Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 76

Full-Text Articles in Physical Sciences and Mathematics

Exploring Strategies For Adapting Traditional Vehicle Design Frameworks To Autonomous Vehicle Design, Alex Munoz Jan 2020

Exploring Strategies For Adapting Traditional Vehicle Design Frameworks To Autonomous Vehicle Design, Alex Munoz

Walden Dissertations and Doctoral Studies

Fully autonomous vehicles are expected to revolutionize transportation, reduce the cost of ownership, contribute to a cleaner environment, and prevent the majority of traffic accidents and related fatalities. Even though promising approaches for achieving full autonomy exist, developers and manufacturers have to overcome a multitude of challenged before these systems could find widespread adoption. This multiple case study explored the strategies some IT hardware and software developers of self-driving cars use to adapt traditional vehicle design frameworks to address consumer and regulatory requirements in autonomous vehicle designs. The population consisted of autonomous driving technology software and hardware developers who are …


Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon Jan 2020

Exploring Strategies For Recruiting And Retaining Diverse Cybersecurity Professionals, Vivian Lyon

Walden Dissertations and Doctoral Studies

The cyber threat landscape has led some cybersecurity leaders to focus on a holistic approach encompassing people, processes, and technology to make their government agencies and organizations more responsive to a more diverse and inclusive cyber workforce to protect critical infrastructure from hackers or cybercriminals intent on causing harm. This qualitative multiple case study used Schein’s organizational culture theory to explore strategies used by cybersecurity leaders to attract, recruit, and retain diverse cybersecurity professionals to effectively and efficiently protect sensitive systems from rising cyber threats. The study's population consisted of cybersecurity leaders from 3 government agencies and 9 organizations in …


Information Systems Strategies For Small And Medium Size Enterprise Sustainability, Oluseyi Solomon Awotayo Jan 2020

Information Systems Strategies For Small And Medium Size Enterprise Sustainability, Oluseyi Solomon Awotayo

Walden Dissertations and Doctoral Studies

Small and medium size business owners who do not use information systems effectively degrade business models, reduce customer value, and diminish the prospects for business stability, profitability, and growth. Grounded in the resource based view framework, the purpose of this qualitative multiple-case study was to explore the information systems strategies small business owners used to sustain their business beyond 5 years. A purposeful sample of 5 owners of 5 different small and medium sized businesses in the state of Texas participated in the study. Data were collected via semistructured, face-to-face interviews, company documents, and member checking. Data were analyzed using …


Exploring Cybersecurity Awareness And Training Strategies To Protect Information Systems And Data, Michael Hanna Jan 2020

Exploring Cybersecurity Awareness And Training Strategies To Protect Information Systems And Data, Michael Hanna

Walden Dissertations and Doctoral Studies

Ineffective security education, training, and awareness (SETA) programs contribute to compromises of organizational information systems and data. Inappropriate actions from users due to ineffective SETA programs may result in legal consequences, fines, reputational damage, adverse impacts on national security, and criminal acts. Grounded in social cognitive theory, the purpose of this qualitative multiple case study was to explore strategies hospitality organizational information technology (IT) leaders utilized to implement SETA successfully. The participants were organizational IT leaders from four organizations in Hampton Roads, Virginia. Data collection was performed using telephone and video teleconference interviews with organizational IT leaders (n = 6) …


Strategies For Automating Pharmacovigilance Adverse Event Case Processing, Mythily Easwar Jan 2020

Strategies For Automating Pharmacovigilance Adverse Event Case Processing, Mythily Easwar

Walden Dissertations and Doctoral Studies

Business leaders who fail to implement innovative technology solutions in their companies face economic distress in these organizations. Guided by the task technology fit model as the conceptual framework, the purpose of this qualitative single case study was to explore strategies used by pharmacovigilance (PV) systems leaders to implement innovative technology solutions. The participants were 4 PV systems managers working in a pharmaceutical company in the Boston area of Massachusetts, United States, who used successful strategies to implement innovative technology solutions to automate adverse events case processing. Data were collected using semistructured interviews and company documents. The collected data were …


Information Technology Disaster Recovery Planning By Florida Nonprofit Organizations, Derek Keith Erfourth Jan 2020

Information Technology Disaster Recovery Planning By Florida Nonprofit Organizations, Derek Keith Erfourth

