Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Information technology

Theses/Dissertations

Articles 1 - 30 of 95

Full-Text Articles in Physical Sciences and Mathematics

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda Jan 2023

Perceptions And Knowledge Of Information Security Policy Compliance In Organizational Personnel, Jesus M. Mosqueda

Walden Dissertations and Doctoral Studies

All internet connected organizations are becoming increasingly vulnerable to cyberattacks due to information security policy noncompliance of personnel. The problem is important to information technology (IT) firms, organizations with IT integration, and any consumer who has shared personal information online, because noncompliance is the single greatest threat to cybersecurity, which leads to expensive breaches that put private information in danger. Grounded in the protection motivation theory, the purpose of this quantitative study was to use multiple regression analysis to examine the relationship between perceived importance, organizational compliance, management involvement, seeking guidance, and rate of cybersecurity attack. The research question for …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo Jan 2023

Leadership Strategies Supply Chain Managers Use In Adopting Innovative Technology, Bukola Loveth Olowo

Walden Dissertations and Doctoral Studies

Supply chain managers face challenges when adopting new technologies to remain competitive and satisfy consumer demands involving expedited delivery of food and services. Supply chain managers who fail to adopt new technology have a decreased propensity to stay competitive. Grounded in the transformation leadership theory, the purpose of this qualitative multiple-case study was to explore leadership strategies supply chain managers use in adopting innovative technology. Participants were six supply chain managers who successfully used leadership strategies to adopt new innovative technology. Sources for data collection were semistructured interviews, company archival documents, and field notes. Research data were analyzed via thematic …


The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams Jan 2023

The Relationship Between Organizational Knowledge Management Constructs And Organizational Flexibility, Marcus B. Williams

Walden Dissertations and Doctoral Studies

The role that the information technology (IT) department serves is governed by the corporate culture and how it values the use of knowledge, including IT, to achieve a strategic competitive advantage. The purpose of this quantitative study was to examine the potential relationships between information acquisition, knowledge dissemination, shared interpretation, organizational memory, and organizational flexibility. Two theories served as the theoretical foundation for this study: contingency theory and the resource-based view of the firm. To answer the question of possible correlation between organizational flexibility and components of knowledge management, a randomly selected sample of 193 IT professionals employed at small- …


Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem Jan 2022

Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem

Walden Dissertations and Doctoral Studies

Since 2001, most government organizations’ IT modernization programs had failed because of ineffective implementation strategies from IT leaders. The research problem was the absence of effective strategies to modernize IT legacy systems. The purpose of this qualitative single case study was to explore effective IT modernization strategies to revolutionize IT legacy systems. The researcher sought to answer how organizations create effective strategies to modernize IT legacy systems. The study used purposeful sampling, including 13 IT leaders, IT technicians, and customers based on their experience in implementing successful IT modernization programs’ strategies. Data were collected using semi-structured interviews and agency documentation. …


Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson Jan 2022

Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson

Walden Dissertations and Doctoral Studies

Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …


Examining The Influence Of Perceived Risk On The Selection Of Internet Access In The U.S. Intelligence Community, Tyler Michael Pieron Jan 2021

Examining The Influence Of Perceived Risk On The Selection Of Internet Access In The U.S. Intelligence Community, Tyler Michael Pieron

CCE Theses and Dissertations

Information technology security policies are designed explicitly to protect IT systems. However, overly restrictive information security policies may be inadvertently creating an unforeseen information risk by encouraging users to bypass protected systems in favor of personal devices, where the potential loss of organizational intellectual property is greater.

