Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1651 - 1680 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu Jan 2020

Information Technology Infrastructure Library: Postimplementation Experiences Of Small Business It Support Employees., Imoovberame Darren Obazu

Walden Dissertations and Doctoral Studies

Information technology (IT) employees of small business organizations have been the driving force for the implementation of innovative standardized IT service management and process improvement initiatives. Competitiveness amongst small business IT organizations in the market for quality IT service delivery led small business IT leaders toward the implementation of an information technology infrastructure library (ITIL) as an IT service management framework. The problem addressed in this research encompassed the needs of small business IT leaders and ITIL designers to understand the perceptions of IT operation employees following ITIL implementation. The purpose of this qualitative multiple case study was to explore …


Knowledge Management, Innovations Systems, And Firm Performance, Henry Dion Young Jan 2020

Knowledge Management, Innovations Systems, And Firm Performance, Henry Dion Young

Walden Dissertations and Doctoral Studies

Small and medium sized-enterprise managers are unable to effectively manage employees’ knowledgeability and innovation systems successfully, which results in negative firm performance. Managers who do not consider employee knowledge management and the benefits related to innovation systems experience financial hardships within the organization. Grounded in the unified model of dynamic organizational knowledge creation theory, the purpose of this quantitative correlational study was to examine the relationship between knowledge management, innovation systems, and firm performance. Data were collected using SurveyMonkey to gather online survey responses from 80 small and medium-sized enterprise managers in California. The results of the standard multiple linear …


Factors That Influence Throughput On Cloud-Hosted Mysql Server, Eric Brown Jan 2020

Factors That Influence Throughput On Cloud-Hosted Mysql Server, Eric Brown

Walden Dissertations and Doctoral Studies

Many businesses are moving their infrastructure to the cloud and may not fully understand the factors that can increase costs. With so many factors available to improve throughput in a database, it can be difficult for a database administrator to know which factors can provide the best efficiency to maintain lower costs. Grounded in Six Sigma theoretical framework, the purpose of this quantitative, quasi-experimental study was to evaluate the relationship between the time of day, the number of concurrent users, InnoDB buffer pool size, InnoDB Input/Output capacity, and MySQL transaction throughput to a MySQL database running on a cloud, virtual, …


A Secure And Strategic Approach To Keep Iot Devices Safe From Malware Attack, Christopher Ray Murray Jan 2020

A Secure And Strategic Approach To Keep Iot Devices Safe From Malware Attack, Christopher Ray Murray

Walden Dissertations and Doctoral Studies

Through the advances in technology, businesses can now utilize the Internet of Things (IoT) devices to improve workflow and provide better services to customers. However, without a strategy to secure these devices, Information Technology (IT) security professionals are left with vulnerable equipment. Grounded in routine activities theory, the purpose of this qualitative multiple case study was to determine strategies IT security professionals used to protect IoT devices in their environment. The participants were 6 IT professionals from 2 medium to large size healthcare facilities based in the Buffalo, New York, and the Washington D.C. area, who possessed strategies to protect …


Relationship Between Risk Identification, Risk Response, And Project Success, Marsha Marinich Jan 2020

Relationship Between Risk Identification, Risk Response, And Project Success, Marsha Marinich

Walden Dissertations and Doctoral Studies

AbstractProjects are used to implement the organization's strategic goals, but high failure rates reduce projects' effectiveness in successfully achieving goals. High failure rates reduce project managers’ effectiveness of projects in successfully achieving goals. Senior leaders and project managers are unable to deliver successful projects due to unmanaged risks. Grounded in expected utility theory, the purpose of this quantitative correlational study was to examine the relationship between risk identification, risk responses, and project success. A survey was created in SurveyMonkey® and distributed on LinkedIn. Survey responses were analyzed from 71 project managers with at least five years of experience in Washington, …


Organization Global Software Development Challenges Of Software Product Quality, Patrick Enabudoso Jan 2020

Organization Global Software Development Challenges Of Software Product Quality, Patrick Enabudoso

Walden Dissertations and Doctoral Studies

Leaders of global software development (GSD) processes in organizations have been confronting low software product quality. Managers of these processes have faced challenges that have been affecting customer satisfaction and that have resulted in negative social impacts on public safety, business financial performance, and global economic stability. The purpose of this qualitative exploratory multiple case study was to discover a common understanding shared by managers in Canadian GSD organizations of how to meet software product quality goals and enhance customer satisfaction. The conceptual framework for the study was based on Deming's 14 principles of quality management. The purposeful sample included …