Walden Dissertations and Doctoral Studies

Inadequate information technology (IT) disaster recovery planning (DRP) by nonprofit organizations could lead to organizational failure post-large-scale natural disasters. Without proper funding and planning, organizations may not be able to withstand the effects of a natural disaster resulting in the closure and the community losing a critical need service. Grounded in resilience theory, the purpose of this qualitative multiple case study was to explore strategies utilized by Florida-based nonprofit organization technology managers to adopt and implement an IT DRP to aid in post-natural disaster recovery efforts. The data collection included interviews with 5 IT managers and reviews of 4 business …


Implementing Cloud-Based Enterprise Resource Planning Solutions In Small And Medium Enterprises, Ali Hamdar Jan 2020

Implementing Cloud-Based Enterprise Resource Planning Solutions In Small And Medium Enterprises, Ali Hamdar

Walden Dissertations and Doctoral Studies

Lacking strategies to implement a cloud-based enterprise resource planning (ERP) solution in small and medium-sized enterprises (SMEs) can lead to a failed implementation. SME owners can improve company performance by integrating company processes by successfully implementing a cloud-based ERP solution. Grounded in the diffusion of innovation theory augmented with business process management design for Six Sigma, the purpose of this qualitative multiple case study was to explore strategies SME owners use to implement cloud-based ERP solutions. The participants consisted of 4 SME owners in Lebanon who successfully implemented a cloud-based ERP solution and improved company performance and growth. Data were …


Strategies In Software Development Effort Estimation, Kevin R. Roark Jan 2020

Strategies In Software Development Effort Estimation, Kevin R. Roark

Walden Dissertations and Doctoral Studies

Software development effort estimating has notoriously been the Achilles heel of the software planning process. Accurately evaluating the effort required to accomplish a software change continues to be problematic, especially in Agile software development. IT organizations and project managers depend on estimation accuracy for planning software deliveries and cost determination. The purpose of this multiple case qualitative study was to identify strategies used by software development professionals in providing accurate effort estimations to stakeholders. The planning fallacy served as the study’s conceptual framework. The participants were 10 software development professionals who were actively engaged in delivering estimates of effort on …


Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu Jan 2020

Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu

Walden Dissertations and Doctoral Studies

Information technology (IT) employees of small business organizations have been the driving force for the implementation of innovative standardized IT service management and process improvement initiatives. Competitiveness amongst small business IT organizations in the market for quality IT service delivery led small business IT leaders toward the implementation of an information technology infrastructure library (ITIL) as an IT service management framework. The problem addressed in this research encompassed the needs of small business IT leaders and ITIL designers to understand the perceptions of IT operation employees following ITIL implementation. The purpose of this qualitative multiple case study was to explore …


Knowledge Management, Innovations Systems, And Firm Performance, Henry Dion Young Jan 2020

Knowledge Management, Innovations Systems, And Firm Performance, Henry Dion Young

Walden Dissertations and Doctoral Studies

Small and medium sized-enterprise managers are unable to effectively manage employees’ knowledgeability and innovation systems successfully, which results in negative firm performance. Managers who do not consider employee knowledge management and the benefits related to innovation systems experience financial hardships within the organization. Grounded in the unified model of dynamic organizational knowledge creation theory, the purpose of this quantitative correlational study was to examine the relationship between knowledge management, innovation systems, and firm performance. Data were collected using SurveyMonkey to gather online survey responses from 80 small and medium-sized enterprise managers in California. The results of the standard multiple linear …


Factors That Influence Throughput On Cloud-Hosted Mysql Server, Eric Brown Jan 2020

Factors That Influence Throughput On Cloud-Hosted Mysql Server, Eric Brown

Walden Dissertations and Doctoral Studies

Many businesses are moving their infrastructure to the cloud and may not fully understand the factors that can increase costs. With so many factors available to improve throughput in a database, it can be difficult for a database administrator to know which factors can provide the best efficiency to maintain lower costs. Grounded in Six Sigma theoretical framework, the purpose of this quantitative, quasi-experimental study was to evaluate the relationship between the time of day, the number of concurrent users, InnoDB buffer pool size, InnoDB Input/Output capacity, and MySQL transaction throughput to a MySQL database running on a cloud, virtual, …


A Secure And Strategic Approach To Keep Iot Devices Safe From Malware Attack, Christopher Ray Murray Jan 2020

A Secure And Strategic Approach To Keep Iot Devices Safe From Malware Attack, Christopher Ray Murray