Current models regarding the acceptance and use of technology, Technology Acceptance Model Version 3 (TAM3) and the Unified Theory of Acceptance and Use of Technology Version 2 (UTAUT2), address the use of technology in organizations and by consumers, but little research has been done to identify an appropriate model to begin to understand …


The Accumulation Of It Capability And Its Long-Term Effect On Financial Performance, Jin Ho Kim Jun 2020

The Accumulation Of It Capability And Its Long-Term Effect On Financial Performance, Jin Ho Kim

Theses and Dissertations in Business Administration

Many scholars have been studying information technology (IT) capability and its impact on business performance. However, it has been debated whether the IT capability influences firm performance because prior literature shows mixed results. To understand this phenomenon, I performed two studies in this research, placed in two parts. First, by deploying the new concept of accumulation of IT capability, I attempted to reinvestigate the relationship between IT capability and business performance. Next, I examined what factors influence the accumulation of IT capability. In the first part, I suggested two novel constructs that measure the extent of the accumulation of IT …


Examining The Creation Of Information Privacy Culture In Healthcare Organizations To Achieve Collective Hipaa Compliance Practice, Osborne Obeng Jan 2020

Examining The Creation Of Information Privacy Culture In Healthcare Organizations To Achieve Collective Hipaa Compliance Practice, Osborne Obeng

CCE Theses and Dissertations

The digitization and transfer of patient records has increased the risk of patient data being improperly handled by healthcare organizations. In light of this growing concern, the United States government and state authorities have implemented various regulations to mitigate the privacy concerns. Beside privacy regulations, healthcare organizations have been forced by other pressures such as organization’s competitive pressures, resources, ethical responsibilities, and legitimacy to implement privacy safeguards. However, surveys show that healthcare organizations fail to achieve information privacy compliance. This study examined the creation of information privacy culture from the different occupational communities in healthcare organizations to help achieve information …


The Impact Of Technological Advances On Older Workers, Toni Mcintosh Jan 2020

The Impact Of Technological Advances On Older Workers, Toni Mcintosh

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was the treatment of older workers in the information technology industry that contributes to age discrimination in the workplace. Age discrimination is against the law irrespective of whether it is aimed at older workers in the workforce or becoming job candidates at an advanced age. Although previous research has shown that age discrimination is prevalent in work environments, little has been suggested to eradicate the issue in the workplace. The purpose of this qualitative case study was to investigate the issue of age discrimination as it relates to workers over the age of …


The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase Jan 2020

The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase

Walden Dissertations and Doctoral Studies

America's higher education institutions have aligned computer science curricula with today's modern technology. Despite these efforts, data have shown that there is slow growth among young women majoring in computer science and even slower growth in this area at community colleges. Higher education institutions have also acknowledged a gap between men and women entering the computer science field and a need to explore options for computer science programs to engage women in the industry. The purpose of this phenomenological study was to gain an understanding of the perceptions and lived experiences of female students enrolled in computer classes at New …


Smart Privacy For Iot: Privacy Embedded Design For Home Automation Systems, Love James Jan 2020

Smart Privacy For Iot: Privacy Embedded Design For Home Automation Systems, Love James

CCE Theses and Dissertations

The emerging paradigm shift in technology to make everyday devices more intelligent than previously considered also known as internet of things (IoT) has further elevated the importance of privacy not only in theory but also in practice. The intrusive nature of these devices and in particular, the home automation system is also beginning to raise privacy concerns which might impact their usage either by deterring potential users from adopting the technology or discouraging existing users from the continued use of these home automation systems.

This study was an empirical and quantitative study that evaluates the impact of users’ behavior when …


Factors That Influence The Perception Of Higher Education Leaders In The Adoption Process Of Instructional Technology And Distance Education, Diego Tibaquirá Jan 2020

Factors That Influence The Perception Of Higher Education Leaders In The Adoption Process Of Instructional Technology And Distance Education, Diego Tibaquirá

Theses and Dissertations

The problem addressed by this study was that many administrators at institutions of higher learning are faced with the task of finding ways to provide the latest technologies while being extremely constricted by budgets and the rising cost of education. The purpose of this study was to determine the factors that influence the perceptions of higher education leaders in the adoption process of Instructional Technology and Distance Education. This included an examination of the decision-making process and what determined if Instructional Technology and Distance Education were either implemented or upgraded at various higher learning institutions.

