Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 76

Full-Text Articles in Physical Sciences and Mathematics

Exploring Strategies For Adapting Traditional Vehicle Design Frameworks To Autonomous Vehicle Design, Alex Munoz Jan 2020

Exploring Strategies For Adapting Traditional Vehicle Design Frameworks To Autonomous Vehicle Design, Alex Munoz

Walden Dissertations and Doctoral Studies

Fully autonomous vehicles are expected to revolutionize transportation, reduce the cost of ownership, contribute to a cleaner environment, and prevent the majority of traffic accidents and related fatalities. Even though promising approaches for achieving full autonomy exist, developers and manufacturers have to overcome a multitude of challenged before these systems could find widespread adoption. This multiple case study explored the strategies some IT hardware and software developers of self-driving cars use to adapt traditional vehicle design frameworks to address consumer and regulatory requirements in autonomous vehicle designs. The population consisted of autonomous driving technology software and hardware developers who are …


Factors Affecting Electronic Banking Adoption In Barbados, Jacqueline Delores Bend Jan 2020

Factors Affecting Electronic Banking Adoption In Barbados, Jacqueline Delores Bend

Walden Dissertations and Doctoral Studies

The low rate of customers' adoption of electronic banking services affects retail banks' profitability. The operating cost for a financial transaction performed by bank tellers averages US$1.07 compared to US$0.01 using electronic banking channels. It is paramount for retail banking leaders to understand the factors influencing customer adoption of electronic banking to sustain competitive advantage. Grounded in the technology acceptance model framework, the purpose of this quantitative correlational study was to examine the relationship between perceived usefulness (PU), perceived ease of use (PEOU), and customer adoption of electronic banking in Barbados. The validated technology acceptance model survey instrument was used …


Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove Jan 2020

Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove

Walden Dissertations and Doctoral Studies

Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …


The Impact Of Technological Advances On Older Workers, Toni Mcintosh Jan 2020

The Impact Of Technological Advances On Older Workers, Toni Mcintosh

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was the treatment of older workers in the information technology industry that contributes to age discrimination in the workplace. Age discrimination is against the law irrespective of whether it is aimed at older workers in the workforce or becoming job candidates at an advanced age. Although previous research has shown that age discrimination is prevalent in work environments, little has been suggested to eradicate the issue in the workplace. The purpose of this qualitative case study was to investigate the issue of age discrimination as it relates to workers over the age of …


Youth Leadership Development Program Evaluation, Loreley Lyn Smith Jan 2020

Youth Leadership Development Program Evaluation, Loreley Lyn Smith

Walden Dissertations and Doctoral Studies

In competitive youth sports organizations, few organizational leaders focus on leadership development to prepare youth for life situations. Sports organizational leaders are concerned about youth leadership development, as development allows youth to build skills necessary to understand their strengths and weaknesses and recognize ways to overcome fears. Grounded in social learning theory, the purpose of this summative program evaluation was to determine the extent to which a competitive youth sports leadership development program aligned with the organization’s primary objective to provide skilled athletic training while providing lessons to prepare youth for adulthood. The participants comprised 40 key stakeholders, including participants …


Analysis Of Driving Forces That Ensures The Sustainability Of Voter Accreditation Technology, Lawrence Oluwagbenga Bayode Jan 2020

Analysis Of Driving Forces That Ensures The Sustainability Of Voter Accreditation Technology, Lawrence Oluwagbenga Bayode

Walden Dissertations and Doctoral Studies

Nigeria’s electoral body, the independent national electoral commission (INEC), deployed a novel information technology (IT) based voter accreditation technology in 2015. Benefits realized included transparency and curtailed electoral malpractices. The purpose of this quantitative correlational study was to examine the relationship(s) between some variables categorized into technological, organizational, and economic factors, and Sustainability of voter accreditation technology (SVAT). The theoretical framework for the study was the e-voting system adoption model in combination with constructs from three other theories. A total of 138 IT experts participated and were asked (via SurveyMonkey) of the relationships between the following factors and SVAT: ease …


Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham Jan 2020

Ethics Of Collection And Use Of Consumer Information On The Internet, Thanh M. Pham