Walden Dissertations and Doctoral Studies

Through the advances in technology, businesses can now utilize the Internet of Things (IoT) devices to improve workflow and provide better services to customers. However, without a strategy to secure these devices, Information Technology (IT) security professionals are left with vulnerable equipment. Grounded in routine activities theory, the purpose of this qualitative multiple case study was to determine strategies IT security professionals used to protect IoT devices in their environment. The participants were 6 IT professionals from 2 medium to large size healthcare facilities based in the Buffalo, New York, and the Washington D.C. area, who possessed strategies to protect …


Relationship Between Risk Identification, Risk Response, And Project Success, Marsha Marinich Jan 2020

Relationship Between Risk Identification, Risk Response, And Project Success, Marsha Marinich

Walden Dissertations and Doctoral Studies

AbstractProjects are used to implement the organization's strategic goals, but high failure rates reduce projects' effectiveness in successfully achieving goals. High failure rates reduce project managers’ effectiveness of projects in successfully achieving goals. Senior leaders and project managers are unable to deliver successful projects due to unmanaged risks. Grounded in expected utility theory, the purpose of this quantitative correlational study was to examine the relationship between risk identification, risk responses, and project success. A survey was created in SurveyMonkey® and distributed on LinkedIn. Survey responses were analyzed from 71 project managers with at least five years of experience in Washington, …


Organization Global Software Development Challenges Of Software Product Quality, Patrick Enabudoso Jan 2020

Organization Global Software Development Challenges Of Software Product Quality, Patrick Enabudoso

Walden Dissertations and Doctoral Studies

Leaders of global software development (GSD) processes in organizations have been confronting low software product quality. Managers of these processes have faced challenges that have been affecting customer satisfaction and that have resulted in negative social impacts on public safety, business financial performance, and global economic stability. The purpose of this qualitative exploratory multiple case study was to discover a common understanding shared by managers in Canadian GSD organizations of how to meet software product quality goals and enhance customer satisfaction. The conceptual framework for the study was based on Deming's 14 principles of quality management. The purposeful sample included …


Exploring Strategies To Transition To Big Data Technologies From Dw Technologies, Mbah Johnas Fortem Jan 2020

Exploring Strategies To Transition To Big Data Technologies From Dw Technologies, Mbah Johnas Fortem

Walden Dissertations and Doctoral Studies

As a result of innovation and technological improvements, organizations are now capable of capturing and storing massive amounts of data from various sources and domains. This increase in the volume of data resulted in traditional tools used for processing, storing, and analyzing large amounts of data becoming increasingly inefficient. Grounded in the extended technology acceptance model, the purpose of this qualitative multiple case study was to explore the strategies data managers use to transition from traditional data warehousing technologies to big data technologies. The participants included data managers from 6 organizations (medium and large size) based in Munich, Germany, who …


Strategies For Managing Offshore Outsourcing For Business Sustainability, Idrissa Maiga Hamidou Issa Jan 2020

Strategies For Managing Offshore Outsourcing For Business Sustainability, Idrissa Maiga Hamidou Issa

Walden Dissertations and Doctoral Studies

Ineffective offshore outsourcing strategies can contribute to unexpected and significant costs for businesses. Strategies to improve outsourcing outcomes are critical to business managers because often third parties contracted to implement offshore outsourcing fail to fulfil business managers’ expectations who can benefit from understanding how to manage outsourced operations and anticipate potential problems. Grounded in transaction cost theory, cultural and customs theory, and the resource-based view theory, the purpose of this qualitative single case study was to explore strategies and processes business managers use to maintain their organization after the implementation of offshore outsourcing. The participants consisted of 3 managers who …


Factors Affecting Electronic Banking Adoption In Barbados, Jacqueline Delores Bend Jan 2020

Factors Affecting Electronic Banking Adoption In Barbados, Jacqueline Delores Bend

Walden Dissertations and Doctoral Studies

The low rate of customers' adoption of electronic banking services affects retail banks' profitability. The operating cost for a financial transaction performed by bank tellers averages US$1.07 compared to US$0.01 using electronic banking channels. It is paramount for retail banking leaders to understand the factors influencing customer adoption of electronic banking to sustain competitive advantage. Grounded in the technology acceptance model framework, the purpose of this quantitative correlational study was to examine the relationship between perceived usefulness (PU), perceived ease of use (PEOU), and customer adoption of electronic banking in Barbados. The validated technology acceptance model survey instrument was used …


Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove Jan 2020

Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove

Walden Dissertations and Doctoral Studies

Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …


The Impact Of Technological Advances On Older Workers, Toni Mcintosh Jan 2020

The Impact Of Technological Advances On Older Workers, Toni Mcintosh

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was the treatment of older workers in the information technology industry that contributes to age discrimination in the workplace. Age discrimination is against the law irrespective of whether it is aimed at older workers in the workforce or becoming job candidates at an advanced age. Although previous research has shown that age discrimination is prevalent in work environments, little has been suggested to eradicate the issue in the workplace. The purpose of this qualitative case study was to investigate the issue of age discrimination as it relates to workers over the age of …


Youth Leadership Development Program Evaluation, Loreley Lyn Smith Jan 2020

Youth Leadership Development Program Evaluation, Loreley Lyn Smith

Walden Dissertations and Doctoral Studies

In competitive youth sports organizations, few organizational leaders focus on leadership development to prepare youth for life situations. Sports organizational leaders are concerned about youth leadership development, as development allows youth to build skills necessary to understand their strengths and weaknesses and recognize ways to overcome fears. Grounded in social learning theory, the purpose of this summative program evaluation was to determine the extent to which a competitive youth sports leadership development program aligned with the organization’s primary objective to provide skilled athletic training while providing lessons to prepare youth for adulthood. The participants comprised 40 key stakeholders, including participants …


Analysis Of Driving Forces That Ensures The Sustainability Of Voter Accreditation Technology, Lawrence Oluwagbenga Bayode Jan 2020

Analysis Of Driving Forces That Ensures The Sustainability Of Voter Accreditation Technology, Lawrence Oluwagbenga Bayode

Walden Dissertations and Doctoral Studies

Nigeria’s electoral body, the independent national electoral commission (INEC), deployed a novel information technology (IT) based voter accreditation technology in 2015. Benefits realized included transparency and curtailed electoral malpractices. The purpose of this quantitative correlational study was to examine the relationship(s) between some variables categorized into technological, organizational, and economic factors, and Sustainability of voter accreditation technology (SVAT). The theoretical framework for the study was the e-voting system adoption model in combination with constructs from three other theories. A total of 138 IT experts participated and were asked (via SurveyMonkey) of the relationships between the following factors and SVAT: ease …


Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham Jan 2020

Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham

Walden Dissertations and Doctoral Studies

Consumer online activities can generate massive volumes of data that private companies may collect and use for business purposes. Consumer personal data need to be protected from unauthorized access and misuse. The specific problem is that consumers have little control regarding their data being collected and used by private companies. The purpose of this qualitative archival research was to explore business practices involving collection and use of consumer data without an individual’s consent. This study used the big data ethical conceptual framework to focus on various privacy issues, including those related to ownership, transparency, ethics, and consumer privacy laws. Archival …


Strategies Used By It Project Managers To Integrate Icts In The Eastern Caribbean, Carl St. Aubin Roberts Jan 2020

Strategies Used By It Project Managers To Integrate Icts In The Eastern Caribbean, Carl St. Aubin Roberts

Walden Dissertations and Doctoral Studies

Current practices used to guide information and communication technology (ICT) projects in the Caribbean and developing countries lead to high project failure rates. Project managers must adopt new innovative approaches for transformation towards a 21st-century information society and sustainable digital economies. Grounded in the technology acceptance model (TAM), the purpose of this qualitative multiple-case study was to explore strategies information technology (IT) project managers use to implement IT frameworks designed to guide Caribbean ICT integration. Data were collected from face to face interviews and company documents and analyzed using coding, thematic analysis, and methodological triangulation. The participants were 12 IT …


Technology Business Leaders' Strategies To Increase Employees' Engagement, Desmond J. L. Browne Jan 2020

Technology Business Leaders' Strategies To Increase Employees' Engagement, Desmond J. L. Browne

Walden Dissertations and Doctoral Studies

AbstractEmployee disengagement is costly and reduces an organization's ability to meet its full potential to produce business results. Technology business leaders who have engaged employees can positively alter the company's rapid transformation to be more competitive. Grounded by the social exchange theory, the purpose of this qualitative single case study was to explore strategies 6 technology leaders in the Atlanta metropolitan area use to engage employees. Data were collected through semistructured interviews and company documents. Data were analyzed using Yin's 5-step data analysis process. Three themes emerged: communicate with transparency, provide offerings for training and rewards, and identify and implement …


