Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2961)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Wisconsin Milwaukee (42)
- University of Arkansas, Fayetteville (41)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2867)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- All Capstone Projects (32)
- Graduate Theses and Dissertations (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 1291 - 1320 of 6720
Full-Text Articles in Physical Sciences and Mathematics
A Multicase Study Of Critical Success Factors Of Self-Service Business Intelligence Initiatives, Eva Shepherd
A Multicase Study Of Critical Success Factors Of Self-Service Business Intelligence Initiatives, Eva Shepherd
Walden Dissertations and Doctoral Studies
Information technology (IT) managers have sparse information on the critical success factors (CSFs) needed for self-service business intelligence (SSBI) initiatives among casual users. The purpose of this qualitative, multicase study was to describe Business Intelligence (BI) experts’ views on the CSFs needed for self-service BI initiatives among casual users in the post-implementation stage. To meet this purpose, a multicase study design was used to collect data from a purposeful sample of 10 BI experts. Semistructured interviews, archival data, and reflective field notes drove the credibility of the multicase study’s findings through data triangulation. Two conceptual models framed this study: Lennerholt …
Benefits Of Technology Integration In A Small Behavioral Health Organization, Tremaria Sweet
Benefits Of Technology Integration In A Small Behavioral Health Organization, Tremaria Sweet
Walden Dissertations and Doctoral Studies
The current study sought to understand the significance of information systems (IS) planning in small-to-medium enterprise (SME) behavioral health agencies and the direct impact it has on organizational growth and performance. The research was guided by the Baldrige Excellence Framework. The study was based on a sample of one senior leader from one agency licensed to practice in three states in the eastern region of the United States. This exploratory case study involved using semi-structured interviews and internal archival data during the process of data collection. Information technology (IT) competence, skills, leadership, infrastructure, and awareness were emergent themes identified in …
Cyberattacks Strategy For Nonprofit Organizations, Yawo Obimpe Kondo
Cyberattacks Strategy For Nonprofit Organizations, Yawo Obimpe Kondo
Walden Dissertations and Doctoral Studies
Information system security managers (ISSM) in nonprofits face increased cyberattack cases because nonprofits often use basic technology to save on costs. Nonprofit owners and managers need solutions to secure their data from cyberattacks. Grounded in the general systems theory, the purpose of this qualitative multiple case study was to explore strategies ISSMs at nonprofit organizations employ to protect against cyberattacks. Participants included five IT managers and directors of information technology in charge of security management in nonprofit organizations in Maryland, the District of Columbia, and Virginia. Data was generated through interviews and reviews of archival documents. The data analysis technique …
Successful Strategies For Adopting Open-Source Software, Balla Barro
Successful Strategies For Adopting Open-Source Software, Balla Barro
Walden Dissertations and Doctoral Studies
Middle-level information systems managers (ISMs) in small-scale organizations often have challenges in determining the most appropriate strategy for adopting open-source software (OSS) in their organizations. The ISMs need to determine the right strategy for adopting OSS to protect the organizations’ information technology infrastructure. Grounded in the diffusion of innovation theory, the objective of this multiple case study was to explore strategies middle-level ISMs used to adopt OSS in their small-scale organizations. Six middle-level ISMs from three small-scale organizations with experience of not less than six years in OSS adoption strategy in the city of Frederick, Maryland, shared their strategies during …
Factors Affecting The Productivity And Satisfaction Of Virtual Workers, Teresa Peoples
Factors Affecting The Productivity And Satisfaction Of Virtual Workers, Teresa Peoples
Walden Dissertations and Doctoral Studies
Advancements in technology have ushered in new digital enterprises, shifting the trend from a conventional workforce to a virtual workforce and giving rise to new challenges for managers. However, the factors affecting virtual worker productivity and job satisfaction are not well known. The purpose of this study was to identify these factors and determine what managers can do to enhance them. The theoretical foundation for this study included sociotechnical theory and content theory as they relate to the motivation and communication needs of the virtual workforce. This qualitative phenomenological study was an exploration of factors that affect virtual workers' productivity …
The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo
The Digitization Of Court Processes In African Regional And Subregional Judicial Institutions, Frederic Drabo
Walden Dissertations and Doctoral Studies
Despite information technology (IT) officers’ multiple efforts to develop reliable and efficient electronic justice (e-justice) systems, digitizing court processes still presents several quality challenges associated with IT infrastructure and literacy issues. Grounded in the principles of total quality management, the purpose of this qualitative multiple case study was to identify strategies and best practices IT officers in African regional economic communities (REC) use for digitizing regional and subregional court processes to improve African e-justice systems. The participants included four IT officers working as assistant computer system analysts (ACSA), computer system analysts (CSA), and heads of IT (HIT) in regional and …
