Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2961)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Wisconsin Milwaukee (42)
- University of Arkansas, Fayetteville (41)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2867)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- All Capstone Projects (32)
- Graduate Theses and Dissertations (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 1681 - 1710 of 6720
Full-Text Articles in Physical Sciences and Mathematics
Denial Of Service Attacks: Difference In Rates, Duration, And Financial Damages And The Relationship Between Company Assets And Revenues, Abebe Gebreyes
Denial Of Service Attacks: Difference In Rates, Duration, And Financial Damages And The Relationship Between Company Assets And Revenues, Abebe Gebreyes
Walden Dissertations and Doctoral Studies
AbstractDenial-of-service/distributed denial-of-service (DoS) attacks on network connectivity are a threat to businesses that academics and professionals have attempted to address through cyber-security practices. However, currently there are no metrics to determine how attackers target certain businesses. The purpose of this quantitative study was to address this problem by, first, determining differences among business sectors in rates and duration of attacks and financial damages from attacks and, second, examining relationship among assets and/or revenues and duration of attacks and financial damages. Cohen and Felson's routine activity theory and Cornish and Clarke's rational choice theory served as frameworks as they address the …
Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch
Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch
Walden Dissertations and Doctoral Studies
AbstractElectronic health record system implementations have a high failure rate when properly developed strategies are not used. These implementation failures affect healthcare workers and practitioners core roles through a lack of documentation practices, which decreases the quality of the care of the patients. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore the strategies information technology systems engineers use for the implementation of Health Information Management Systems. The participants were 10 information technology systems engineers from three healthcare organizations in the greater Tennessee area. The data were collected through recorded participant interviews …
Information Technology Strategies Automotive Retailers Use To Improve Customer Retention, Alexious Mulemba
Information Technology Strategies Automotive Retailers Use To Improve Customer Retention, Alexious Mulemba
Walden Dissertations and Doctoral Studies
Business managers in the automotive retail industry face challenges in retaining customers in sales operations. Automotive business managers' failure to retain customers negatively affects sales, revenue, and sustainable business performance. Grounded in expectation-confirmation theory, the purpose of this qualitative multiple case study was to explore the IT strategies some business managers use in the automotive retail industry to retain customers. The participants comprised 4 business managers from 2 automotive retail dealerships in the Western Region of Saudi Arabia, who used IT strategies to retain customers. Data were collected from semistructured interviews, interview notes, and company documents. Four themes emerged: customer …
Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna
Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna
Walden Dissertations and Doctoral Studies
Healthcare organizations generate massive amounts of data through their databases that may be vulnerable to data breaches due to extensive user privileges, unpatched databases, standardized query language injections, weak passwords/usernames, and system weaknesses. The purpose of this qualitative multiple case study was to explore technical strategies database managers in Southeast/North Texas used to protect database systems from data breaches. The target population consisted of database managers from 2 healthcare organizations in this region. The integrated system theory of information security management was the conceptual framework. The data collection process included semistructured interviews with 9 database managers, including a review of …
Social Presence, Immediacy Of Communication, Concurrency, And Use Of Enterprise Social Networks, Veleta A. Gordon
Social Presence, Immediacy Of Communication, Concurrency, And Use Of Enterprise Social Networks, Veleta A. Gordon
Walden Dissertations and Doctoral Studies
Managers are faced with low continuous postadoption usage rates for enterprise social networks implemented at high costs. The problem is a potential loss of value-added benefits when organizations experience a lapse in continuous usage of enterprise social networks among corporate knowledge workers. The purpose of this quantitative study was to test the unified theory of acceptance and use of technology that relates collaboration technology constructs to continuous usage of enterprise social networks for knowledge workers at information technology Fortune 500 companies in the United States. The key research question aimed to examine the relationship among social presence, immediacy of communication, …
Strategies To Digitize Business Processes, Mohamed Abdelmoneim
Strategies To Digitize Business Processes, Mohamed Abdelmoneim
Walden Dissertations and Doctoral Studies