Exploring Strategies To Transition To Big Data Technologies From Dw Technologies, Mbah Johnas Fortem Jan 2020

Exploring Strategies To Transition To Big Data Technologies From Dw Technologies, Mbah Johnas Fortem

Walden Dissertations and Doctoral Studies

As a result of innovation and technological improvements, organizations are now capable of capturing and storing massive amounts of data from various sources and domains. This increase in the volume of data resulted in traditional tools used for processing, storing, and analyzing large amounts of data becoming increasingly inefficient. Grounded in the extended technology acceptance model, the purpose of this qualitative multiple case study was to explore the strategies data managers use to transition from traditional data warehousing technologies to big data technologies. The participants included data managers from 6 organizations (medium and large size) based in Munich, Germany, who …


Strategies For Managing Offshore Outsourcing For Business Sustainability, Idrissa Maiga Hamidou Issa Jan 2020

Strategies For Managing Offshore Outsourcing For Business Sustainability, Idrissa Maiga Hamidou Issa

Walden Dissertations and Doctoral Studies

Ineffective offshore outsourcing strategies can contribute to unexpected and significant costs for businesses. Strategies to improve outsourcing outcomes are critical to business managers because often third parties contracted to implement offshore outsourcing fail to fulfil business managers’ expectations who can benefit from understanding how to manage outsourced operations and anticipate potential problems. Grounded in transaction cost theory, cultural and customs theory, and the resource-based view theory, the purpose of this qualitative single case study was to explore strategies and processes business managers use to maintain their organization after the implementation of offshore outsourcing. The participants consisted of 3 managers who …


Creating A Sample Of Off-Color Galaxies Using Big Data Tools, Christopher Becker Jan 2020

Creating A Sample Of Off-Color Galaxies Using Big Data Tools, Christopher Becker

Honors Program Theses

This thesis begins an investigation into the presence of off-colored galaxies in the Sloan Digital Sky Survey. Through establishing the emergence and history of Astroinformatics, the thesis introduces the concepts surrounding both off-color galaxies and the Big Data tools helpful in analyzing the data to find them. A discussion of initial implementation methods and revised implementation due to difficulties with previous plans follows. Results are presented, with well in excess of 500,000 candidates for off-color galaxies present in the sample. Conclusions are then drawn regarding such a large sample and the implications this may have on the conventional understanding of …


Dynamic Allocation/Reallocation Of Dark Cores In Many-Core Systems For Improved System Performance, Xingxing Huang, Xiaohang Wang, Yingtao Jiang, Amit Kumar Singh, Mei Yang Jan 2020

Dynamic Allocation/Reallocation Of Dark Cores In Many-Core Systems For Improved System Performance, Xingxing Huang, Xiaohang Wang, Yingtao Jiang, Amit Kumar Singh, Mei Yang

Electrical & Computer Engineering Faculty Research

A significant number of processing cores in any many-core systems nowadays and likely in the future have to be switched off or forced to be idle to become dark cores, in light of ever increasing power density and chip temperature. Although these dark cores cannot make direct contributions to the chip's throughput, they can still be allocated to applications currently running in the system for the sole purpose of heat dissipation enabled by the temperature gradient between the active and dark cores. However, allocating dark cores to applications tends to add extra waiting time to applications yet to be launched, …


Strategies To Lower Security Risks Involving Medical Devices In Patient Care, Brittany Latonia Thigpen Jan 2020

Strategies To Lower Security Risks Involving Medical Devices In Patient Care, Brittany Latonia Thigpen

Walden Dissertations and Doctoral Studies

Insufficient security and design strategies used during the analysis phase of medical device software development can lead to possible cybersecurity vulnerabilities with patient data. The purpose of this qualitative exploratory multiple case study was to explore strategies software developers use to implement security measures to protect patient information collected, sent, and stored by medical devices. The population for this study included software developers whose primary focus was on the security aspect of medical software in three software companies in the Baton Rouge, LA, area. The data collection process included semistructured interviews with 10 software developers and reviewing 16 organizational documents. …


Aligning Workforce Training Center Curricula With Local Business Needs, Elizabeth P. Burns Jan 2020

Aligning Workforce Training Center Curricula With Local Business Needs, Elizabeth P. Burns

Walden Dissertations and Doctoral Studies

Many cities in the United States have experienced job loss due to a shift from industrial-based to information and service economies, as well as the outsourcing of labor jobs to overseas locations. In the absence of industrial jobs once occupied by low-skilled workers, the problem that compelled this study was a perceived gap between the skills required by the employers who now hire such workers and the actual skills those workers have. The purpose of this qualitative case study was to explore the espoused skills required by employers in a rural region of the southeastern United States to inform the …


