Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

2018

Discipline
Institution
Keyword
Publication

Articles 61 - 90 of 101

Full-Text Articles in Databases and Information Systems

A Study Of Groupthink In Project Teams, John Reaves Jan 2018

A Study Of Groupthink In Project Teams, John Reaves

Walden Dissertations and Doctoral Studies

Project teams advance a common goal by working together on projects that require a diverse set of skills and are difficult for 1 person to complete. In this study, there was an exploration of the antecedents to groupthink in project teams from the perspectives of project managers. Many companies use project managers to complete critical objectives; avoiding groupthink is crucial to their success. The purpose of this research was to understand why project teams are susceptible to groupthink and what precautions managers can take to avoid it. The conceptual framework utilized in this study was Janis' concept of groupthink, which …


Effective Strategies For Managing Continuous Consultant Turnover In It Project Teams, Nicholas K. Jury Jan 2018

Effective Strategies For Managing Continuous Consultant Turnover In It Project Teams, Nicholas K. Jury

Walden Dissertations and Doctoral Studies

Information Technology project managers have found that collective turnover of consultants lowers code quality, increases knowledge loss and negatively impacts team performance. Within the last decade, companies have begun to see that offshore consultants have a turnover rate greater than 26%, more than double the rates for the rest of the IT consulting industry. Collective turnover also puts additional pressure on the project team, causing work exhaustion and thus additional turnover. The purpose of this single case study was to explore strategies that 6 successful project managers utilized to limit and reduce the impact of collective turnover of their hybrid …


Digital Strategies Senior Bank Executives In Mauritius Use To Improve Customer Service, Sailesh Sewpaul Jan 2018

Digital Strategies Senior Bank Executives In Mauritius Use To Improve Customer Service, Sailesh Sewpaul

Walden Dissertations and Doctoral Studies

Customers' use of digital banking has reshaped traditional banking, and senior level bank executives must know how to leverage this innovation to improve customer service to increase profitability. Using the technology acceptance model as the conceptual framework, the purpose of this multiple case study was to explore effective digital banking strategies that senior level executives used to improve customer service to increase profitability. The target population for this study included senior-level executives from 3 banks in Mauritius possessing successful development and implementation experience in digital banking strategies to improve customer service. Data were collected through semistructured interviews and organizational documents, …


Relationship Between Software Development Team Structure, Ambiguity, Volatility, And Project Failure, Dominic Martinelli Saxton Jan 2018

Relationship Between Software Development Team Structure, Ambiguity, Volatility, And Project Failure, Dominic Martinelli Saxton

Walden Dissertations and Doctoral Studies

Complex environments like the United States Air Force's advanced weapon systems are highly reliant on externally developed software, which is often delivered late, over budget, and with fewer benefits than expected. Grounded in Galbraith's organizational information processing theory, the purpose of this correlational study was to examine the relationship between software development team structure, ambiguity, volatility and software project failure. Participants included 23 members of the Armed Forces Communications and Electronics Association in the southeastern United States who completed 4 project management surveys. Results of multiple regression analysis indicated the model as a whole was able to predict software project …


Strategies For E-Commerce Adoption In A Travel Agency, Anita Smith Jan 2018

Strategies For E-Commerce Adoption In A Travel Agency, Anita Smith

Walden Dissertations and Doctoral Studies

In 2016, online travel sales increased 8%, resulting in profits increasing to over 565 billion U.S. dollars. Traditional travel agencies in brick-and-mortar storefronts are facing challenges related to competing with online travel agencies (OTAs), attracting new customers, and retaining existing customers. The purpose of this qualitative case study was to explore the e-commerce processes, business models, and strategies that leaders of traditional travel agencies use to compete with OTAs. The study sample consisted of 8 travel professionals from 3 small travel agencies located in the mid-Atlantic region of the United States. The conceptual framework for this study was Rogers's diffusion …


A Grounded Theory Of Emergent Leadership In Nonhierarchical Virtual Teams, Randall Fleming Jan 2018

A Grounded Theory Of Emergent Leadership In Nonhierarchical Virtual Teams, Randall Fleming

Walden Dissertations and Doctoral Studies

A Grounded Theory of Emergent Leadership in Nonhierarchical Virtual Teams

by

Randall David Fleming

MS, Colorado Technical University, 2008

BA, The Ohio State University, 1984

Dissertation Submitted in Partial Fulfillment

of the Requirements for the Degree of

Doctor of Philosophy

Management

Walden University

November 2018


Strategies To Manage Cloud Computing Operational Costs, Frankie Nii A Sackey Jan 2018