Information technology leaders with limited digitization strategies are less profitable than competitors in the same industry. Without digital strategies, information technology leaders suffer from manual business processes, which results in losing business opportunities. Grounded in general systems theory, the purpose of this multiple case study was to explore the strategies that 10 IT leaders used to transform business processes digitally at four different organizations in Ireland. Data were collected using semistructured face-to-face interviews. The second data source was organizational digitization documents. The 3 themes that emerged from thematic analysis were (a) strong digital leadership competencies, (b) digitally aligned with the …
Effective Data Analytics And Security Strategies In Internal Audit Organizations, Desiree Auchey
Effective Data Analytics And Security Strategies In Internal Audit Organizations, Desiree Auchey
Walden Dissertations and Doctoral Studies
The digitization of the corporate and regulatory environment presents an opportunity for internal audit organizations to change their audit techniques and increase their value to corporations. Audit functions have not kept pace with these advancements, as evidenced by the massive frauds in recent years, and current audit methodology does not robustly incorporate analytics and security of data. Grounded in agency theory, the purpose of this qualitative case study was to explore successful strategies business leaders use to implement data analytics and security for internal auditing and fraudulent activity. The participants comprised 3 audit leaders in Pennsylvania, who effectively used data …
Cloud Adoption Decision-Making Processes By Small Businesses: A Multiple Case Study, Francis Blay
Cloud Adoption Decision-Making Processes By Small Businesses: A Multiple Case Study, Francis Blay
Walden Dissertations and Doctoral Studies
Cloud services have emerged as a compelling technology with immense benefits, but many companies still have concerns about cloud services adoption because of several failures that have occurred, including mistakes by service providers, exploitation of security flaws by hackers, and immature policies and procedures. The specific problem is how small businesses often lack the understanding of the ramifications of their respective decision-making processes to adopt cloud services. There is little understanding of the decision-making processes managers use in cloud services adoption. The purpose of this qualitative multiple case study was to explore the decision-making processes of 3 small businesses in …
The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo
The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo
Walden Dissertations and Doctoral Studies
As consumers increase the use of smart technologies, the lack of or improper implementation of Internet of Things (IoT) systems may affect the profitability of hotel businesses. For this qualitative single case study, Porter’s value chain model was the conceptual framework. The data collection process also included direct observations, participant observations, company performance documents, and reflective journaling. Data analysis from multiple sources of data was triangulated to hoteliers revealing that the implementation of IoT systems strategies may increase profit through the use of IoT system technology. Using Yin’s 5-step process, data were coded and analyzed and produced 3 themes: offer …
Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten
Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten
Walden Dissertations and Doctoral Studies
Cloud computing adoption rates have not grown commensurate with several well-known and substantially tangible benefits such as horizontal distribution and reduced cost, the latter both in terms of infrastructure and specialized personnel. The lack of adoption presents a challenge to both service providers from a sales perspective and service consumers from a usability focus. The purpose of this quantitative correlational study utilizing the technological, organizational, and environmental framework was to examine the relationship between shared technology (ST), malicious insiders (MI), account hijacking, data leakage, data protection, service partner trust (SP), regulatory concerns and the key decision-makers intention to adopt cloud …
Strategies Used In Ehealth Systems Adoption, Joshua Adams
Strategies Used In Ehealth Systems Adoption, Joshua Adams
Walden Dissertations and Doctoral Studies
Failure to adopt an interoperable eHealth system limits the accurate communication exchange of pertinent health-care-related data for diagnosis and treatment. Patient data are located in disparate health information systems, and the adoption of an interoperable eHealth system is complex and requires strategic planning by senior health care IT leaders. Grounded in DeLone and McLeanâs information system success model, the purpose of this qualitative case study was to explore strategies used by some senior information technology (IT) health care leaders in the successful adoption of an eHealth system. The participants were 8 senior health care IT leaders in the eastern United …
Leadership Styles And Emotional Intelligence Of Federal Employees In Diversified Work Environments, Richard Lopez
Leadership Styles And Emotional Intelligence Of Federal Employees In Diversified Work Environments, Richard Lopez
Walden Dissertations and Doctoral Studies
On the Office of Personnel Management Federal Viewpoint Surveys, followers rated their leaders as ineffective. The public expects federal government leaders to effectively lead their followers in order to efficiently manage public services. The purpose of this correlational nonexperimental study was to determine whether there is a correlation between emotional intelligence (EQ) and a full range of leadership styles, as measured by the multileadership questionnaire (MLQ), from the perspective of the follower. Grounded in the theory of EQ, the extant scholarly literature revealed EQ skills complements leadership styles and predict leader success in a variety of business sectors, cultures, and …