Strategies To Mitigate The Effects Of Identity Theft In The Hospitality Industry, Patricia Lee Jirsa Jan 2020

Strategies To Mitigate The Effects Of Identity Theft In The Hospitality Industry, Patricia Lee Jirsa

Walden Dissertations and Doctoral Studies

Leaders in the U.S. hospitality industry experience significant losses in profitability, increased mitigation cost, and reduced revenues because of business and consumer identity theft. Grounded in the fraud triangle theory and the fraud diamond theory, the purpose of this qualitative multiple-case study was to explore strategies leaders in the hospitality industry use to mitigate identity theft. A purposeful sample of 5 leaders of 5 different hospitality businesses in Montana participated in the study. Data were collected through semistructured interviews, member checking, and a review of company documents. During data analysis using Yin’s 5-step process, 3 key themes emerged: a new …


Innovation And Market Leadership In A Technology Industry, Wilson Zehr Jan 2020

Innovation And Market Leadership In A Technology Industry, Wilson Zehr

Walden Dissertations and Doctoral Studies

According to the Abernathy-Utterback (A-U) model, firms focus on technological product innovation early in the product lifecycle and then shift to process innovation as markets mature. However, there is no consensus on the forms that non-technological innovation can take. In addition, the A-U model, which guides innovators, does not include forms of non-technological innovation that are generally accepted by experts. In this study, a hybrid e-Delphi technique with an AHP decision model was used to evaluate the forms of innovation used to establish market leadership over the historical lifecycle of the personal computer industry in the United States. In Phase …


Critical Success Factors For E-Government Web Services, Mark Alpern Jan 2020

Critical Success Factors For E-Government Web Services, Mark Alpern

Walden Dissertations and Doctoral Studies

Some municipal government leaders are unable to effectively implement e-government web services, which results in poor client satisfaction. Grounded in the critical success factor theory, the purpose of this qualitative multiple case study was to explore critical success factors managers use to build quality e-government web services. The participants included 3 managers in different municipalities within Ontario, Canada, who successfully implemented e-government web services. Data were collected through semistructured interviews and the review of organizational documents. Thematic analysis was conducted using Yin's 5-step data analysis method, and 5 themes emerged: client-centric government, change management, management support, client engagement, and external …


Key Strategies For Successful Information Technology Projects, David Morris Jan 2020

Key Strategies For Successful Information Technology Projects, David Morris

Walden Dissertations and Doctoral Studies

AbstractThe successful implementation of information technology (IT) projects globally depends on the increasing reliance of project managers on IT innovations. Some project managers and business leaders do not possess the strategies to effectively manage and successfully implement IT projects. Grounded in coordination theory, the purpose of this qualitative multiple case study was to explore strategies used to successfully implement IT projects. Data were collected using semistructured interviews and from company documents. The participants comprised 6 IT project managers in Northeast Ohio who successfully implemented IT projects. Thematic analysis was used to analyze the data. Four themes emerged: communication amongst all …


Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii Jan 2020

Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii

Walden Dissertations and Doctoral Studies

Many data scientists are struggling to adopt effective data governance practices as they transition from traditional data analysis to big data analytics. Data governance of big data requires new strategies to deal with the volume, variety, and velocity attributes of big data. The purpose of this qualitative multiple case study was to explore big data governance strategies employed by data scientists to provide a holistic perspective of those data for making decisions. The participants were 10 data scientists employed in multiple mid-market companies in the greater Salt Lake City, Utah area who have strategies to govern big data. This study’s …


Strategies To Implement A Material Management Information System For Medical Device Recalls, Paul Leo Lafrance Jan 2020

Strategies To Implement A Material Management Information System For Medical Device Recalls, Paul Leo Lafrance

Walden Dissertations and Doctoral Studies

Health care business executives lack strategies to implement material management information systems (MMIS) related to medical device recalls. Lacking sufficient MMIS, health care business executives face insufficient product tracking related to medical devices affecting operational efficiency. Grounded in the conceptual frameworks of the technology acceptance model and diffusion of innovation, the purpose of this qualitative single case study was to explore health care business executives’ strategies for implementing an MMIS related to medical device recalls. The participants were 6 health care executives who implemented an MMIS in an urban hospital in the northeast region of the United States. Data were …


Evaluation Of Telehealth Applications For Patients Seeking Hospice Care, Victoria Emma Surujlall Jan 2020