Strategies To Manage Cloud Computing Operational Costs, Frankie Nii A Sackey

Walden Dissertations and Doctoral Studies

Information technology (IT) managers worldwide have adopted cloud computing because of its potential to improve reliability, scalability, security, business agility, and cost savings; however, the rapid adoption of cloud computing has created challenges for IT managers, who have reported an estimated 30% wastage of cloud resources. The purpose of this single case study was to explore successful strategies and processes for managing infrastructure operations costs in cloud computing. The sociotechnical systems (STS) approach was the conceptual framework for the study. Semistructured interviews were conducted with 6 IT managers directly involved in cloud cost management. The data were analyzed using a …


Complexity Theory Of Leadership And Management Information, Mark Aloysius Simpson Jan 2018

Complexity Theory Of Leadership And Management Information, Mark Aloysius Simpson

Walden Dissertations and Doctoral Studies

Implementing effective leadership strategies in management of information systems (MIS) can positively influence overall organizational performance. This study was an exploration of the general problem of failure to lead effectively in the current knowledge-based economy and the resulting deleterious effects on organizational performance and threats to continuing organizational viability. The specific problem was the lack of understanding regarding the interaction of leadership processes with MIS functions and the impact on organizational success. Managers' and employees' lived experiences of leadership in small- to medium-sized enterprises were explored, as well as how those experiences influenced the organization's adaptive responses regarding technology and …


Small Business Owners' Search For Profitability Under The Affordable Care Act, Alton Simpson Jan 2018

Small Business Owners' Search For Profitability Under The Affordable Care Act, Alton Simpson

Walden Dissertations and Doctoral Studies

Health care costs for small businesses have been rising annually for the past few decades. Congress voted to pass the Affordable Care Act (ACA) to lower the cost of health care in 2010. The purpose of this phenomenological study was to explore small business owners' experiences in implementing ACA requirements and how the ACA affects small businesses as their owners work to make these organizations profitable. Complex adaptive systems theory formed the conceptual framework for this study Data were gathered during face-to-face and telephone interviews with a sample of 20 small business owners in the Philadelphia region. The research questions …


Successful Strategies For Implementing An Enterprise Resource Planning System, Arrogah Adade-Boafo Jan 2018

Successful Strategies For Implementing An Enterprise Resource Planning System, Arrogah Adade-Boafo

Walden Dissertations and Doctoral Studies

The enterprise resource planning (ERP) implementation success rate is as low as 30%. Researchers have shown that ERP system implementation could cause both system and organization failures, affecting operations and stakeholders, alike. The technology-organization-environment conceptual framework was used to ground this qualitative single-case study. The purpose of the study was to explore strategies that a manufacturing firm in Ghana used to implement ERP systems successfully. The population of this case study comprised 5 stakeholders from a manufacturing firm in Ghana who had success in implementing an ERP system. Data were collected using face-to-face semistructured interviews and review of various corporate …


Strategies For Successfully Managing Organizational It Projects, Joseph Rathbun Jan 2018

Strategies For Successfully Managing Organizational It Projects, Joseph Rathbun

Walden Dissertations and Doctoral Studies

Over 70% of information technology (IT) projects in large organizations in the United States run over budget or fail to reach completion primarily due to a lack of effective strategies. The purpose of this single case study was to explore strategies that IT project managers used to successfully complete IT projects. Hersey and Blanchard's situational leadership theory was the conceptual framework. Purposive sampling method was used to identify 2 successful IT project managers in Central Texas. Data gathered from semistructed interviews and collected from publicly available documents were analyzed using coding techniques, constant comparison, and key word phrases. Member checking …


Management Strategies For Adopting Agile Methods Of Software Development In Distributed Teams, Igor A. Schtein Jan 2018

Management Strategies For Adopting Agile Methods Of Software Development In Distributed Teams, Igor A. Schtein

Walden Dissertations and Doctoral Studies

Between 2003 and 2015, more than 61% of U.S. software development teams failed to satisfy project requirements, budgets, or timelines. Failed projects cost the software industry an estimated 60 billion dollars. Lost opportunities and misused resources are often the result of software development leaders failing to implement appropriate methods for managing software projects. The purpose of this qualitative multiple case study was to explore strategies software development managers use in adopting Agile methodology in the context of distributed teams. The tenets of Agile approach are individual interaction over tools, working software over documentation, and collaboration over a contract. The conceptual …