Enterprise Resource Planning Implementation In Higher Education: Cost Containment Strategies, Tysha K. Tolefree
Enterprise Resource Planning Implementation In Higher Education: Cost Containment Strategies, Tysha K. Tolefree
Walden Dissertations and Doctoral Studies
Lack of effective cost containment strategies to support enterprise resource planning (ERP) system implementations within higher education institutions (HEIs) result in budget overruns 50% of the time. Grounded in Gartnerâs IT cost containment techniques, the purpose of this qualitative multiple case study was to explore strategies HEI project directors use to support a successful ERP implementation on time and within budget. The participants comprised 5 project directors and managers from HEIs and another public organization in the state of Washington. Data were collected from semistructured interviews, archival data, and organization documents. Thematic analysis was used to analyze the data, and …
Strategies Universities’ And Colleges’ It Leaders Use To Prevent Malware Attacks, Felix Agyei
Strategies Universities’ And Colleges’ It Leaders Use To Prevent Malware Attacks, Felix Agyei
Walden Dissertations and Doctoral Studies
Information systems at universities and colleges are not exempt from the threat of malware. Preventing and mitigating malware attacks is important to universities’ and colleges’ IT leaders to protect sensitive data confidentiality. Grounded in general system theory, the purpose of this exploratory multiple case study was to explore strategies universities’ and colleges’ information technology (IT) leaders use to prevent and mitigate malware attacks. Participants consisted of 6 IT leaders from 3 universities and colleges in Southern California responsible for preventing and mitigating malware attacks. Data were collected through semistructured video teleconferences and 7 organizational documents. Three significant themes emerged through …
Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde
Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde
Walden Dissertations and Doctoral Studies
Some financial institutions in Nigeria have not deployed strategies that mitigate cyber exploitation risks in the financial services industry. Financial institution leaders are concerned because cyber exploitation contributed to the reduction in the adult banking population to a low 38%. Grounded in the integrated systems theory of information security management, the purpose of this multiple case study was to explore strategies some financial institution leaders in Nigeria use to prevent cyber exploitations. The participants included 6 chief information security officers of 6 financial institutions. Data were collected from semistructured interviews and company and public documents. A thematic analysis identified themes …
The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase
The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase
Walden Dissertations and Doctoral Studies
America's higher education institutions have aligned computer science curricula with today's modern technology. Despite these efforts, data have shown that there is slow growth among young women majoring in computer science and even slower growth in this area at community colleges. Higher education institutions have also acknowledged a gap between men and women entering the computer science field and a need to explore options for computer science programs to engage women in the industry. The purpose of this phenomenological study was to gain an understanding of the perceptions and lived experiences of female students enrolled in computer classes at New …
Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson
Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson
Walden Dissertations and Doctoral Studies
Seismic data loss attributed to cybersecurity attacks has been an epidemic-level threat currently plaguing the U.S. healthcare system. Addressing cyber attacks is important to information technology (IT) security managers to minimize organizational risks and effectively safeguard data from associated security breaches. Grounded in the protection motivation theory, the purpose of this qualitative multiple case study was to explore risk-based strategies used by IT security managers to safeguard data effectively. Data were derived from interviews of eight IT security managers of four U.S. government health institutions and a review of relevant organizational documentation. The research data were coded and organized to …
Strategies For Information Technology Employee Retention, Stephen Horton
Strategies For Information Technology Employee Retention, Stephen Horton
Walden Dissertations and Doctoral Studies
Information technology (IT) employee retention is essential to IT departments tasked with supporting the goals and objectives of the organization. IT employees manage, support, and direct IT to drive business, pursue innovation, and create a competitive edge. The purpose of this qualitative exploratory multiple case study was to identify strategies that IT managers use to retain IT employees in order to support the goals and objectives of the IT organization. The population for this study consisted of 5 IT managers in the transportation industry. The IT managers selected for this study had subordinates and delegation duties and worked for employers …
Strategies For The Development Of It Disaster Recovery Plans In The Manufacturing Industry, Michael Landry Sartwell