Walden Dissertations and Doctoral Studies

Consumer online activities can generate massive volumes of data that private companies may collect and use for business purposes. Consumer personal data need to be protected from unauthorized access and misuse. The specific problem is that consumers have little control regarding their data being collected and used by private companies. The purpose of this qualitative archival research was to explore business practices involving collection and use of consumer data without an individual’s consent. This study used the big data ethical conceptual framework to focus on various privacy issues, including those related to ownership, transparency, ethics, and consumer privacy laws. Archival …


Strategies Used By It Project Managers To Integrate Icts In The Eastern Caribbean, Carl St. Aubin Roberts Jan 2020

Strategies Used By It Project Managers To Integrate Icts In The Eastern Caribbean, Carl St. Aubin Roberts

Walden Dissertations and Doctoral Studies

Current practices used to guide information and communication technology (ICT) projects in the Caribbean and developing countries lead to high project failure rates. Project managers must adopt new innovative approaches for transformation towards a 21st-century information society and sustainable digital economies. Grounded in the technology acceptance model (TAM), the purpose of this qualitative multiple-case study was to explore strategies information technology (IT) project managers use to implement IT frameworks designed to guide Caribbean ICT integration. Data were collected from face to face interviews and company documents and analyzed using coding, thematic analysis, and methodological triangulation. The participants were 12 IT …


Technology Business Leaders' Strategies To Increase Employees' Engagement, Desmond J. L. Browne Jan 2020

Technology Business Leaders' Strategies To Increase Employees' Engagement, Desmond J. L. Browne

Walden Dissertations and Doctoral Studies

AbstractEmployee disengagement is costly and reduces an organization's ability to meet its full potential to produce business results. Technology business leaders who have engaged employees can positively alter the company's rapid transformation to be more competitive. Grounded by the social exchange theory, the purpose of this qualitative single case study was to explore strategies 6 technology leaders in the Atlanta metropolitan area use to engage employees. Data were collected through semistructured interviews and company documents. Data were analyzed using Yin's 5-step data analysis process. Three themes emerged: communicate with transparency, provide offerings for training and rewards, and identify and implement …


Exploring The Relationship Between Iot Security And Standardization, James Jenness Clapp Jan 2020

Exploring The Relationship Between Iot Security And Standardization, James Jenness Clapp

Walden Dissertations and Doctoral Studies

The adoption of the Internet of Things (IoT) technology across society presents new and unique challenges for security experts in maintaining uninterrupted services across the technology spectrum. A botnet implemented over 490,000 IoT connected devices to cripple the Internet services for major companies in one recent IoT attack. Grounded in Roger’s diffusion of innovations theory, the purpose of this qualitative exploratory multiple-case study was to explore implementation strategies used by some local campus IT managers in educational institutions in the United States to secure the IoT environment. The participants were 10 IT local campus IT managers within educational institutions across …


Denial Of Service Attacks: Difference In Rates, Duration, And Financial Damages And The Relationship Between Company Assets And Revenues, Abebe Gebreyes Jan 2020

Denial Of Service Attacks: Difference In Rates, Duration, And Financial Damages And The Relationship Between Company Assets And Revenues, Abebe Gebreyes

Walden Dissertations and Doctoral Studies

AbstractDenial-of-service/distributed denial-of-service (DoS) attacks on network connectivity are a threat to businesses that academics and professionals have attempted to address through cyber-security practices. However, currently there are no metrics to determine how attackers target certain businesses. The purpose of this quantitative study was to address this problem by, first, determining differences among business sectors in rates and duration of attacks and financial damages from attacks and, second, examining relationship among assets and/or revenues and duration of attacks and financial damages. Cohen and Felson's routine activity theory and Cornish and Clarke's rational choice theory served as frameworks as they address the …


Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch Jan 2020

Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch

Walden Dissertations and Doctoral Studies

AbstractElectronic health record system implementations have a high failure rate when properly developed strategies are not used. These implementation failures affect healthcare workers and practitioners core roles through a lack of documentation practices, which decreases the quality of the care of the patients. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore the strategies information technology systems engineers use for the implementation of Health Information Management Systems. The participants were 10 information technology systems engineers from three healthcare organizations in the greater Tennessee area. The data were collected through recorded participant interviews …


Information Technology Strategies Automotive Retailers Use To Improve Customer Retention, Alexious Mulemba Jan 2020

