Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Social and Behavioral Sciences

Information Communication Technology Management As A Gdp Growth Contributor Within Arab League Nations, Jamal Alexander Thompson Jan 2017

Information Communication Technology Management As A Gdp Growth Contributor Within Arab League Nations, Jamal Alexander Thompson

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was Arab League nations' over-reliance on fossil fuels as a gross domestic product (GDP) growth driver. Arab League nations that depend primarily on fossil fuel production lack alternative resources for growth in times of fossil fuel usage or price decline. Overdependence on fossil fuels has led to minimal development in other economic sectors, primarily in skilled domestic labor, and to a high dependency on foreign skilled labor for skilled domestic jobs. The purpose of this study was to examine to what extent information communication technology (ICT) management can be a viable GDP growth …


Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin Jan 2017

Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin

Walden Dissertations and Doctoral Studies

Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government …


Collaboration Strategies To Reduce Technical Debt, Jeffrey Allen Miko Jan 2017

Collaboration Strategies To Reduce Technical Debt, Jeffrey Allen Miko

Walden Dissertations and Doctoral Studies

Inadequate software development collaboration processes can allow technical debt to accumulate increasing future maintenance costs and the chance of system failures. The purpose of this qualitative case study was to explore collaboration strategies software development leaders use to reduce the amount of technical debt created by software developers. The study population was software development leaders experienced with collaboration and technical debt at a large health care provider in the state of California. The data collection process included interviews with 8 software development leaders and reviewing 19 organizational documents relating to software development methods. The extended technology acceptance model was used …


Overcoming The Adverse Impact Of Internal Subculture Communications Within Organizations, Terrence Lee Farrier Jan 2017

Overcoming The Adverse Impact Of Internal Subculture Communications Within Organizations, Terrence Lee Farrier

Walden Dissertations and Doctoral Studies

The need for clear and organizationally effective communications is necessary to maintain sustainability as competition increases. Current research has not addressed problems associated with senior managers' clarity and intent and the misinterpretation by midlevel managers of that intent, causing division managers to misinterpret the company plans. Unresolved miscommunications may lead to destructive subculture development. This mixed methods design focused on how to minimize the confusion that manifests between senior and midlevel management within diverse and decentralized decision support structures. The secondary purpose was to advocate for the identification of divisional misalignment and provide information for a tool to help senior …


Strategies To Manage Enterprise Information Technology Projects, Mario West Jan 2017

Strategies To Manage Enterprise Information Technology Projects, Mario West

Walden Dissertations and Doctoral Studies

Since 2005, most midsize company information technology (IT) projects had a 62.4% failure rate because of wrong project team communication skills or cost overruns. IT leaders expect negative IT project outcomes will cost over $2 billion by 2020. Using the actor-network theory, the purpose of this single case study was to explore strategies used by IT leaders from a midsize IT company in Washington, D.C. to plan and execute projects under budget and on time. Using purposeful sampling, 5 IT leaders were selected for this study because of their experience in implementing successful strategies for projects. Data were collected using …


Reducing Technology Costs For Small Real Estate Businesses Using Cloud And Mobility, Linda Anne-Marie Mcintosh Jan 2017

Reducing Technology Costs For Small Real Estate Businesses Using Cloud And Mobility, Linda Anne-Marie Mcintosh

Walden Dissertations and Doctoral Studies

Increased client accessibility strategies, awareness of technology cost, and factors of third-party data security capabilities are elements small real estate business (SREB) owners need to know before adopting cloud and mobility technology. The purpose of this multiple case study was to explore the strategies SREB owners use to implement cloud and mobility products to reduce their technology costs. The target population consisted of 3 SREB owners who had experience implementing cloud and mobility products in their businesses in the state of Texas. The conceptual framework of this research study was the technology acceptance model theory. Semistructured interviews were conducted and …


Evaluating Sociotechnical Factors Associated With Telecom Service Provisioning: A Case Study, Fahad Iqbal Jan 2017

Evaluating Sociotechnical Factors Associated With Telecom Service Provisioning: A Case Study, Fahad Iqbal

Walden Dissertations and Doctoral Studies

Provisioning Internet services remains an area of concern for Internet service providers. Despite investments to improve resources and technology, the understanding of sociotechnical factors that influence the service-provisioning life cycle remains limited. The purpose of this case study was to evaluate the influence of sociotechnical factors associated with telecom service provisioning and to explore the critical success and failure factors, specifically in the telecommunication industry of Kuwait. Guided by sociotechnical systems theory, this qualitative exploratory case study approach examined a purposeful sample of 19 participants comprising of managers, engineers, and technicians who had the knowledge and experience of the service-provisioning …


Security Strategies For Hosting Sensitive Information In The Commercial Cloud, Edward Steven Forde Jan 2017

Security Strategies For Hosting Sensitive Information In The Commercial Cloud, Edward Steven Forde

Walden Dissertations and Doctoral Studies

IT experts often struggle to find strategies to secure data on the cloud. Although current security standards might provide cloud compliance, they fail to offer guarantees of security assurance. The purpose of this qualitative case study was to explore the strategies used by IT security managers to host sensitive information in the commercial cloud. The study's population consisted of information security managers from a government agency in the eastern region of the United States. The routine active theory, developed by Cohen and Felson, was used as the conceptual framework for the study. The data collection process included IT security manager …


Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley Jan 2017

Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley

Walden Dissertations and Doctoral Studies

The cost of resolving user requests for IT assistance rises annually. Researchers have demonstrated that data warehouse analytic techniques can improve service, but they have not established the benefit of using global organizational data to reduce reported IT incidents. The purpose of this quantitative, quasi-experimental study was to examine the extent to which IT staff use of organizational knowledge generated from data warehouse analytical measures reduces the number of IT incidents over a 30-day period, as reported by global users of IT within an international pharmaceutical company headquartered in Germany. Organizational learning theory was used to approach the theorized relationship …


Relationship Between Corporate Governance And Information Security Governance Effectiveness In United States Corporations, Robert Elliot Davis Jan 2017

Relationship Between Corporate Governance And Information Security Governance Effectiveness In United States Corporations, Robert Elliot Davis

Walden Dissertations and Doctoral Studies

Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information security governance (ISG) effectiveness in United States-based corporations. Surveys were used to collect data from 95 strategic and tactical leaders of the 500 …