The researcher implemented a mixed-methods …


Reduction Of False Positives In Intrusion Detection Based On Extreme Learning Machine With Situation Awareness, Donald A. Burgio Jan 2019

Reduction Of False Positives In Intrusion Detection Based On Extreme Learning Machine With Situation Awareness, Donald A. Burgio

CCE Theses and Dissertations

Protecting computer networks from intrusions is more important than ever for our privacy, economy, and national security. Seemingly a month does not pass without news of a major data breach involving sensitive personal identity, financial, medical, trade secret, or national security data. Democratic processes can now be potentially compromised through breaches of electronic voting systems. As ever more devices, including medical machines, automobiles, and control systems for critical infrastructure are increasingly networked, human life is also more at risk from cyber-attacks. Research into Intrusion Detection Systems (IDSs) began several decades ago and IDSs are still a mainstay of computer and …


Exploring Strategies To Integrate Disparate Bioinformatics Datasets, Charbel Bader Fakhry Jan 2019

Exploring Strategies To Integrate Disparate Bioinformatics Datasets, Charbel Bader Fakhry

Walden Dissertations and Doctoral Studies

Distinct bioinformatics datasets make it challenging for bioinformatics specialists to locate the required datasets and unify their format for result extraction. The purpose of this single case study was to explore strategies to integrate distinct bioinformatics datasets. The technology acceptance model was used as the conceptual framework to understand the perceived usefulness and ease of use of integrating bioinformatics datasets. The population of this study included bioinformatics specialists of a research institution in Lebanon that has strategies to integrate distinct bioinformatics datasets. The data collection process included interviews with 6 bioinformatics specialists and reviewing 27 organizational documents relating to integrating …


Knowledge Sharing And Customer Relations In Mobility, Katie Dyretha Moore Jan 2019

Knowledge Sharing And Customer Relations In Mobility, Katie Dyretha Moore

Walden Dissertations and Doctoral Studies

After the events of September 11, 2001, inadequacies in how government organizations and agencies shared knowledge and communication with defense mission partners became readily apparent. A reasonable U.S. government information technology expectation is the integrated use of mobile phones across organizations and agencies. Yet, it is difficult to meet this expectation, as the provisioning process for mobile devices can be different for each government organization or agency. The Department of Commerce National Institute of Standards and Technology does not set provisioning standards, and organizations and agencies determine policies tailored to their particular needs. Using Schein's theory on organizational culture, the …


Examining The Impact Of Learning Management Systems In Computer Programming Courses, Mohammed Naif Alatawi Jan 2019

Examining The Impact Of Learning Management Systems In Computer Programming Courses, Mohammed Naif Alatawi

CCE Theses and Dissertations

The development of software and communication technologies in education has led the majority of universities worldwide to integrate the functions of Learning Management Systems (LMSs) into their learning environments. LMSs offers several features that encourage their use by universities and other educational institutions, such as unlimited access to course content, easy tracking of learners’ progress and performance, and reduced costs in terms of both money and time. Most existing LMS studies have been focused on experienced LMS users who are familiar with its functions, with little consideration given to new users. Furthermore, although previous researchers have identified various means of …


The Factors That Impact Patient Portal Utilization, William Carroll Reed Jan 2019

The Factors That Impact Patient Portal Utilization, William Carroll Reed

CCE Theses and Dissertations

Spawned by legislative mandates, such as the American Recovery and Reinvestment Act of 2009’s Health Information Technology for Economic and Clinical Health Act, and individuals desiring to have more personal accountability for their health and healthcare, the introduction and use of electronic personal health information (ePHI) has grown substantially. Given that most ePHI is maintained within the healthcare delivery system, an information portal is required for individuals to have access to the ePHI. As a result, the legislation required the introduction and use of patient portals to grant such access.