Strategies For The Development Of It Disaster Recovery Plans In The Manufacturing Industry, Michael Landry Sartwell
Walden Dissertations and Doctoral Studies
Information technology (IT) leaders have reported technology disruptions because of natural disasters, terror attacks, or adversarial threats. Information technology leaders are concerned with technology disruptions, as these disruptions are costing organizations as much as $22,000 per minute. Grounded in Zachman’s framework, the purpose of this qualitative multiple case study was to explore strategies IT managers in the manufacturing industry use to develop IT disaster recovery (DR) plans to support business operations. The participants included 3 manufacturing IT professionals, 2 Department of Defense manufacturing infrastructure specialists, and 1outsourcing contractor, each from firms located in the central United States who successfully developed …
Factors Influencing Cloud Computing Adoption By Small Firms In The Payment Card Industry, Marie Njanje Tambe
Factors Influencing Cloud Computing Adoption By Small Firms In The Payment Card Industry, Marie Njanje Tambe
Walden Dissertations and Doctoral Studies
Technology acceptance is increasingly gaining attention in research considering the continuous exploits of innovation and various derived advantages. Cloud computing (CC) has shown to be the ideal solution for aligning information technology with business strategies. However, small to medium-sized enterprises (SMEs) in the payment card industry are reluctantly adopting this technology despite the benefits. This correlational study aims at investigating whether security, cost effectiveness, or regulatory compliance influence CC adoption by U.S. SMEs in the payment card sector. The study builds on the technology-organization-environment (TOE) framework and uses a previously validated instrument to assess CC adoption by decision-makers in U.S. …
Exploring Software Testing Strategies Used On Software Applications In The Government, Angel Diane Cross
Exploring Software Testing Strategies Used On Software Applications In The Government, Angel Diane Cross
Walden Dissertations and Doctoral Studies
Developing a defect-free software application is a challenging task. Despite many years of experience, the intense development of reliable software remains a challenge. For this reason, software defects identified at the end of the testing phase are more expensive than those detected sooner. The purpose of this multiple case study is to explore the testing strategies software developers use to ensure the reliability of software applications in the government contracting industry. The target population consisted of software developers from 3 government contracting organizations located along the East Coast region of the United States. Lehman’s laws of software evolution was the …
Small-To-Medium-Size Enterprise Managers’ Experiences With Cloud Computing, Anthony Effiong
Small-To-Medium-Size Enterprise Managers’ Experiences With Cloud Computing, Anthony Effiong
Walden Dissertations and Doctoral Studies
Historically, managers of small- and medium-sized enterprises (SMEs) have had concerns regarding cloud computing and cybersecurity. Their resistance to using cloud computing has influenced their ability to do business effectively and to compete with businesses that use cloud computing. The purposes of this descriptive phenomenological study were to explore the lived experiences and perceptions of SME managers that might influence their decisions to adopt cloud computing. Watson’s concept of resistance to change and Davis, Bagozzi, and Warhaw’s technology acceptance model were the conceptual frameworks that guided this qualitative study. Data collection consisted of conducting 16 semi-structured interviews with open-ended questions …
Security Strategies To Prevent Data Breaches In Infrastructure As A Service Cloud Computing, Alberta Amanda Pratt-Sensie
Security Strategies To Prevent Data Breaches In Infrastructure As A Service Cloud Computing, Alberta Amanda Pratt-Sensie
Walden Dissertations and Doctoral Studies
Due to the ever-growing threat of security breaches that information technology (IT) organizations continually face, protecting customer information stored within the cloud is critical to ensuring data integrity. Research shows that new categories of data breaches constantly emerge; thus, security strategies that build trust in consumers and improve system performance are a must. The purpose of this qualitative multiple case study was to explore and analyze the strategies used by database administrators (DBAs) to secure data in a private infrastructure as a service (IaaS) cloud computing. The participants comprised of 6 DBAs from 2 IT companies in Baltimore, Maryland, with …
Telecommunications Database, Tristan Hess
Telecommunications Database, Tristan Hess
Williams Honors College, Honors Research Projects
The final goal of this project was to create a web application that is specifically tailored to make management of data for the Telecommunications department easier. The software that the department uses for phone service generates monthly reports that cannot be stored into their current database system. The Telecommunications Database project is a four-tier web application that was developed to store the monthly report information and alleviate the burden of manually searching through the reports for information. The web application implements basic database functionality for searching, inserting, updating, and deleting data contained in the monthly reports. Advanced searching functionality and …