Information Technology Strategies Automotive Retailers Use To Improve Customer Retention, Alexious Mulemba

Walden Dissertations and Doctoral Studies

Business managers in the automotive retail industry face challenges in retaining customers in sales operations. Automotive business managers' failure to retain customers negatively affects sales, revenue, and sustainable business performance. Grounded in expectation-confirmation theory, the purpose of this qualitative multiple case study was to explore the IT strategies some business managers use in the automotive retail industry to retain customers. The participants comprised 4 business managers from 2 automotive retail dealerships in the Western Region of Saudi Arabia, who used IT strategies to retain customers. Data were collected from semistructured interviews, interview notes, and company documents. Four themes emerged: customer …


Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna Jan 2020

Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna

Walden Dissertations and Doctoral Studies

Healthcare organizations generate massive amounts of data through their databases that may be vulnerable to data breaches due to extensive user privileges, unpatched databases, standardized query language injections, weak passwords/usernames, and system weaknesses. The purpose of this qualitative multiple case study was to explore technical strategies database managers in Southeast/North Texas used to protect database systems from data breaches. The target population consisted of database managers from 2 healthcare organizations in this region. The integrated system theory of information security management was the conceptual framework. The data collection process included semistructured interviews with 9 database managers, including a review of …


Social Presence, Immediacy Of Communication, Concurrency, And Use Of Enterprise Social Networks, Veleta A. Gordon Jan 2020

Social Presence, Immediacy Of Communication, Concurrency, And Use Of Enterprise Social Networks, Veleta A. Gordon

Walden Dissertations and Doctoral Studies

Managers are faced with low continuous postadoption usage rates for enterprise social networks implemented at high costs. The problem is a potential loss of value-added benefits when organizations experience a lapse in continuous usage of enterprise social networks among corporate knowledge workers. The purpose of this quantitative study was to test the unified theory of acceptance and use of technology that relates collaboration technology constructs to continuous usage of enterprise social networks for knowledge workers at information technology Fortune 500 companies in the United States. The key research question aimed to examine the relationship among social presence, immediacy of communication, …


Strategies To Digitize Business Processes, Mohamed Abdelmoneim Jan 2020

Strategies To Digitize Business Processes, Mohamed Abdelmoneim

Walden Dissertations and Doctoral Studies

Information technology leaders with limited digitization strategies are less profitable than competitors in the same industry. Without digital strategies, information technology leaders suffer from manual business processes, which results in losing business opportunities. Grounded in general systems theory, the purpose of this multiple case study was to explore the strategies that 10 IT leaders used to transform business processes digitally at four different organizations in Ireland. Data were collected using semistructured face-to-face interviews. The second data source was organizational digitization documents. The 3 themes that emerged from thematic analysis were (a) strong digital leadership competencies, (b) digitally aligned with the …


Effective Data Analytics And Security Strategies In Internal Audit Organizations, Desiree Auchey Jan 2020

Effective Data Analytics And Security Strategies In Internal Audit Organizations, Desiree Auchey

Walden Dissertations and Doctoral Studies

The digitization of the corporate and regulatory environment presents an opportunity for internal audit organizations to change their audit techniques and increase their value to corporations. Audit functions have not kept pace with these advancements, as evidenced by the massive frauds in recent years, and current audit methodology does not robustly incorporate analytics and security of data. Grounded in agency theory, the purpose of this qualitative case study was to explore successful strategies business leaders use to implement data analytics and security for internal auditing and fraudulent activity. The participants comprised 3 audit leaders in Pennsylvania, who effectively used data …


Cloud Adoption Decision-Making Processes By Small Businesses: A Multiple Case Study, Francis Blay Jan 2020

Cloud Adoption Decision-Making Processes By Small Businesses: A Multiple Case Study, Francis Blay

Walden Dissertations and Doctoral Studies

Cloud services have emerged as a compelling technology with immense benefits, but many companies still have concerns about cloud services adoption because of several failures that have occurred, including mistakes by service providers, exploitation of security flaws by hackers, and immature policies and procedures. The specific problem is how small businesses often lack the understanding of the ramifications of their respective decision-making processes to adopt cloud services. There is little understanding of the decision-making processes managers use in cloud services adoption. The purpose of this qualitative multiple case study was to explore the decision-making processes of 3 small businesses in …