Despite substantial financial incentives and disincentives for healthcare organizations to …


An Examination Of User Detection Of Business Email Compromise Amongst Corporate Professionals, Shahar Sean Aviv Jan 2019

An Examination Of User Detection Of Business Email Compromise Amongst Corporate Professionals, Shahar Sean Aviv

CCE Theses and Dissertations

With the evolution in technology and increase in utilization of the public Internet, Internet-based mobile applications, and social media, security risks for organizations have greatly increased. While corporations leverage social media as an effective tool for customer advertisements, the abundance of information available via public channels along with the growth in Internet connections to corporate networks including mobile applications, have made cyberattacks attractive for cybercriminals. Cybercrime against organizations is a daily threat and targeting companies of all sizes. Cyberattacks are continually evolving and becoming more complex that make it difficult to protect against with traditional security methods. Cybercriminals utilize email …


Information Systems Security Leadership: An Empirical Study Of Behavioral Influences Of Leaders On Employees’ Security Compliance, Marcus Alan Winkfield Jan 2019

Information Systems Security Leadership: An Empirical Study Of Behavioral Influences Of Leaders On Employees’ Security Compliance, Marcus Alan Winkfield

CCE Theses and Dissertations

This empirical study examined the behavioral influences of leaders on employees’ security compliance. Organizations can use leadership concepts in the field of Information Systems (IS) security. Despite the adoption of technical and managerial approaches, organizations still face issues motivating employee IS security compliance. This dissertation argued that organizations need strong leadership to encourage employees. Using the expectancy theory, this paper created a theoretical model to help understand the influence of task and relationship-oriented leadership behaviors on nontechnical controls IS security compliance. The conceptual underpinnings translated into perceived security effort, perceived security performance, and expected security outcomes. The theoretical model was …


Exploring How Integrating Art & Animation In Teaching Text-Based Programming Affects High School Students' Interest In Computer Science, Hadeel Mohammed Jawad Jan 2018

Exploring How Integrating Art & Animation In Teaching Text-Based Programming Affects High School Students' Interest In Computer Science, Hadeel Mohammed Jawad

Master's Theses and Doctoral Dissertations

As oil is the fuel of the industrial society, software is the fuel of our current information society. According to the Bureau of Labor Statistics, there will be more demand for computing jobs in the future. By 2024, more than one million computing jobs will be available. Statistics show that there is more demand for computing jobs than there is a supply of qualified graduates from universities. In this experimental study, three groups of high school students were targeted to explore how integrating art, animation, and code sharing into programming affects their interest in pursuing a degree in computer science …


Public Health Providers' Perceptions Of Electronic Health Records In A Disaster, Sherhonda Yvette Harper Jan 2018

Public Health Providers' Perceptions Of Electronic Health Records In A Disaster, Sherhonda Yvette Harper

Walden Dissertations and Doctoral Studies

The introduction of federal initiatives and incentives regarding health information technology fostered a movement towards the adoption of electronic health records (EHR). Implementation of EHRs sparked discussions among healthcare providers, patients, and others about the benefits or challenges of the move from the traditional paper method to the electronic version in healthcare settings. A knowledge gap in research involving the usefulness of EHRs and their impact to the delivery of care in other settings exists. The purpose of this qualitative study was to explore public health providers' perceptions of the meaningful use of EHRs in a disaster setting. Study participants …


Exploring Management Practices Of The Health Care System For Contractors, Gary L. Williams Jan 2018

Exploring Management Practices Of The Health Care System For Contractors, Gary L. Williams

Walden Dissertations and Doctoral Studies

Researchers have found that military members serving in war experienced changes in physical and mental health. Military members' healthcare is managed by the Department of Defense. The problem was that management practices of the system for providing long-term healthcare for employees of a contracting company working in foreign combat zones is either minimal or nonexistent. The purpose of this case study was to explore ways that contractor managers and government managers can work together to provide healthcare for those contract employees who will be deployed with the U.S. military. The primary research question was to determine what managers of contractors …


