam Hussein Abdulghani Mahmoud

Walden Dissertations and Doctoral Studies

The adoption rate of cloud computing is low among business organizations in Saudi Arabia, despite the cost-€saving benefits of using cloud services. The purpose of this multiple case study was to explore the strategies that information technology (IT) leaders in the manufacturing industry in Saudi Arabia used to adopt cloud computing to reduce IT costs. The target population of this study consisted of 5 IT leaders from 5 different manufacturing companies in Saudi Arabia who successfully adopted cloud computing in their companies to reduce IT costs. Rogers's diffusion of innovation theory was the conceptual framework for this research. Data collected …


Project Managers’ Communication Strategies For Team Collaboration In Software Development, John Rubena Wani Jan 2019

Project Managers’ Communication Strategies For Team Collaboration In Software Development, John Rubena Wani

Walden Dissertations and Doctoral Studies

Effective communication among team members in software development projects is increasingly significant for the success of the project. Successful software projects are the catalyst for achieving profitability objectives and creating shareholder value in organizations. The purpose of this single case study was to investigate communication strategies information technology (IT) project managers used for successful team collaboration in software development. The population for this study comprised senior IT project managers. The project managers had supervision responsibilities from a midsized IT company in Alberta, Canada. The sociotechnical theory guided this study as the conceptual framework. Data were collected from semistructured interviews with …


Exploring Firm-Level Cloud Adoption And Diffusion, William J. Wood Jan 2019

Exploring Firm-Level Cloud Adoption And Diffusion, William J. Wood

Walden Dissertations and Doctoral Studies

Cloud computing innovation adoption literature has primarily focused on individuals, small businesses, and nonprofit organizations. The functional linkage between cloud adoption and diffusion is instrumental toward understanding enterprise firm-level adoption. The purpose of this qualitative collective case study was to explore strategies used by information technology (IT) executives to make advantageous enterprise cloud adoption and diffusion decisions. This study was guided by an integrated diffusion of innovation and technology, organization, and environment conceptual framework to capture and model this complex, multifaceted problem. The study’s population consisted of IT executives with cloud-centric roles in 3 large (revenues greater than $5 billion) …


Exploring Strategies For Implementing Information Security Training And Employee Compliance Practices, Alan Robert Dawson Jan 2019

Exploring Strategies For Implementing Information Security Training And Employee Compliance Practices, Alan Robert Dawson

Walden Dissertations and Doctoral Studies

Humans are the weakest link in any information security (IS) environment. Research has shown that humans account for more than half of all security incidents in organizations. The purpose of this qualitative case study was to explore the strategies IS managers use to provide training and awareness programs that improve compliance with organizational security policies and reduce the number of security incidents. The population for this study was IS security managers from 2 organizations in Western New York. Information theory and institutional isomorphism were the conceptual frameworks for this study. Data collection was performed using face-to-face interviews with IS managers …


Cybersecurity Policy Development At The State Level: A Case Study Of Middle Tennessee, Daniel Leslie Scherr Jan 2019

Cybersecurity Policy Development At The State Level: A Case Study Of Middle Tennessee, Daniel Leslie Scherr

Walden Dissertations and Doctoral Studies

Cybersecurity is a growing threat not only to nations, critical infrastructure, and major entities, but also to smaller organizations and individuals. The growing number of successful attacks on all manner of U.S. targets highlights the need for effective and comprehensive policy from the local to federal level, though most research focuses on federal policy issues, not state issues. The purpose of this study was to examine the effectiveness of the decision-making process within the current cybersecurity policy environment in a southern state of the United States. Sabatier's advocacy coalition framework served as the theoretical framework for the study. Data were …


Examination Of Adoption Theory On The Devops Practice Of Continuous Delivery, Andrew John Anderson Jan 2019

Examination Of Adoption Theory On The Devops Practice Of Continuous Delivery, Andrew John Anderson