The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo Jan 2020

The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo

Walden Dissertations and Doctoral Studies

As consumers increase the use of smart technologies, the lack of or improper implementation of Internet of Things (IoT) systems may affect the profitability of hotel businesses. For this qualitative single case study, Porter’s value chain model was the conceptual framework. The data collection process also included direct observations, participant observations, company performance documents, and reflective journaling. Data analysis from multiple sources of data was triangulated to hoteliers revealing that the implementation of IoT systems strategies may increase profit through the use of IoT system technology. Using Yin’s 5-step process, data were coded and analyzed and produced 3 themes: offer …


Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten Jan 2020

Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten

Walden Dissertations and Doctoral Studies

Cloud computing adoption rates have not grown commensurate with several well-known and substantially tangible benefits such as horizontal distribution and reduced cost, the latter both in terms of infrastructure and specialized personnel. The lack of adoption presents a challenge to both service providers from a sales perspective and service consumers from a usability focus. The purpose of this quantitative correlational study utilizing the technological, organizational, and environmental framework was to examine the relationship between shared technology (ST), malicious insiders (MI), account hijacking, data leakage, data protection, service partner trust (SP), regulatory concerns and the key decision-makers intention to adopt cloud …


Strategies Used In Ehealth Systems Adoption, Joshua Adams Jan 2020

Strategies Used In Ehealth Systems Adoption, Joshua Adams

Walden Dissertations and Doctoral Studies

Failure to adopt an interoperable eHealth system limits the accurate communication exchange of pertinent health-care-related data for diagnosis and treatment. Patient data are located in disparate health information systems, and the adoption of an interoperable eHealth system is complex and requires strategic planning by senior health care IT leaders. Grounded in DeLone and McLean’s information system success model, the purpose of this qualitative case study was to explore strategies used by some senior information technology (IT) health care leaders in the successful adoption of an eHealth system. The participants were 8 senior health care IT leaders in the eastern United …


Leadership Styles And Emotional Intelligence Of Federal Employees In Diversified Work Environments, Richard Lopez Jan 2020

Leadership Styles And Emotional Intelligence Of Federal Employees In Diversified Work Environments, Richard Lopez

Walden Dissertations and Doctoral Studies

On the Office of Personnel Management Federal Viewpoint Surveys, followers rated their leaders as ineffective. The public expects federal government leaders to effectively lead their followers in order to efficiently manage public services. The purpose of this correlational nonexperimental study was to determine whether there is a correlation between emotional intelligence (EQ) and a full range of leadership styles, as measured by the multileadership questionnaire (MLQ), from the perspective of the follower. Grounded in the theory of EQ, the extant scholarly literature revealed EQ skills complements leadership styles and predict leader success in a variety of business sectors, cultures, and …


Enterprise Resource Planning Implementation In Higher Education: Cost Containment Strategies, Tysha K. Tolefree Jan 2020

Enterprise Resource Planning Implementation In Higher Education: Cost Containment Strategies, Tysha K. Tolefree

Walden Dissertations and Doctoral Studies

Lack of effective cost containment strategies to support enterprise resource planning (ERP) system implementations within higher education institutions (HEIs) result in budget overruns 50% of the time. Grounded in Gartner’s IT cost containment techniques, the purpose of this qualitative multiple case study was to explore strategies HEI project directors use to support a successful ERP implementation on time and within budget. The participants comprised 5 project directors and managers from HEIs and another public organization in the state of Washington. Data were collected from semistructured interviews, archival data, and organization documents. Thematic analysis was used to analyze the data, and …


Strategies Universities’ And Colleges’ It Leaders Use To Prevent Malware Attacks, Felix Agyei Jan 2020

Strategies Universities’ And Colleges’ It Leaders Use To Prevent Malware Attacks, Felix Agyei

Walden Dissertations and Doctoral Studies

Information systems at universities and colleges are not exempt from the threat of malware. Preventing and mitigating malware attacks is important to universities’ and colleges’ IT leaders to protect sensitive data confidentiality. Grounded in general system theory, the purpose of this exploratory multiple case study was to explore strategies universities’ and colleges’ information technology (IT) leaders use to prevent and mitigate malware attacks. Participants consisted of 6 IT leaders from 3 universities and colleges in Southern California responsible for preventing and mitigating malware attacks. Data were collected through semistructured video teleconferences and 7 organizational documents. Three significant themes emerged through …