It Security Managers' Strategies For Mitigating Data Breaches In Texas School Districts, Mercy Ikhuoria Nwankwo
It Security Managers' Strategies For Mitigating Data Breaches In Texas School Districts, Mercy Ikhuoria Nwankwo
Walden Dissertations and Doctoral Studies
School districts are increasingly becoming a prime target for cybercriminals. As a result, information technology (IT) security managers in Texas school districts are concerned about hackers gaining access to network resources that could lead to data breaches on their network. Grounded in the technology threat avoidance theory, the purpose of this qualitative multiple case study was to explore strategies IT security managers use to mitigate data breaches in school district networks in Texas. The participants comprised 6 IT security managers in 3 Texas school districts whose roles involved managing and implementing data security strategies. Data collection involved conducting semistructured interviews …
Exploring Strategies For Capturing Requirements For Developing Ict4d Applications, Jonathan Makanjera
Exploring Strategies For Capturing Requirements For Developing Ict4d Applications, Jonathan Makanjera
Walden Dissertations and Doctoral Studies
Some software engineers make decisions using applications designed from poorly captured user requirements. The quality of user requirements is crucial in the requirements engineering process, costing 50 times more to remedy the defects of using poorly captured user requirements. Grounded in the socialization, externalization, combination and internalization model of Nonaka theoretical framework, the purpose of this qualitative multiple case study was to explore strategies software engineers in Southern African software houses and IT departments use for capturing information and communication technology for development (ICT4D) requirements. The participants consisted of software 12 engineers who were working in Southern Africa, capturing ICT4D …
Exploring Strategies For Enforcing Cybersecurity Policies, Bayo Olushola Omoyiola
Exploring Strategies For Enforcing Cybersecurity Policies, Bayo Olushola Omoyiola
Walden Dissertations and Doctoral Studies
Some cybersecurity leaders have not enforced cybersecurity policies in their organizations. The lack of employee cybersecurity policy compliance is a significant threat in organizations because it leads to security risks and breaches. Grounded in the theory of planned behavior, the purpose of this qualitative case study was to explore the strategies cybersecurity leaders utilize to enforce cybersecurity policies. The participants were cybersecurity leaders from 3 large organizations in southwest and northcentral Nigeria responsible for enforcing cybersecurity policies. The data collection included semi-structured interviews of participating cybersecurity leaders (n = 12) and analysis of cybersecurity policy documents (n = 20). Thematic …
Design Strategies For User Interfaces In Virtual Reality Environments, Jennifer Maple
Design Strategies For User Interfaces In Virtual Reality Environments, Jennifer Maple
Walden Dissertations and Doctoral Studies
The virtual reality market is rapidly increasing and is projected to drastically expand soon as more head-mounted displays are released to customers. These changes have made it more critical that organizations have adequate user interface strategies. Yet there is still a lack of research on how to design quality virtual reality user interfaces that result in positive user experiences. The purpose of this qualitative multiple-case study was to identify design strategies software developers use to create user interfaces for virtual reality environments. Constructionist and constructivist theories served as the conceptual frameworks. The participants consisted of 6 developers from 3 different …
Exploring Trust In Cloud Computing For A Governmental Organization In Ethiopia: A Case Study, Estifanos Abebe Seyoum
Exploring Trust In Cloud Computing For A Governmental Organization In Ethiopia: A Case Study, Estifanos Abebe Seyoum
Walden Dissertations and Doctoral Studies
Organizations face a rapidly changing environment that forces them to seek high computing power. The problem was how to overcome factors that cause managers at governmental organizations in Ethiopia to be reluctant to trust cloud computing, while some managers overcame this lack of trust. The purpose of this qualitative, single case study was to provide a deeper understanding of how a governmental organization in Ethiopia overcame the factors that adversely influenced managers of other organizations to the extent that they distrusted and decided against adopting cloud computing. The population for this study was comprised of 12 managers from a governmental …
The Challenges Of Adopting Cloud Computing In Nigerian Government Organizations, Ayodele Adegbenga Bakare
The Challenges Of Adopting Cloud Computing In Nigerian Government Organizations, Ayodele Adegbenga Bakare
Walden Dissertations and Doctoral Studies
Several technical challenges prevent the adoption of cloud computing by government organizations in Nigeria. Information technology (IT) leaders in the Nigerian government are concerned about this problem because the lack of cloud computing adoption may prevent the Nigerian government from taking advantage of cloud-based information systems to improve its service delivery to citizens and businesses. Grounded in the technology acceptance model, the purpose of this quantitative correlational study was to examine if IT administrators’ perception of data security and perception of fault tolerance can predict their intentions to adopt cloud computing. Data were collected from 79 IT administrators in government …