Evaluation Of Telehealth Applications For Patients Seeking Hospice Care, Victoria Emma Surujlall

Walden Dissertations and Doctoral Studies

Telehealth (TH) is one of the newest avenues for improving accessibility and healthcare accommodations for patients with chronic health issues and terminal illness. The purpose of a quality improvement (QI) initiative at the project site was to align current evidence-based practice to address the disparities in the admissions process experienced by patients seeking hospice care from remote locations. The health belief model and Roger's diffusion of innovation theory were used to inform this doctor of nursing QI evaluation project to determine whether using a standardized evidence-based intake assessment process delivered by TH would increase accessibility for patients seeking hospice services. …


Strategies To Mitigate The Effects Of Identity Theft In The Hospitality Industry, Patricia Lee Jirsa Jan 2020

Strategies To Mitigate The Effects Of Identity Theft In The Hospitality Industry, Patricia Lee Jirsa

Walden Dissertations and Doctoral Studies

Leaders in the U.S. hospitality industry experience significant losses in profitability, increased mitigation cost, and reduced revenues because of business and consumer identity theft. Grounded in the fraud triangle theory and the fraud diamond theory, the purpose of this qualitative multiple-case study was to explore strategies leaders in the hospitality industry use to mitigate identity theft. A purposeful sample of 5 leaders of 5 different hospitality businesses in Montana participated in the study. Data were collected through semistructured interviews, member checking, and a review of company documents. During data analysis using Yin’s 5-step process, 3 key themes emerged: a new …


Strategies To Implement Big Data Analytics In Telecommunications Organizations, Delton Aneato Jan 2020

Strategies To Implement Big Data Analytics In Telecommunications Organizations, Delton Aneato

Walden Dissertations and Doctoral Studies

Information Technology (IT) leaders who do not invest in big data projects may struggle to gain a competitive advantage and business insights to improve performance. Grounded in the Kotter’s change and Six Sigma models, the purpose of this qualitative multiple case study was to explore strategies IT leaders used to implement big data analytics successfully. The participants comprised 4 IT leaders from 2 telecommunication organizations in the United States of America, who effectively used strategies to promote and maximize competitive advantage using big data analytics. Data were collected from semistructured interviews, company documents, and project-related documents and were analyzed using …


Temporal Data Extraction And Query System For Epilepsy Signal Analysis, Yan Huang Jan 2020

Temporal Data Extraction And Query System For Epilepsy Signal Analysis, Yan Huang

Theses and Dissertations--Computer Science

The 2016 Epilepsy Innovation Institute (Ei2) community survey reported that unpredictability is the most challenging aspect of seizure management. Effective and precise detection, prediction, and localization of epileptic seizures is a fundamental computational challenge. Utilizing epilepsy data from multiple epilepsy monitoring units can enhance the quantity and diversity of datasets, which can lead to more robust epilepsy data analysis tools. The contributions of this dissertation are two-fold. One is the implementation of a temporal query for epilepsy data; the other is the machine learning approach for seizure detection, seizure prediction, and seizure localization. The three key components of our temporal …


Factors Affecting Electronic Banking Adoption In Barbados, Jacqueline Delores Bend Jan 2020

Factors Affecting Electronic Banking Adoption In Barbados, Jacqueline Delores Bend

Walden Dissertations and Doctoral Studies

The low rate of customers' adoption of electronic banking services affects retail banks' profitability. The operating cost for a financial transaction performed by bank tellers averages US$1.07 compared to US$0.01 using electronic banking channels. It is paramount for retail banking leaders to understand the factors influencing customer adoption of electronic banking to sustain competitive advantage. Grounded in the technology acceptance model framework, the purpose of this quantitative correlational study was to examine the relationship between perceived usefulness (PU), perceived ease of use (PEOU), and customer adoption of electronic banking in Barbados. The validated technology acceptance model survey instrument was used …


Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove Jan 2020

Strategies Used To Mitigate Social Engineering Attacks, Lindiwe T. Hove

Walden Dissertations and Doctoral Studies

Cybercriminal activity performed widely through social engineering attacks is estimated to be one of the substantial challenges the world will face over the next 20 years. Cybercriminal activity is important to chief information security officers (CISOs) because these attacks represent the largest transfer of economic wealth in history and pose risks to the incentives for organizational innovation and investment and eventually become more profitable than the global trade of all major illegal drugs combined. Grounded in the balanced control theory, the purpose of this multiple case study was to explore strategies CISOs use to mitigate social engineering attacks within their …