Automating Ciri Ratings Of Human Rights Reports Using Gate, Joshua M. Joiner Jan 2018

Automating Ciri Ratings Of Human Rights Reports Using Gate, Joshua M. Joiner

UNF Graduate Theses and Dissertations

This thesis involves parsing document-based reports from the United States Human Rights Reports and rating the human practices for various countries based on the CIRI (Cingranelli-Richards) Human Rights Data Project dataset. The United States Human Rights Reports are annual reports that cover internationally recognized human rights practices regarding individual, civil, political, and worker rights. Students, scholars, policymakers, and analysts used the CIRI data for practical and research purposes. CIRI analyzed the annual reports from 1981 to 2011 and then stopped releasing the dataset for any further years, but a possible reason is due to the manual process of scouring the …


Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi Jan 2018

Organizational Information Security: Strategies To Minimize Workplace Cyberloafing For Increased Productivity, Hawazin Al Abbasi

Walden Dissertations and Doctoral Studies

Productivity loss occurs in organizations that experience high levels of personal Internet use by employees on company time, which includes employees using smartphones to surf without needing the firm's Internet connection. The purpose of this qualitative phenomenological study was to explore reliable ways for organizational leaders to monitor or limit their employees' use of smartphone technology for personal use (cyberloafing) while on the job to minimize wasted work time. Social cognitive theory, which includes an emphasis on human behavioral changes based upon the environment, people, and behavior, served as the conceptual framework. The general research question was as follows: How …


Multi-Robot Complete Coverage Using Directional Constraints, Stefanus Malan Jan 2018

Multi-Robot Complete Coverage Using Directional Constraints, Stefanus Malan

CCE Theses and Dissertations

Complete coverage relies on a path planning algorithm that will move one or more robots, including the actuator, sensor, or body of the robot, over the entire environment. Complete coverage of an unknown environment is used in applications like automated vacuum cleaning, carpet cleaning, lawn mowing, chemical or radioactive spill detection and cleanup, and humanitarian de-mining.

The environment is typically decomposed into smaller areas and then assigned to individual robots to cover. The robots typically use the Boustrophedon motion to cover the cells. The location and size of obstacles in the environment are unknown beforehand. An online algorithm using sensor-based …


Determining Vulnerability Using Attack Graphs: An Expansion Of The Current Fair Model, Beth M. Anderson Jan 2018

Determining Vulnerability Using Attack Graphs: An Expansion Of The Current Fair Model, Beth M. Anderson

EWU Masters Thesis Collection

Factor Analysis of Information Risk (FAIR) provides a framework for measuring and understanding factors that contribute to information risk. One such factor is FAIR Vulnerability; the probability that an event involving a threat will result in a loss. An asset is vulnerable if a threat actor’s Threat Capability is higher than the Resistance Strength of the asset. In FAIR scenarios, Resistance Strength is currently estimated for entire assets, oversimplifying assets containing individual systems and the surrounding environment. This research explores enhancing estimations of FAIR Vulnerability by modeling interactions between threat actors and assets through attack graphs. By breaking down the …


Information Technology Infrastructure: Global Economy And National Development In Haiti, Reynolds Alcena Jan 2018

Information Technology Infrastructure: Global Economy And National Development In Haiti, Reynolds Alcena

Walden Dissertations and Doctoral Studies

Political and environmental chaos recently experienced in Haiti has damaged the economic sector and telecommunication infrastructure. Developmental data from Haiti show 3 major trends: inadequate social and economic development, insufficient benefits from the global economy, and poorly planned information technology infrastructure (ITI). The specific problem addressed in this study is a knowledge gap in the views of stakeholders within Haiti's national culture on how the country's ITI can be developed to better engage Haiti in 21st century global and digital economy. The purpose of this qualitative case study was to explore the views of 48 expert participants regarding ITI development …


The Relationship Between Leadership Style And Cognitive Style To Software Project Success, Jacquelyne L. Wilson Jan 2018

The Relationship Between Leadership Style And Cognitive Style To Software Project Success, Jacquelyne L. Wilson

Walden Dissertations and Doctoral Studies

Project managers can be change agents providing direction and motivation for subordinates to meet and exceed goals; however, there is a lack of information about the soft skills needed to achieve project success. Understanding the relationship between cognitive style and transformational leadership to software project outcomes is important. This study describes the lived experiences of software project managers by focusing on their attitudes towards, perceptions of, and behaviors related to using transformational leadership and cognitive styles in agile software development environments. Husserlian phenomenological design was used to identify the structure of participants' experiences. The naturalistic decision-making model and the theory …


