Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Leadership Styles And Emotional Intelligence Of Federal Employees In Diversified Work Environments, Richard Lopez Jan 2020

Leadership Styles And Emotional Intelligence Of Federal Employees In Diversified Work Environments, Richard Lopez

Walden Dissertations and Doctoral Studies

On the Office of Personnel Management Federal Viewpoint Surveys, followers rated their leaders as ineffective. The public expects federal government leaders to effectively lead their followers in order to efficiently manage public services. The purpose of this correlational nonexperimental study was to determine whether there is a correlation between emotional intelligence (EQ) and a full range of leadership styles, as measured by the multileadership questionnaire (MLQ), from the perspective of the follower. Grounded in the theory of EQ, the extant scholarly literature revealed EQ skills complements leadership styles and predict leader success in a variety of business sectors, cultures, and …


Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson Jan 2020

Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson

Walden Dissertations and Doctoral Studies

Seismic data loss attributed to cybersecurity attacks has been an epidemic-level threat currently plaguing the U.S. healthcare system. Addressing cyber attacks is important to information technology (IT) security managers to minimize organizational risks and effectively safeguard data from associated security breaches. Grounded in the protection motivation theory, the purpose of this qualitative multiple case study was to explore risk-based strategies used by IT security managers to safeguard data effectively. Data were derived from interviews of eight IT security managers of four U.S. government health institutions and a review of relevant organizational documentation. The research data were coded and organized to …