The Impact Of Technological Advances On Older Workers, Toni Mcintosh Jan 2020

The Impact Of Technological Advances On Older Workers, Toni Mcintosh

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was the treatment of older workers in the information technology industry that contributes to age discrimination in the workplace. Age discrimination is against the law irrespective of whether it is aimed at older workers in the workforce or becoming job candidates at an advanced age. Although previous research has shown that age discrimination is prevalent in work environments, little has been suggested to eradicate the issue in the workplace. The purpose of this qualitative case study was to investigate the issue of age discrimination as it relates to workers over the age of …


Youth Leadership Development Program Evaluation, Loreley Lyn Smith Jan 2020

Youth Leadership Development Program Evaluation, Loreley Lyn Smith

Walden Dissertations and Doctoral Studies

In competitive youth sports organizations, few organizational leaders focus on leadership development to prepare youth for life situations. Sports organizational leaders are concerned about youth leadership development, as development allows youth to build skills necessary to understand their strengths and weaknesses and recognize ways to overcome fears. Grounded in social learning theory, the purpose of this summative program evaluation was to determine the extent to which a competitive youth sports leadership development program aligned with the organization’s primary objective to provide skilled athletic training while providing lessons to prepare youth for adulthood. The participants comprised 40 key stakeholders, including participants …


Analysis Of Driving Forces That Ensures The Sustainability Of Voter Accreditation Technology, Lawrence Oluwagbenga Bayode Jan 2020

Analysis Of Driving Forces That Ensures The Sustainability Of Voter Accreditation Technology, Lawrence Oluwagbenga Bayode

Walden Dissertations and Doctoral Studies

Nigeria’s electoral body, the independent national electoral commission (INEC), deployed a novel information technology (IT) based voter accreditation technology in 2015. Benefits realized included transparency and curtailed electoral malpractices. The purpose of this quantitative correlational study was to examine the relationship(s) between some variables categorized into technological, organizational, and economic factors, and Sustainability of voter accreditation technology (SVAT). The theoretical framework for the study was the e-voting system adoption model in combination with constructs from three other theories. A total of 138 IT experts participated and were asked (via SurveyMonkey) of the relationships between the following factors and SVAT: ease …


Strategies Used By It Project Managers To Integrate Icts In The Eastern Caribbean, Carl St. Aubin Roberts Jan 2020

Strategies Used By It Project Managers To Integrate Icts In The Eastern Caribbean, Carl St. Aubin Roberts

Walden Dissertations and Doctoral Studies

Current practices used to guide information and communication technology (ICT) projects in the Caribbean and developing countries lead to high project failure rates. Project managers must adopt new innovative approaches for transformation towards a 21st-century information society and sustainable digital economies. Grounded in the technology acceptance model (TAM), the purpose of this qualitative multiple-case study was to explore strategies information technology (IT) project managers use to implement IT frameworks designed to guide Caribbean ICT integration. Data were collected from face to face interviews and company documents and analyzed using coding, thematic analysis, and methodological triangulation. The participants were 12 IT …


Technology Business Leaders' Strategies To Increase Employees' Engagement, Desmond J. L. Browne Jan 2020

Technology Business Leaders' Strategies To Increase Employees' Engagement, Desmond J. L. Browne

Walden Dissertations and Doctoral Studies

AbstractEmployee disengagement is costly and reduces an organization's ability to meet its full potential to produce business results. Technology business leaders who have engaged employees can positively alter the company's rapid transformation to be more competitive. Grounded by the social exchange theory, the purpose of this qualitative single case study was to explore strategies 6 technology leaders in the Atlanta metropolitan area use to engage employees. Data were collected through semistructured interviews and company documents. Data were analyzed using Yin's 5-step data analysis process. Three themes emerged: communicate with transparency, provide offerings for training and rewards, and identify and implement …


Exploring The Relationship Between Iot Security And Standardization, James Jenness Clapp Jan 2020

Exploring The Relationship Between Iot Security And Standardization, James Jenness Clapp

Walden Dissertations and Doctoral Studies

The adoption of the Internet of Things (IoT) technology across society presents new and unique challenges for security experts in maintaining uninterrupted services across the technology spectrum. A botnet implemented over 490,000 IoT connected devices to cripple the Internet services for major companies in one recent IoT attack. Grounded in Roger’s diffusion of innovations theory, the purpose of this qualitative exploratory multiple-case study was to explore implementation strategies used by some local campus IT managers in educational institutions in the United States to secure the IoT environment. The participants were 10 IT local campus IT managers within educational institutions across …