Estimating The Optimal Cutoff Point For Logistic Regression, Zheng Zhang Jan 2018

Estimating The Optimal Cutoff Point For Logistic Regression, Zheng Zhang

Open Access Theses & Dissertations

Binary classification is one of the main themes of supervised learning. This research is concerned about determining the optimal cutoff point for the continuous-scaled outcomes (e.g., predicted probabilities) resulting from a classifier such as logistic regression. We make note of the fact that the cutoff point obtained from various methods is a statistic, which can be unstable with substantial variation. Nevertheless, due partly to complexity involved in estimating the cutpoint, there has been no formal study on the variance or standard error of the estimated cutoff point.

In this Thesis, a bootstrap aggregation method is put forward to estimate the …


Staff Education Module For Bar Code Medication Administration, Francoise Juste Jan 2018

Staff Education Module For Bar Code Medication Administration, Francoise Juste

Walden Dissertations and Doctoral Studies

Bar Code Medication Administration (BCMA) is a technology-supported nursing tool that has become the standard of practice for medication administration. When used effectively and efficiently, this tool has the potential to reduce medication errors in acute care settings. In a pediatric unit at a major urban hospital in the northeast region of the United States, the absence of a BCMA nursing staff educational module affected the use of this safety tool leading to an increase of medication errors. The purpose of this DNP project was to develop a comprehensive educational module to promote BCMA in the pediatric unit of the …


User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim Jan 2018

User Interface Challenges Of Banking Atm Systems In Nigeria, Felix Chukwuma Aguboshim

Walden Dissertations and Doctoral Studies

The use of banking automated teller machine (ATM) technological innovations have significant importance and benefits in Nigeria, but numerous investigations have shown that illiterate and semiliterate Nigerians do not perceive them as useful or easy-to-use. Developing easy-to-use banking ATM system interfaces is essential to accommodate over 40% illiterate and semiliterate Nigerians, who are potential users of banking ATM systems. The purpose of this study was to identify strategies software developers of banking ATM systems in Nigeria use to create easy-to-use banking ATM system interfaces for a variety of people with varying abilities and literacy levels. The technology acceptance model was …


Social Media Policy To Support Employee Productivity In The Finance Industry, David Shaun Rogers Jan 2018

Social Media Policy To Support Employee Productivity In The Finance Industry, David Shaun Rogers

Walden Dissertations and Doctoral Studies

Business leaders may see social media as a distraction for their workers; however, blocking access could lead to a reduction in productivity. Using social media technologies with knowledge workers could achieve cost reductions for payroll of 30% to 35%. The purpose of this multiple case study was to explore how business leaders used a social media policy to support employee productivity. The conceptual framework for this study was social exchange theory, which supports the notion that dyad and small group interactions make up most interactions, and such interactions enhance employees' productivity. The research question was to explore how finance industry …


Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price Jan 2018

Patient Satisfaction Management In Office Visits And Telehealth In Health Care Technology, Todd Price

Walden Dissertations and Doctoral Studies

Telehealth and remote medical treatments have begun to be more commonly used in healthcare systems. Researchers have theorized that providers' abilities to treat patients are not directly tied to the proximity of the patient to the doctor, but by the identification and treatment of the patient's symptoms. Although the treatment and cure rates are being established within individual health systems and professional medical associations, empirical research is lacking regarding patient satisfaction with this remote treatment situation. The purpose of this quantitative study was to address this gap by examining satisfaction ratings of patients between virtual provider visits and face-to-face provider …


Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti Jan 2018

Strategies For Healthcare Payer Information Technology Integration After Mergers And Acquisitions, Kishore Maranganti

Walden Dissertations and Doctoral Studies

Despite the high rate of failure in merger and acquisition (M&A) transactions, many organizations continue to rely on M&As as their primary growth strategy and to address market competition. The purpose of this qualitative single case study was to explore strategies managers from a large healthcare payer in the midwestern United States used to achieve operational and strategic synergies during the postacquisition information technology (IT) integration phase. Haspeslagh and Jemison's acquisition integration approaches model was the conceptual framework for the study. Methodological triangulation was established by analyzing the data from the semistructured interviews of 6 senior executives and 6 IT …