Walden Dissertations and Doctoral Studies

Many organizations have difficulty adopting advanced software development practices. Some software development project managers in large organizations are not aligned with the relationship between performance expectancy, effort expectancy, social influence, and facilitating conditions, as moderated by experience, with intent to adopt the DevOps practice of continuous delivery. The purpose of this study was to examine the statistical relationships between the independent variables—performance expectancy, effort expectancy, social influence, and facilitating conditions, as moderated by experience—and the dependent variable of behavioral intent to adopt a continuous delivery system. Venkatesh, Morris, Davis, and Davis's unified theory of acceptance and use of technology provided …


Leadership Characteristics In Flexible Information Technology Environments, Chrisilia Bristow Jan 2019

Leadership Characteristics In Flexible Information Technology Environments, Chrisilia Bristow

Walden Dissertations and Doctoral Studies

Researchers have found that a positive correlation exists between information technology (IT) flexibility, IT effectiveness, and strategic alignment in organizations. It has been determined that within inflexible IT environments maintainability is reduced and key business factors become at risk. An IT flexibility measurement matrix was developed to assess IT flexibility however leadership characteristics were not identified for measurement with that model. Determining the leadership characteristics needed for IT flexibility was the purpose of this multiple case study. Leveraging the empowerment, situational leadership, IT-business equilibrium, and complexity change theories, the research questions were focused on the leadership characteristics exhibited by organizational …


Strategies To Reduce The Fiscal Impact Of Cyberattacks, Shirley Denise Smith Jan 2019

Strategies To Reduce The Fiscal Impact Of Cyberattacks, Shirley Denise Smith

Walden Dissertations and Doctoral Studies

A single cyberattack event involving 1 major corporation can cause severe business and social devastation. In this single case study, a major U.S. airline company was selected for exploration of the strategies information technology administrators and airline managers implemented to reduce the financial devastation that may be caused by a cyberattack. Seven participants, of whom 4 were airline managers and 3 were IT administrators, whose primary responsibility included implementation of strategies to plan for and respond to cyberattacks participated in the data collection process. This study was grounded on the general systems theory. Data collection entailed semistructured face-to-face and telephone …


Perceptions Of Factors That Contribute To Employee Retention Of It Project Managers, Julie Ann Wiebell Jan 2019

Perceptions Of Factors That Contribute To Employee Retention Of It Project Managers, Julie Ann Wiebell

Walden Dissertations and Doctoral Studies

The low retention rate of information technology (IT) project managers from a region in the southeastern United States has increased an organization's operational costs and decreased the organization's global competitiveness. The conceptual foundation for this study was the resource-based theory of competitive advantage. This multiple case study explored IT project managers' perceptions of the factors that contributed to their retention. Participants in the study included 10 IT project managers with at least 5 years of experience who were also members of a chapter of the Project Management Institute (PMI). Semistructured interviews were conducted via teleconference to collect data that were …


Knowledge Transfer Strategy Implementation In Contract Organizations, Delano Clyde Hudson Jan 2019

Knowledge Transfer Strategy Implementation In Contract Organizations, Delano Clyde Hudson

Walden Dissertations and Doctoral Studies

Despite economic perils of government shutdowns, foreclosures, bankruptcies, and employee layoffs, some contract leaders consistently fail to implement knowledge transfer strategies that could improve production and profitability and maintain operational readiness when employees transition in and out of the organization. The conceptual framework for this descriptive research study was Nonaka and Takeuchi's socialization, externalization, combination, and internalization model for knowledge creation. A purposive sample of 20 leaders from 2 contract organizations within the south central United States with at least 10 years of experience in contracting were interviewed. Member checking was used for reliability of the synthesized interviews, and triangulation …


Reducing Errors With Blood Administration Transfusion Systems, Kim D. Stevens Jan 2019

Reducing Errors With Blood Administration Transfusion Systems, Kim D. Stevens

Walden Dissertations and Doctoral Studies

The intention of implementing technology into healthcare practices is to reduce opportunity for errors in the delivery of providing health care. However, errors still occur, and many times are preventable. Configurations of health information technology systems should match clinical workflows to promote usage as intended. The purpose of this quality improvement project was to evaluate the impact of revised system configurations and use of a blood product transfusion system for the administration of blood products after one year of implementation. The method of heuristic evaluation is a usability engineering method for finding problems in a user interface design with the …