Mobile Technology Use By Rural Farmers And Herders, Mohamed Ali
Mobile Technology Use By Rural Farmers And Herders, Mohamed Ali
Walden Dissertations and Doctoral Studies
Mobile technology business leaders from many mobile technology companies practice digital apartheid when improving rural farmers' communication and technology infrastructure in developing countries. Mobile technology business leaders who do not effectively plan mobile technology infrastructure deployment to rural farmers and herders are at a high risk of failure. Grounded in adaptive structuration theory of technology, the purpose of this qualitative multiple case study was to explore strategies mobile technology business leaders used to improve the mobile technology infrastructure for rural farmers and herders in the United Republic of Tanzania. The participants comprised three mobile technology business leaders from three different …
User Awareness And Knowledge Of Cybersecurity And The Impact Of Training In The Commonwealth Of Dominica, Jermaine Jewel Jean-Pierre
User Awareness And Knowledge Of Cybersecurity And The Impact Of Training In The Commonwealth Of Dominica, Jermaine Jewel Jean-Pierre
Walden Dissertations and Doctoral Studies
The frequency of cyberattacks against governments has increased at an alarming rate and the lack of user awareness and knowledge of cybersecurity has been considered a contributing factor to the increase in cyberattacks and cyberthreats. The purpose of this quantitative experimental study was to explore the role and effectiveness of employee training focused on user awareness of cyberattacks and cybersecurity, with the intent to close the gap in understanding about the level of awareness of cybersecurity within the public sector of the Commonwealth of Dominica. The theoretical framework was Bandura’s social cognitive theory, following the idea that learning occurs in …
Strategies For Integrating The Internet Of Things In Educational Institutions, Anthony Kofi Harvey
Strategies For Integrating The Internet Of Things In Educational Institutions, Anthony Kofi Harvey
Walden Dissertations and Doctoral Studies
The introduction of the Internet of Things (IoT) into educational institutions has necessitated the integration of IoT devices in the information technology (IT) infrastructural environment of educational institutions. Many IT leaders at educational institutions, however, lack strategies for integrating and deploying IoT devices in their institutions, which has resulted in numerous security breaches. The purpose of this study was to explore security strategies adopted by IT administrators to prevent data breaches resulting from the integration of IoT devices in their educational institutions. The diffusion of innovations theory served as the conceptual framework for this qualitative multiple case study. Eleven IT …
Strategies To Protect Against Security Violations During The Adoption Of The Internet Of Things By Manufacturers, Sixtus Anayochukwu Ekwo
Strategies To Protect Against Security Violations During The Adoption Of The Internet Of Things By Manufacturers, Sixtus Anayochukwu Ekwo
Walden Dissertations and Doctoral Studies
Security violations have been one of the key factors affecting manufacturers in adopting the Internet of Things (IoT). The corporate-level information technology (IT) leaders in the manufacturing industry encounter issues when adopting IoT due to security concerns because they lack strategies to protect against security violations. Grounded in Roger’s diffusion of innovations theory, the purpose of this qualitative multiple case study was to explore strategies corporate-level IT leaders use in protecting against security violations while adopting IoT for manufacturers. The participants were senior IT leaders in the eastern region of the United States. The data collection process included interviews with …
Exploring The Value Of Technology Within Cross-Departmental Communications, Brian J. Luckey
Exploring The Value Of Technology Within Cross-Departmental Communications, Brian J. Luckey
Walden Dissertations and Doctoral Studies
While many midsized businesses have invested in technology to support business operations, most have not realized the potential value of using technology to collaborate cross-departmentally. There is a lack of knowledge concerning strategies for using technology to facilitate effective organizational communications, which has resulted in operating technology investments being made without corresponding investments in communication technologies. The purpose of this qualitative case study was to fill the knowledge gap concerning the impact of technology for cross-departmental communications. The theoretical foundation for this study was based on systems theory, organizational theory, and stakeholder theory. The key research question involved the impact …
Insider Threats' Behaviors And Data Security Management Strategies, Gladys C. Cooley
Insider Threats' Behaviors And Data Security Management Strategies, Gladys C. Cooley
Walden Dissertations and Doctoral Studies
As insider threats and data security management concerns become more prevalent, the identification of risky behaviors in the workplace is crucial for the privacy of individuals and the survival of organizations. The purpose of this three-round qualitative Delphi study was to identify real-time consensus among 25 information technology (IT) subject matter experts (SMEs) in the Washington metropolitan area about insider threats and data security management. The SMEs participating in this study were adult IT professionals and senior managers with certification in their area of specialization and at least 5 years of practical experience. The dark triad theory was the conceptual …