Exploring Welfare Recipients' Self-Sufficiency Barriers Through Information Management Systems In Tennessee, Valenta Eunice Nichols Jan 2018

Exploring Welfare Recipients' Self-Sufficiency Barriers Through Information Management Systems In Tennessee, Valenta Eunice Nichols

Walden Dissertations and Doctoral Studies

Families living on welfare in low-income impoverished neighborhoods encounter multiple barriers that need mitigating before seeking work to reach self-sufficiency. Many welfare recipients' self-sufficiency barriers are unnoticeable to caseworkers due to lack of data sharing to assess clients' needs through information technology processes. The purpose of this exploratory descriptive phenomenological qualitative study was to understand welfare recipients' viewpoints on socioeconomic barriers to living self-sufficiently and gain perspectives from human services caseworkers and technical resources on data sharing issues that impact recipients' ability to live independently from government assistance. Data collection and observational field notes resulted from in-depth interviews of 11 …


Overcoming Data Breaches And Human Factors In Minimizing Threats To Cyber-Security Ecosystems, Manouan Pierre-Marius Ayereby Jan 2018

Overcoming Data Breaches And Human Factors In Minimizing Threats To Cyber-Security Ecosystems, Manouan Pierre-Marius Ayereby

Walden Dissertations and Doctoral Studies

This mixed-methods study focused on the internal human factors responsible for data breaches that could cause adverse impacts on organizations. Based on the Swiss cheese theory, the study was designed to examine preventative measures that managers could implement to minimize potential data breaches resulting from internal employees' behaviors. The purpose of this study was to provide insight to managers about developing strategies that could prevent data breaches from cyber-threats by focusing on the specific internal human factors responsible for data breaches, the root causes, and the preventive measures that could minimize threats from internal employees. Data were collected from 10 …


Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan Jan 2018

Analytic Extensions To The Data Model For Management Analytics And Decision Support In The Big Data Environment, Nsikak Etim Akpakpan

Walden Dissertations and Doctoral Studies

From 2006 to 2016, an estimated average of 50% of big data analytics and decision support projects failed to deliver acceptable and actionable outputs to business users. The resulting management inefficiency came with high cost, and wasted investments estimated at $2.7 trillion in 2016 for companies in the United States. The purpose of this quantitative descriptive study was to examine the data model of a typical data analytics project in a big data environment for opportunities to improve the information created for management problem-solving. The research questions focused on finding artifacts within enterprise data to model key business scenarios for …


Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii Jan 2018

Medical Identity Theft And Palm Vein Authentication: The Healthcare Manager's Perspective, Cruz Cerda Iii

Walden Dissertations and Doctoral Studies

The Federal Bureau of Investigation reported that cyber actors will likely increase cyber intrusions against healthcare systems and their concomitant medical devices because of the mandatory transition from paper to electronic health records, lax cyber security standards, and a higher financial payout for medical records in the deep web. The problem addressed in this quantitative correlational study was uncertainty surrounding the benefits of palm vein authentication adoption relative to the growing crime of medical identity theft. The purpose of this quantitative correlational study was to understand healthcare managers' and doctors' perceptions of the effectiveness of palm vein authentication technology. The …


Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster Jan 2018

Reducing Internal Theft And Loss In Small Businesses, Eric L. Luster

Walden Dissertations and Doctoral Studies

Every year, several documented data breaches happen in the United States, resulting in the exposure of millions of electronic records. The purpose of this single-case study was to explore strategies some information technology managers used to monitor employees and reduce internal theft and loss. The population for this study consisted of 5 information technology managers who work within the field of technology in the southwestern region of the United States. Participants were selected using purposeful sampling. The conceptual framework for this study included elements from information and communication boundary theories. Data were collected from semistructured interviews, company standard operating procedures, …


Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez Jan 2018

Strategies Certified Project Management Professionals Use To Prevent Counterproductive Behavior, Lisa Annika Christin Hansson-Vazquez

Walden Dissertations and Doctoral Studies

Project managers who fail to apply strategies to prevent counterproductive work behavior in information technology projects could negatively affect users, budget costs, timelines, or projects. The purpose of this multiple case study was to explore strategies that project managers used to prevent counterproductive work behavior that put project success at risk. Social learning theory was the conceptual framework for this study. Data were collected through document review of published Project Management Institute (PMI) material as well as semistructured interviews with 10 project managers who were members of a PMI chapter in the southeastern United States, and who held a project …