Strategies For E-Commerce Adoption In A Travel Agency, Anita Smith Jan 2018

Strategies For E-Commerce Adoption In A Travel Agency, Anita Smith

Walden Dissertations and Doctoral Studies

In 2016, online travel sales increased 8%, resulting in profits increasing to over 565 billion U.S. dollars. Traditional travel agencies in brick-and-mortar storefronts are facing challenges related to competing with online travel agencies (OTAs), attracting new customers, and retaining existing customers. The purpose of this qualitative case study was to explore the e-commerce processes, business models, and strategies that leaders of traditional travel agencies use to compete with OTAs. The study sample consisted of 8 travel professionals from 3 small travel agencies located in the mid-Atlantic region of the United States. The conceptual framework for this study was Rogers's diffusion …


Exploring Welfare Recipients' Self-Sufficiency Barriers Through Information Management Systems In Tennessee, Valenta Eunice Nichols Jan 2018

Exploring Welfare Recipients' Self-Sufficiency Barriers Through Information Management Systems In Tennessee, Valenta Eunice Nichols

Walden Dissertations and Doctoral Studies

Families living on welfare in low-income impoverished neighborhoods encounter multiple barriers that need mitigating before seeking work to reach self-sufficiency. Many welfare recipients' self-sufficiency barriers are unnoticeable to caseworkers due to lack of data sharing to assess clients' needs through information technology processes. The purpose of this exploratory descriptive phenomenological qualitative study was to understand welfare recipients' viewpoints on socioeconomic barriers to living self-sufficiently and gain perspectives from human services caseworkers and technical resources on data sharing issues that impact recipients' ability to live independently from government assistance. Data collection and observational field notes resulted from in-depth interviews of 11 …


Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster Jan 2017

Information Technology Training To Promote Collaboration Among Multiple Generations, Gregg Foster

Walden Dissertations and Doctoral Studies

The decision to implement information technology (IT) initiatives to enhance collaboration among veterans, baby boomers, Generation X, Generation Y, and Fifth Generation employees continues to challenge organizational leaders. The purpose of this nonexperimental study was to identify how the implementation of information technology initiatives, coupled with the knowledge of learning styles, might enhance collaboration among generational cohort employees. The generational cohort theory, Maslow's hierarchy of needs theory, and the technology acceptance model were the theoretical frameworks used to develop an understanding of the relationships among the cohorts and the acceptance of technology to enhance collaboration. Data were collected from a …


Strategies To Manage Enterprise Information Technology Projects, Mario West Jan 2017

Strategies To Manage Enterprise Information Technology Projects, Mario West

Walden Dissertations and Doctoral Studies

Since 2005, most midsize company information technology (IT) projects had a 62.4% failure rate because of wrong project team communication skills or cost overruns. IT leaders expect negative IT project outcomes will cost over $2 billion by 2020. Using the actor-network theory, the purpose of this single case study was to explore strategies used by IT leaders from a midsize IT company in Washington, D.C. to plan and execute projects under budget and on time. Using purposeful sampling, 5 IT leaders were selected for this study because of their experience in implementing successful strategies for projects. Data were collected using …


Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima Jan 2017

Automated Rendering Of Schema Diagram For Ontologies, Nazifa Karima

Browse all Theses and Dissertations

Semantic Web extends the current web, using ontologies, metadata and other technologies to establish links between terms and concepts. This enables machines to automatically integrate information across different platforms utilizing the standard definitions. Furthermore, reasoning agents can infer new knowledge by gathering existing information and these additional connections between them. As a result of being designed and maintained independently, data sources exhibit highly heterogeneous nature. This increases the complexity of data integration and hinders interoperability. However, if we can align the overlapping concepts among different domains of knowledge, the prospect of achieving interoperability and integration without having any intermediate reasoning …


Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan Dec 2016

Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan

Information Technology Capstone Research Project Reports

The purpose of this project is to design a suitable network system for universities in developing countries. The aim was to design a network with high-quality security and low cost, in such a way that network devices of universities in developing countries, will meet standards associated with the universities in developed countries. This project will help to enhance education in developing countries. There are many devices that were used in designing the network, such as routers, switches, backup, firewall, and servers. All devices were connected to each other to make integration network system and configured by putting IP addresses to …