Knowledge Workers’ Daily Experiences With Technostress And Presenteeism: A Single Case Study, Teresa Himes Mcgovern
Knowledge Workers’ Daily Experiences With Technostress And Presenteeism: A Single Case Study, Teresa Himes Mcgovern
Walden Dissertations and Doctoral Studies
Despite the prominence of Information and Communication Technologies (ICT)-enabled technostress in organizations, there is a gap in the literature on how knowledge workers cope with technostress, and managers know little about the interface of ICT-induced presenteeism on employee productivity. The overarching research question was developed to address the purpose of this qualitative single case study with embedded units, which was to understand the perceptions of knowledge workers on the interface of technostress and ICT-induced presenteeism on their work productivity. This study was framed by the concept of presenteeism developed by Lohaus and Habermann within their comprehensive presenteeism model, a decision-integrated …
Security Strategies Information Technology Security Mangers Use In Deploying Blockchain Applications, Prince Nana Yaw Gyedu Nkrumah
Security Strategies Information Technology Security Mangers Use In Deploying Blockchain Applications, Prince Nana Yaw Gyedu Nkrumah
Walden Dissertations and Doctoral Studies
Blockchain is seen as a potential game-changer in many industries and a transformational technology in the 21st century. However, security concerns have made blockchain technology adoption relatively slow. Massive security breaches in cryptocurrency, an example of blockchain technology, have caused organizations to lose $11.3 billion in illegal transactions, exacerbating these security concerns for information technology (IT) security managers who are worried about the safety of blockchain. Grounded in the routine activity theory, the purpose of this multiple case study was to explore strategies used by IT security managers to deploy blockchain applications securely. The participants were 4 IT security managers …
Information Technology Resources For Precision Medicine, Nicholas L. Bertram
Information Technology Resources For Precision Medicine, Nicholas L. Bertram
Walden Dissertations and Doctoral Studies
Healthcare delivery organizations have an opportunity to use insights from the emerging field of precision medicine to improve the quality of patient care; however, information technology resources to fully enable precision medicine are lacking. The specific problem was that people have limited information to use when making decisions regarding information technology resources for precision medicine in healthcare delivery organizations given the emerging state of precision medicine. The purpose of this Delphi study was to determine how a panel of precision medicine information technology experts view information technology resource importance and feasibility for precision medicine in healthcare delivery organizations. The research …
Mitigating It Security Risk In United States Healthcare: A Qualitative Examination Of Best Practices, Joann Hemann
Mitigating It Security Risk In United States Healthcare: A Qualitative Examination Of Best Practices, Joann Hemann
Walden Dissertations and Doctoral Studies
AbstractCyberattacks are ranked as third in the top 10 highest global threats in terms of likelihood, ranked after extreme weather events and natural disasters. Traditional technology risk management plans for preventative, detective, and recovery measures have failed to mitigate cybersecurity risks created by new technologies. The social problem addressed was the impact of cybercrime to the healthcare industry. The purpose of this qualitative classical Delphi study was to determine how a panel of 25 healthcare cybersecurity experts, based in the United States, viewed the desirability, feasibility, and importance of information technology (IT) cybersecurity risk mitigation techniques. The conceptual framework selected …
A Deductive Database For Knot Colourings, Dong Hyun Han
A Deductive Database For Knot Colourings, Dong Hyun Han
Senior Projects Spring 2021
This work constitutes progress toward the development of a knowledge base for braids, knots, and their colourings. The main result of this development is the creation of a logical model for storing data pertaining to braids, two-dimensional projections of three dimensional knots, finite quandles, and colorings of braids and knots by quandles. It uses the Entity Relationship data reference model as its starting point and makes the original design there. In addition, it includes a conversion of the Entity Relationship Diagram (ERD) to SQL queries that define tables corresponding to the ERD entity sets. Finally this work demonstrates how to …
Maritime Cybersecurity Strategies For Information Technology Specialists, Angela Mizelle Griffin
Maritime Cybersecurity Strategies For Information Technology Specialists, Angela Mizelle Griffin
Walden Dissertations and Doctoral Studies
Dependence on digital technology increases cyber-related risks for maritime industries. As a result, the U.S. Coast Guard network is challenged with maritime cybersecurity, both economically and for national security. Grounded in the general systems theory, the purpose of this multiple case study was to explore strategies information technology (IT) specialists use to implement standard practices for ensuring cyber security. The participants included six IT specialists who have successfully implemented standard practices for maritime organizations in Virginia and West Virginia. Data were collected from individual semistructured interviews and a review of 12 external organizational documents available to the public from IT …
