Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Social and Behavioral Sciences

Cybersecurity Policy Development At The State Level: A Case Study Of Middle Tennessee, Daniel Leslie Scherr Jan 2019

Cybersecurity Policy Development At The State Level: A Case Study Of Middle Tennessee, Daniel Leslie Scherr

Walden Dissertations and Doctoral Studies

Cybersecurity is a growing threat not only to nations, critical infrastructure, and major entities, but also to smaller organizations and individuals. The growing number of successful attacks on all manner of U.S. targets highlights the need for effective and comprehensive policy from the local to federal level, though most research focuses on federal policy issues, not state issues. The purpose of this study was to examine the effectiveness of the decision-making process within the current cybersecurity policy environment in a southern state of the United States. Sabatier's advocacy coalition framework served as the theoretical framework for the study. Data were …


Knowledge Transfer Strategy Implementation In Contract Organizations, Delano Clyde Hudson Jan 2019

Knowledge Transfer Strategy Implementation In Contract Organizations, Delano Clyde Hudson

Walden Dissertations and Doctoral Studies

Despite economic perils of government shutdowns, foreclosures, bankruptcies, and employee layoffs, some contract leaders consistently fail to implement knowledge transfer strategies that could improve production and profitability and maintain operational readiness when employees transition in and out of the organization. The conceptual framework for this descriptive research study was Nonaka and Takeuchi's socialization, externalization, combination, and internalization model for knowledge creation. A purposive sample of 20 leaders from 2 contract organizations within the south central United States with at least 10 years of experience in contracting were interviewed. Member checking was used for reliability of the synthesized interviews, and triangulation …


Use Of Mobile Telephones: Experiences Of First Responders In Rural African Communities, James Harding Jan 2019

Use Of Mobile Telephones: Experiences Of First Responders In Rural African Communities, James Harding

Walden Dissertations and Doctoral Studies

Emergency medical technicians (EMTs) usually participate in disaster response in rural African communities. Disasters in African communities are often characterized by huge fatalities, which are associated with a slow pace of response. The use of information and communication technology in disaster response is recognized as an effective conduit for enhancing response. Previous research indicates the efficacy of the use of mobile telephones in disaster response in advance countries. However, there remains a critical gap in the available literature on the experiences of EMTs with the use of mobile telephones in disaster response in rural African communities. The purpose of this …


Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey Jan 2019

Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey

Walden Dissertations and Doctoral Studies

There is a significant technology deficiency within the U.S. manufacturing industry compared to other countries. To adequately compete in the global market, lean manufacturing organizations in the United States need to look beyond their traditional methods of evaluating their processes to optimize their assembly cells for efficiency. Utilizing the task-technology fit theory this quantitative correlational study examined the relationships among software using probabilistic algorithms, lean methodology techniques, and manufacturer cell optimization results. Participants consisted of individuals performing the role of the systems analyst within a manufacturing organization using lean methodologies in the Southwestern United States. Data were collected from 118 …


Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe Jan 2019

Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe

Walden Dissertations and Doctoral Studies

In retail, the explosion of data sources and data has provided incentive to invest in information systems (IS), which enable leaders to understand the market and make timely decisions to improve performance. Given that users’ perceptions of IS affects their use of IS, understanding the factors influencing user acceptance is critical to acquiring an effective business intelligence system (BIS) for an organization. Grounded in the technology acceptance model theory, the purpose of this correlational study was to examine the relationship between perceived usefulness (PU), perceived ease of use (PEOU), and user acceptance of business intelligence systems (BIS) in retail organizations. …


Knowledge Sharing And Customer Relations In Mobility, Katie Dyretha Moore Jan 2019

Knowledge Sharing And Customer Relations In Mobility, Katie Dyretha Moore

Walden Dissertations and Doctoral Studies

After the events of September 11, 2001, inadequacies in how government organizations and agencies shared knowledge and communication with defense mission partners became readily apparent. A reasonable U.S. government information technology expectation is the integrated use of mobile phones across organizations and agencies. Yet, it is difficult to meet this expectation, as the provisioning process for mobile devices can be different for each government organization or agency. The Department of Commerce National Institute of Standards and Technology does not set provisioning standards, and organizations and agencies determine policies tailored to their particular needs. Using Schein's theory on organizational culture, the …


Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias Jan 2019

Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias

Walden Dissertations and Doctoral Studies

Despite the increased cost of data breaches due to advanced, persistent threats from malicious sources, the adoption of big data security analytics among U.S. small businesses has been slow. Anchored in a diffusion of innovation theory, the purpose of this correlational study was to examine ways to increase the adoption of big data security analytics among small businesses in the United States by examining the relationship between small business leaders' perceptions of big data security analytics and their adoption. The research questions were developed to determine how to increase the adoption of big data security analytics, which can be measured …


Public Servants' Perceptions Of The Cybersecurity Posture Of The Local Government In Puerto Rico, Julio C. Rodriguez Jan 2019

Public Servants' Perceptions Of The Cybersecurity Posture Of The Local Government In Puerto Rico, Julio C. Rodriguez

Walden Dissertations and Doctoral Studies

The absence of legislation, the lack of a standard cybersecurity framework, and the failure to adopt a resilient cybersecurity posture can be detrimental to the availability, confidentiality, and integrity of municipal information systems. The purpose of this phenomenological study was to understand the cybersecurity posture of municipalities from the perception of public servants serving in information technology (IT) leadership roles in highly populated municipalities in the San Juan-Carolina-Caguas Metropolitan Statistical Area of Puerto Rico. The study was also used to address key factors influencing the cybersecurity posture of these municipalities. The theoretical framework was open system theory used in combination …