Use Of Mobile Telephones: Experiences Of First Responders In Rural African Communities, James Harding Jan 2019

Use Of Mobile Telephones: Experiences Of First Responders In Rural African Communities, James Harding

Walden Dissertations and Doctoral Studies

Emergency medical technicians (EMTs) usually participate in disaster response in rural African communities. Disasters in African communities are often characterized by huge fatalities, which are associated with a slow pace of response. The use of information and communication technology in disaster response is recognized as an effective conduit for enhancing response. Previous research indicates the efficacy of the use of mobile telephones in disaster response in advance countries. However, there remains a critical gap in the available literature on the experiences of EMTs with the use of mobile telephones in disaster response in rural African communities. The purpose of this …


Exploration Of K-5 Teacher Decision-Making Related To Student Use Of Technology, Eric Noel Rodriguez Jan 2019

Exploration Of K-5 Teacher Decision-Making Related To Student Use Of Technology, Eric Noel Rodriguez

Walden Dissertations and Doctoral Studies

Student technology literacy is critical for success in today’s world; however, little is understood about how teachers make the decision for students to use technology for learning due to limited empirical research on the topic of teacher decision-making regarding student use of information communication technologies (ICT). The purpose of this generic qualitative study was to explore the decision-making process of kindergarten to Grade 5 (K-5) teachers regarding implementation of ICT for student use at varying levels. The framework for this study comprised the substitution augmentation modification redefinition model and the technology acceptance model. The research questions focused on how teachers …


Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome Jan 2019

Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome

Walden Dissertations and Doctoral Studies

In the United States, women remain underrepresented in senior level positions in the information technology (IT) field. Despite this challenge, a few women have successfully ascended into senior leadership in IT. Using the social cognitive theory as the conceptual framework, the purpose of this qualitative transcendental phenomenological study was to understand the lived experiences of senior women leaders in the IT field. The research question explored the lived personal and professional experiences of senior women leaders in IT to gain an understanding of their career advancement into senior leadership positions. Through the use of the modified Van Kaam method of …


Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen Jan 2019

Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen

Walden Dissertations and Doctoral Studies

The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study's conceptual framework. …


Exploring Information Technology Return On Investment Reports For Planning, Budgeting, And Implementation, Constantine Bitwayiki Jan 2019

Exploring Information Technology Return On Investment Reports For Planning, Budgeting, And Implementation, Constantine Bitwayiki

Walden Dissertations and Doctoral Studies

The failure rate of new government information technology (IT) projects in developing countries is high, with 35% classified as total failures and approximately 50% as partial failures. The population for this study was 10 senior managers of a public sector organization in Uganda selected because of high IT project successes achieved through leveraging IT return on investment (ROI) reports. The purpose of this qualitative single-case study was to explore the strategies Ugandan senior public sector officials used to leverage IT ROI reports during planning, budgeting, and implementation of IT projects to reduce failure rates. The conceptual frameworks were the strategic …


Cloud Computing Adoption In Afghanistan: A Quantitative Study Based On The Technology Acceptance Model, George T. Nassif Jan 2019

Cloud Computing Adoption In Afghanistan: A Quantitative Study Based On The Technology Acceptance Model, George T. Nassif

Walden Dissertations and Doctoral Studies

Cloud computing emerged as an alternative to traditional in-house data centers that businesses can leverage to increase the operation agility and employees' productivity. IT solution architects are tasked with presenting to IT managers some analysis reflecting cloud computing adoption critical barriers and challenges. This quantitative correlational study established an enhanced technology acceptance model (TAM) with four external variables: perceived security (PeS), perceived privacy (PeP), perceived connectedness (PeN), and perceived complexity (PeC) as antecedents of perceived usefulness (PU) and perceived ease of use (PEoU) in a cloud computing context. Data collected from 125 participants, who responded to the invitation through an …


Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey Jan 2019

Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey

Walden Dissertations and Doctoral Studies

There is a significant technology deficiency within the U.S. manufacturing industry compared to other countries. To adequately compete in the global market, lean manufacturing organizations in the United States need to look beyond their traditional methods of evaluating their processes to optimize their assembly cells for efficiency. Utilizing the task-technology fit theory this quantitative correlational study examined the relationships among software using probabilistic algorithms, lean methodology techniques, and manufacturer cell optimization results. Participants consisted of individuals performing the role of the systems analyst within a manufacturing organization using lean methodologies in the Southwestern United States. Data were collected from 118 …


Information Technology Outsourcing Strategies To Ensure Customer Satisfaction, Clyde Rajack Jan 2019

Information Technology Outsourcing Strategies To Ensure Customer Satisfaction, Clyde Rajack

Walden Dissertations and Doctoral Studies

Many information technology (IT) outsourcing initiatives fail, resulting in a high impact on business results and customer satisfaction. Without effective strategies, business leaders who outsource their IT services are at considerable risk of failure and stakeholder dissatisfaction. The purpose of this multiple case study was to explore outsourcing strategies that IT managers in Southern Ontario, Canada, used to ensure customer satisfaction. Participants included 9 executives with experience in complex IT outsourcing initiatives. Stakeholder theory and transaction cost economics theory were the conceptual frameworks for the study. Data were gathered using semistructured interviews to query 8 topical areas including IT outsourcing …


Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome Jan 2019

Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome

Walden Dissertations and Doctoral Studies

In the United States, women remain underrepresented in senior level positions in the information technology (IT) field. Despite this challenge, a few women have successfully ascended into senior leadership in IT. Using the social cognitive theory as the conceptual framework, the purpose of this qualitative transcendental phenomenological study was to understand the lived experiences of senior women leaders in the IT field. The research question explored the lived personal and professional experiences of senior women leaders in IT to gain an understanding of their career advancement into senior leadership positions. Through the use of the modified Van Kaam method of …


Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen Jan 2019

Cybersecurity Strategies For Universities With Bring Your Own Device Programs, Hai Vu Nguyen

Walden Dissertations and Doctoral Studies

The bring your own device (BYOD) phenomenon has proliferated, making its way into different business and educational sectors and enabling multiple vectors of attack and vulnerability to protected data. The purpose of this multiple-case study was to explore the strategies information technology (IT) security professionals working in a university setting use to secure an environment to support BYOD in a university system. The study population was comprised of IT security professionals from the University of California campuses currently managing a network environment for at least 2 years where BYOD has been implemented. Protection motivation theory was the study's conceptual framework. …


Mobile Technology Deployment Strategies For Improving The Quality Of Healthcare, Won K. Song Jan 2019

Mobile Technology Deployment Strategies For Improving The Quality Of Healthcare, Won K. Song

Walden Dissertations and Doctoral Studies

Ineffective deployment of mobile technology jeopardizes healthcare quality, cost control, and access, resulting in healthcare organizations losing customers and revenue. A multiple case study was conducted to explore the strategies that chief information officers (CIOs) used for the effective deployment of mobile technology in healthcare organizations. The study population consisted of 3 healthcare CIOs and 2 healthcare information technology consultants who have experience in deploying mobile technology in a healthcare organization in the United States. The conceptual framework that grounded the study was Wallace and Iyer's health information technology value hierarchy. Data were collected using semistructured interviews and document reviews, …


Strategies To Lower Information Technology Employee Voluntary Turnover, Nelson Velez Jan 2019

Strategies To Lower Information Technology Employee Voluntary Turnover, Nelson Velez