Enhancing Employee Engagement To Improve Financial Performance, Christine Lamacchia
Enhancing Employee Engagement To Improve Financial Performance, Christine Lamacchia
Walden Dissertations and Doctoral Studies
Business leaders are negatively affected when many employees are not engaged in their jobs. Business leaders who struggle to achieve employee engagement suffer decreased profitability, sales, employee retention, and customer satisfaction. Grounded in employee engagement theory, the purpose of this qualitative single case study was to explore strategies IT business leaders use to engage employees. The participants were five IT business leaders who successfully developed strategies to engage employees. Data were collected from semistructured interviews, company documents, and artifacts. Thematic analysis was used to analyze the data. Two themes emerged: creating a company culture conducive to employee engagement and using …
Strategies For Applying Electronic Health Records To Improve Patient Care And Increase Profitability, Fritzgerald Paul
Strategies For Applying Electronic Health Records To Improve Patient Care And Increase Profitability, Fritzgerald Paul
Walden Dissertations and Doctoral Studies
AbstractIneffective strategies to implement electronic health record keeping systems can negatively impact patient care and increase expenses. Hospital administrators and primary care physicians care about this problem because they would be penalized for not meeting meaningful use guidelines. Grounded in the information systems success model, the purpose of this qualitative multiple case study was to explore electronic health record (EHR) implementation strategies primary care physicians use to improve patient care and increase profitability. The participants comprised five primary care physicians involved in the effective implementation of an EHR application in the central coast region of California. Data were collected from …
An Acceptable Cloud Computing Model For Public Sectors, Eswar Kumar Devarakonda
An Acceptable Cloud Computing Model For Public Sectors, Eswar Kumar Devarakonda
Walden Dissertations and Doctoral Studies
Cloud computing enables information technology (IT) leaders to shift from passive business support to active value creators. However, social economic-communication barriers inhibit individual users from strategic use of the cloud. Grounded in the theory of technology acceptance, the purpose of this multiple case study was to explore strategies IT leaders in public sector organizations implement to utilize cloud computing. The participants included nine IT leaders from public sector organizations in Texas, USA. Data were collected using semi-structured interviews, field notes, and publicly available artifacts documents. Data were analyzed using thematic analysis: five themes emerged (a) user-centric and data-driven cloud model; …
Relationships Among Dimensions Of Information System Success And Benefits Of Cloud, William Harold Stanley
Relationships Among Dimensions Of Information System Success And Benefits Of Cloud, William Harold Stanley
Walden Dissertations and Doctoral Studies
Despite the many benefits offered by cloud computing’s design architecture, there are many fundamental performance challenges for IT managers to manage cloud infrastructures to meet business expectations effectively. Grounded in the information systems success model, the purpose of this quantitative correlational study was to evaluate the relationships among the perception of information quality, perception of system quality, perception of service quality, perception of system use, perception of user satisfaction, and net benefits of cloud computing services. The participants (n = 137) were IT cloud services managers in the United States, who completed the DeLone and McLean ISS authors’ validated survey …
Leadership Strategies For Implementing Telemedicine Technology In Rural Hospitals To Improve Profitability, Chikezie Ralph Waturuocha
Leadership Strategies For Implementing Telemedicine Technology In Rural Hospitals To Improve Profitability, Chikezie Ralph Waturuocha
Walden Dissertations and Doctoral Studies
Ineffective leadership strategies can negatively impact telemedicine technology implementation in rural hospitals, which may hinder profitability. Rural hospital administrators who struggle to implement telemedicine technology for improved profitability are at high risk of experiencing patient health outcomes failure. Grounded in the technology acceptance model, the purpose of this qualitative single case study was to explore leadership strategies rural hospital leaders use to implement telemedicine technology to improve profitability. The participants were five health care administrators of a rural hospital in a Midwest U.S. state who successfully implemented telemedicine technology to improve profitability. Sources for data collection were semistructured interviews and …
Information Technology Service Continuity Practices In Disadvantaged Business Enterprises, Allen Edward Raub
Information Technology Service Continuity Practices In Disadvantaged Business Enterprises, Allen Edward Raub
Walden Dissertations and Doctoral Studies
Disadvantaged business enterprises (DBEs) not using cloud solutions to ensure information technology (IT) service continuity may not withstand the impacts of IT disruption caused by human-made and natural disasters. The loss of critical IT resources leads to business closure and a resource loss for the community, employees, and families. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore strategies IT leaders in DBEs use to implement cloud solutions to minimize IT disruption. Participants included 16 IT leaders in DBEs in the U.S. state of Maryland. Data were generated through semi-structured interviews and …
Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa
Strategies To Sustain Small Construction Businesses Beyond The First 5 Years Of Operation, Catherine Nyasha Mukopfa
Walden Dissertations and Doctoral Studies
Small business owners employ over half the U.S. labor force, yet only 50% of small businesses survive beyond 5 years. When small business owners understand the factors that lead to their business failure, they can develop strategies to remain sustainable and profitable within the first 5 years, thus reducing the potential of business failure. Grounded in the resource-based theory, the purpose of this qualitative multiple case study was to explore strategies five small construction owners in central Georgia used to remain in business beyond 5 years. Data were collected from semi structured interviews, a review of organization income statements and …
Strategies Security Managers Used To Prevent Security Breaches In Scada Systems' Networks, Oladipo Ogunmesa
Strategies Security Managers Used To Prevent Security Breaches In Scada Systems' Networks, Oladipo Ogunmesa
Walden Dissertations and Doctoral Studies
Supervisory Control and Data Acquisition (SCADA) systems monitor and control physical processes in critical infrastructure. The impact of successful attacks on the SCADA systems includes the system's downtime and delay in production, which may have a debilitating effect on the national economy and create critical human safety hazards. Grounded in the general systems theory, the purpose of this qualitative multiple case study was to explore strategies SCADA security managers in the Southwest region of the United States use to secure SCADA systems' networks. The participants comprised six SCADA security managers from three oil and gas organizations in the midstream sector …
Network Function Virtualization Technology Adoption Strategies, Abdlrazaq Ayodeji Adeyi Shittu
Network Function Virtualization Technology Adoption Strategies, Abdlrazaq Ayodeji Adeyi Shittu
Walden Dissertations and Doctoral Studies
Network function virtualization (NFV) is a novel system adopted by service providers and organizations, which has become a critical organizational success factor. Chief information officers (CIOs) aim to adopt NFV to consolidate and optimize network processes unavailable in conventional methods. Grounded in the diffusion of innovation theory (DOI), the purpose of this multiple case research study was to explore strategies chief information officers utilized to adopt NFV technology. Participants include two CIOs, one chief security information officer (CSIO), one chief technical officer (CTO), and two senior information technology (IT) executives. Data were collected through semi-structured telephone interviews and eight organizational …
Addressing High False Positive Rates Of Ddos Attack Detection Methods, Alireza Zeinalpour
Addressing High False Positive Rates Of Ddos Attack Detection Methods, Alireza Zeinalpour
Walden Dissertations and Doctoral Studies
Distributed denial of service (DDoS) attack detection methods based on the clustering method are ineffective in detecting attacks correctly. Service interruptions caused by DDoS attacks impose concerns for IT leaders and their organizations, leading to financial damages. Grounded in the cross industry standard process for data mining framework, the purpose of this ex post facto study was to examine whether adding the filter and wrapper methods prior to the clustering method is effective in terms of lowering false positive rates of DDoS attack detection methods. The population of this study was 225,745 network traffic data records of the CICIDS2017 network …
Implementation Strategies For Modeling And Simulation In Military Organizations, Cody Lynn Taylor
Implementation Strategies For Modeling And Simulation In Military Organizations, Cody Lynn Taylor
Walden Dissertations and Doctoral Studies
Some IT project managers working for U.S. military organizations are struggling to implement modern modeling and simulation (M&S) technology. Implementation strategies are needed to help IT practitioners deliver meaningful simulations and models that ultimately help senior leaders make logical and science-based decisions. Grounded in the extended technology acceptance model, the purpose of this qualitative multiple-case study was to explore strategies some IT project managers supporting U.S. military organizations use to implement modern M&S technology. The participants included 10 civil servants who successfully implemented modeling and simulation technology for military organizations located in the United States eastern region. Data was collected …
Medical Practitioners’ Intention To Use Secure Electronic Medical Records In Healthcare Organizations, Omar Enrique Sangurima
Medical Practitioners’ Intention To Use Secure Electronic Medical Records In Healthcare Organizations, Omar Enrique Sangurima
Walden Dissertations and Doctoral Studies
Medical practitioners have difficulty fully implementing secure electronic medical records (EMRs). Clinicians and medical technologists alike need to identify motivational factors behind secure EMR implementation to assure the safety of patient data. Grounded in the unified theory of acceptance and use of technology model, the purpose of this quantitative, correlational study was to examine the relationship between medical practitioners’ perceptions of performance expectancy, effort expectancy, social influence, facilitating conditions, and the intention to use secure EMRs in healthcare organizations. Survey data (N = 126) were collected from medical practitioners from the northeastern United States. The results of the multiple regression …