E-Commerce Strategies Small And Medium Enterprises Use To Market Products In Ghana, Joseph Kwaku Amaglo Jan 2020

E-Commerce Strategies Small And Medium Enterprises Use To Market Products In Ghana, Joseph Kwaku Amaglo

Walden Dissertations and Doctoral Studies

Small and medium enterprise (SME) business owners face challenges in adopting e-commerce strategies to market products. By utilizing e-commerce technology and tools, SME business owners could reach more customers and improve their business performance. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore the strategies some SME business owners in the furniture industry used to adopt e-commerce to market products in Ghana. The participants comprised 5 SME business owners from 5 different furniture firms in Ghana who adopted e-commerce strategies to market products. Sources of data included semi-structured interviews, interview notes, and …


Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde Jan 2020

Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde

Walden Dissertations and Doctoral Studies

Some financial institutions in Nigeria have not deployed strategies that mitigate cyber exploitation risks in the financial services industry. Financial institution leaders are concerned because cyber exploitation contributed to the reduction in the adult banking population to a low 38%. Grounded in the integrated systems theory of information security management, the purpose of this multiple case study was to explore strategies some financial institution leaders in Nigeria use to prevent cyber exploitations. The participants included 6 chief information security officers of 6 financial institutions. Data were collected from semistructured interviews and company and public documents. A thematic analysis identified themes …


The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase Jan 2020

The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase

Walden Dissertations and Doctoral Studies

America's higher education institutions have aligned computer science curricula with today's modern technology. Despite these efforts, data have shown that there is slow growth among young women majoring in computer science and even slower growth in this area at community colleges. Higher education institutions have also acknowledged a gap between men and women entering the computer science field and a need to explore options for computer science programs to engage women in the industry. The purpose of this phenomenological study was to gain an understanding of the perceptions and lived experiences of female students enrolled in computer classes at New …


Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson Jan 2020

Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson

Walden Dissertations and Doctoral Studies

Seismic data loss attributed to cybersecurity attacks has been an epidemic-level threat currently plaguing the U.S. healthcare system. Addressing cyber attacks is important to information technology (IT) security managers to minimize organizational risks and effectively safeguard data from associated security breaches. Grounded in the protection motivation theory, the purpose of this qualitative multiple case study was to explore risk-based strategies used by IT security managers to safeguard data effectively. Data were derived from interviews of eight IT security managers of four U.S. government health institutions and a review of relevant organizational documentation. The research data were coded and organized to …


Strategies For Information Technology Employee Retention, Stephen Horton Jan 2020

Strategies For Information Technology Employee Retention, Stephen Horton

Walden Dissertations and Doctoral Studies

Information technology (IT) employee retention is essential to IT departments tasked with supporting the goals and objectives of the organization. IT employees manage, support, and direct IT to drive business, pursue innovation, and create a competitive edge. The purpose of this qualitative exploratory multiple case study was to identify strategies that IT managers use to retain IT employees in order to support the goals and objectives of the IT organization. The population for this study consisted of 5 IT managers in the transportation industry. The IT managers selected for this study had subordinates and delegation duties and worked for employers …


Strategies For The Development Of It Disaster Recovery Plans In The Manufacturing Industry, Michael Landry Sartwell Jan 2020

Strategies For The Development Of It Disaster Recovery Plans In The Manufacturing Industry, Michael Landry Sartwell

Walden Dissertations and Doctoral Studies

Information technology (IT) leaders have reported technology disruptions because of natural disasters, terror attacks, or adversarial threats. Information technology leaders are concerned with technology disruptions, as these disruptions are costing organizations as much as $22,000 per minute. Grounded in Zachman’s framework, the purpose of this qualitative multiple case study was to explore strategies IT managers in the manufacturing industry use to develop IT disaster recovery (DR) plans to support business operations. The participants included 3 manufacturing IT professionals, 2 Department of Defense manufacturing infrastructure specialists, and 1outsourcing contractor, each from firms located in the central United States who successfully developed …