Walden Dissertations and Doctoral Studies

For information technology (IT) professionals, the average turnover rate of voluntary employees is approximately 21.5% and occurs in fewer than 5 years. The purpose of this single case study was to explore strategies IT outsourcing business executives used to retain key IT employees in the New England region of the United States. Three IT business leaders from a single organization were selected to participate because they had implemented strategies to retain key IT employees. Herzberg's 2-factor theory of motivation was used as the conceptual framework for this doctoral study. Data were collected using semistructured interviews and review of company policies …


Strategies To Improve Adoption Of The Federal Enterprise Architecture Framework, Michael John Caruso Jan 2019

Strategies To Improve Adoption Of The Federal Enterprise Architecture Framework, Michael John Caruso

Walden Dissertations and Doctoral Studies

The U.S. federal government spends millions of taxpayer dollars to implement the federal enterprise architecture framework (FEAF). This qualitative multiple case study extracted successful FEAF implementation strategies used by agencies in the Washington, DC, metropolitan area. The population for this study included 10 information technology (IT) planners in 3 federal agencies. Data were collected from semistructured interviews and triangulated in comparison to 33 public documents. General system theory was used as a conceptual framework for the study, and data analysis included reviews of the academic literature, thematic analysis, and member checking to identify themes and codes related to successful aspects …


Exploring Strategies To Integrate Disparate Bioinformatics Datasets, Charbel Bader Fakhry Jan 2019

Exploring Strategies To Integrate Disparate Bioinformatics Datasets, Charbel Bader Fakhry

Walden Dissertations and Doctoral Studies

Distinct bioinformatics datasets make it challenging for bioinformatics specialists to locate the required datasets and unify their format for result extraction. The purpose of this single case study was to explore strategies to integrate distinct bioinformatics datasets. The technology acceptance model was used as the conceptual framework to understand the perceived usefulness and ease of use of integrating bioinformatics datasets. The population of this study included bioinformatics specialists of a research institution in Lebanon that has strategies to integrate distinct bioinformatics datasets. The data collection process included interviews with 6 bioinformatics specialists and reviewing 27 organizational documents relating to integrating …


A Delphi Study Analysis Of Best Practices For Data Quality And Management In Healthcare Information Systems, Olivia L. Pollard Jan 2019

A Delphi Study Analysis Of Best Practices For Data Quality And Management In Healthcare Information Systems, Olivia L. Pollard

Walden Dissertations and Doctoral Studies

Healthcare in the US continues to suffer from the poor data quality practices processes that would ensure accuracy of patient health care records and information. A lack of current scholarly research on best practices in data quality and records management has failed to identify potential flaws within the relatively new electronic health records environment that affect not only patient safety but also cost, reimbursements, services, and most importantly, patient safety. The focus of this study was to current best practices using a panel of 25 health care industry data quality experts. The conceptual lens was developed from the International Monetary …


Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe Jan 2019

Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe

Walden Dissertations and Doctoral Studies

In retail, the explosion of data sources and data has provided incentive to invest in information systems (IS), which enable leaders to understand the market and make timely decisions to improve performance. Given that users’ perceptions of IS affects their use of IS, understanding the factors influencing user acceptance is critical to acquiring an effective business intelligence system (BIS) for an organization. Grounded in the technology acceptance model theory, the purpose of this correlational study was to examine the relationship between perceived usefulness (PU), perceived ease of use (PEOU), and user acceptance of business intelligence systems (BIS) in retail organizations. …


Factors Affecting Employee Intentions To Comply With Password Policies, Ernest Tamanji Anye Jan 2019

Factors Affecting Employee Intentions To Comply With Password Policies, Ernest Tamanji Anye

Walden Dissertations and Doctoral Studies

Password policy compliance is a vital component of organizational information security. Although many organizations make substantial investments in information security, employee-related security breaches are prevalent, with many breaches being caused by negative password behavior such as password sharing and the use of weak passwords. The purpose of this quantitative correlational study was to examine the relationship between employees’ attitudes towards password policies, information security awareness, password self-efficacy, and employee intentions to comply with password policies. This study was grounded in the theory of planned behavior and social cognitive theory. A cross-sectional survey was administered online to a random sample of …