Exploring The Relationship Between Iot Security And Standardization, James Jenness Clapp Jan 2020

Exploring The Relationship Between Iot Security And Standardization, James Jenness Clapp

Walden Dissertations and Doctoral Studies

The adoption of the Internet of Things (IoT) technology across society presents new and unique challenges for security experts in maintaining uninterrupted services across the technology spectrum. A botnet implemented over 490,000 IoT connected devices to cripple the Internet services for major companies in one recent IoT attack. Grounded in Roger’s diffusion of innovations theory, the purpose of this qualitative exploratory multiple-case study was to explore implementation strategies used by some local campus IT managers in educational institutions in the United States to secure the IoT environment. The participants were 10 IT local campus IT managers within educational institutions across …


Denial Of Service Attacks: Difference In Rates, Duration, And Financial Damages And The Relationship Between Company Assets And Revenues, Abebe Gebreyes Jan 2020

Denial Of Service Attacks: Difference In Rates, Duration, And Financial Damages And The Relationship Between Company Assets And Revenues, Abebe Gebreyes

Walden Dissertations and Doctoral Studies

AbstractDenial-of-service/distributed denial-of-service (DoS) attacks on network connectivity are a threat to businesses that academics and professionals have attempted to address through cyber-security practices. However, currently there are no metrics to determine how attackers target certain businesses. The purpose of this quantitative study was to address this problem by, first, determining differences among business sectors in rates and duration of attacks and financial damages from attacks and, second, examining relationship among assets and/or revenues and duration of attacks and financial damages. Cohen and Felson's routine activity theory and Cornish and Clarke's rational choice theory served as frameworks as they address the …


Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch Jan 2020

Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch

Walden Dissertations and Doctoral Studies

AbstractElectronic health record system implementations have a high failure rate when properly developed strategies are not used. These implementation failures affect healthcare workers and practitioners core roles through a lack of documentation practices, which decreases the quality of the care of the patients. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore the strategies information technology systems engineers use for the implementation of Health Information Management Systems. The participants were 10 information technology systems engineers from three healthcare organizations in the greater Tennessee area. The data were collected through recorded participant interviews …


Information Technology Strategies Automotive Retailers Use To Improve Customer Retention, Alexious Mulemba Jan 2020

Information Technology Strategies Automotive Retailers Use To Improve Customer Retention, Alexious Mulemba

Walden Dissertations and Doctoral Studies

Business managers in the automotive retail industry face challenges in retaining customers in sales operations. Automotive business managers' failure to retain customers negatively affects sales, revenue, and sustainable business performance. Grounded in expectation-confirmation theory, the purpose of this qualitative multiple case study was to explore the IT strategies some business managers use in the automotive retail industry to retain customers. The participants comprised 4 business managers from 2 automotive retail dealerships in the Western Region of Saudi Arabia, who used IT strategies to retain customers. Data were collected from semistructured interviews, interview notes, and company documents. Four themes emerged: customer …


Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna Jan 2020

Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna

Walden Dissertations and Doctoral Studies

Healthcare organizations generate massive amounts of data through their databases that may be vulnerable to data breaches due to extensive user privileges, unpatched databases, standardized query language injections, weak passwords/usernames, and system weaknesses. The purpose of this qualitative multiple case study was to explore technical strategies database managers in Southeast/North Texas used to protect database systems from data breaches. The target population consisted of database managers from 2 healthcare organizations in this region. The integrated system theory of information security management was the conceptual framework. The data collection process included semistructured interviews with 9 database managers, including a review of …


Social Presence, Immediacy Of Communication, Concurrency, And Use Of Enterprise Social Networks, Veleta A. Gordon Jan 2020

Social Presence, Immediacy Of Communication, Concurrency, And Use Of Enterprise Social Networks, Veleta A. Gordon

Walden Dissertations and Doctoral Studies

Managers are faced with low continuous postadoption usage rates for enterprise social networks implemented at high costs. The problem is a potential loss of value-added benefits when organizations experience a lapse in continuous usage of enterprise social networks among corporate knowledge workers. The purpose of this quantitative study was to test the unified theory of acceptance and use of technology that relates collaboration technology constructs to continuous usage of enterprise social networks for knowledge workers at information technology Fortune 500 companies in the United States. The key research question aimed to examine the relationship among social presence, immediacy of communication, …