Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1681 - 1710 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Denial Of Service Attacks: Difference In Rates, Duration, And Financial Damages And The Relationship Between Company Assets And Revenues, Abebe Gebreyes Jan 2020

Denial Of Service Attacks: Difference In Rates, Duration, And Financial Damages And The Relationship Between Company Assets And Revenues, Abebe Gebreyes

Walden Dissertations and Doctoral Studies

AbstractDenial-of-service/distributed denial-of-service (DoS) attacks on network connectivity are a threat to businesses that academics and professionals have attempted to address through cyber-security practices. However, currently there are no metrics to determine how attackers target certain businesses. The purpose of this quantitative study was to address this problem by, first, determining differences among business sectors in rates and duration of attacks and financial damages from attacks and, second, examining relationship among assets and/or revenues and duration of attacks and financial damages. Cohen and Felson's routine activity theory and Cornish and Clarke's rational choice theory served as frameworks as they address the …


Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch Jan 2020

Exploration Of Ehr Implementation Strategies: A Qualitative Study, Scot Eric Loerch

Walden Dissertations and Doctoral Studies

AbstractElectronic health record system implementations have a high failure rate when properly developed strategies are not used. These implementation failures affect healthcare workers and practitioners core roles through a lack of documentation practices, which decreases the quality of the care of the patients. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore the strategies information technology systems engineers use for the implementation of Health Information Management Systems. The participants were 10 information technology systems engineers from three healthcare organizations in the greater Tennessee area. The data were collected through recorded participant interviews …


Information Technology Strategies Automotive Retailers Use To Improve Customer Retention, Alexious Mulemba Jan 2020

Information Technology Strategies Automotive Retailers Use To Improve Customer Retention, Alexious Mulemba

Walden Dissertations and Doctoral Studies

Business managers in the automotive retail industry face challenges in retaining customers in sales operations. Automotive business managers' failure to retain customers negatively affects sales, revenue, and sustainable business performance. Grounded in expectation-confirmation theory, the purpose of this qualitative multiple case study was to explore the IT strategies some business managers use in the automotive retail industry to retain customers. The participants comprised 4 business managers from 2 automotive retail dealerships in the Western Region of Saudi Arabia, who used IT strategies to retain customers. Data were collected from semistructured interviews, interview notes, and company documents. Four themes emerged: customer …


Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna Jan 2020

Technical Strategies Database Managers Use To Protect Systems From Security Breaches, Leonard Ogbonna

Walden Dissertations and Doctoral Studies

Healthcare organizations generate massive amounts of data through their databases that may be vulnerable to data breaches due to extensive user privileges, unpatched databases, standardized query language injections, weak passwords/usernames, and system weaknesses. The purpose of this qualitative multiple case study was to explore technical strategies database managers in Southeast/North Texas used to protect database systems from data breaches. The target population consisted of database managers from 2 healthcare organizations in this region. The integrated system theory of information security management was the conceptual framework. The data collection process included semistructured interviews with 9 database managers, including a review of …


Social Presence, Immediacy Of Communication, Concurrency, And Use Of Enterprise Social Networks, Veleta A. Gordon Jan 2020

Social Presence, Immediacy Of Communication, Concurrency, And Use Of Enterprise Social Networks, Veleta A. Gordon

Walden Dissertations and Doctoral Studies

Managers are faced with low continuous postadoption usage rates for enterprise social networks implemented at high costs. The problem is a potential loss of value-added benefits when organizations experience a lapse in continuous usage of enterprise social networks among corporate knowledge workers. The purpose of this quantitative study was to test the unified theory of acceptance and use of technology that relates collaboration technology constructs to continuous usage of enterprise social networks for knowledge workers at information technology Fortune 500 companies in the United States. The key research question aimed to examine the relationship among social presence, immediacy of communication, …


Strategies To Digitize Business Processes, Mohamed Abdelmoneim Jan 2020

Strategies To Digitize Business Processes, Mohamed Abdelmoneim

Walden Dissertations and Doctoral Studies

Information technology leaders with limited digitization strategies are less profitable than competitors in the same industry. Without digital strategies, information technology leaders suffer from manual business processes, which results in losing business opportunities. Grounded in general systems theory, the purpose of this multiple case study was to explore the strategies that 10 IT leaders used to transform business processes digitally at four different organizations in Ireland. Data were collected using semistructured face-to-face interviews. The second data source was organizational digitization documents. The 3 themes that emerged from thematic analysis were (a) strong digital leadership competencies, (b) digitally aligned with the …


Effective Data Analytics And Security Strategies In Internal Audit Organizations, Desiree Auchey Jan 2020

Effective Data Analytics And Security Strategies In Internal Audit Organizations, Desiree Auchey

Walden Dissertations and Doctoral Studies

The digitization of the corporate and regulatory environment presents an opportunity for internal audit organizations to change their audit techniques and increase their value to corporations. Audit functions have not kept pace with these advancements, as evidenced by the massive frauds in recent years, and current audit methodology does not robustly incorporate analytics and security of data. Grounded in agency theory, the purpose of this qualitative case study was to explore successful strategies business leaders use to implement data analytics and security for internal auditing and fraudulent activity. The participants comprised 3 audit leaders in Pennsylvania, who effectively used data …


Cloud Adoption Decision-Making Processes By Small Businesses: A Multiple Case Study, Francis Blay Jan 2020

Cloud Adoption Decision-Making Processes By Small Businesses: A Multiple Case Study, Francis Blay

Walden Dissertations and Doctoral Studies

Cloud services have emerged as a compelling technology with immense benefits, but many companies still have concerns about cloud services adoption because of several failures that have occurred, including mistakes by service providers, exploitation of security flaws by hackers, and immature policies and procedures. The specific problem is how small businesses often lack the understanding of the ramifications of their respective decision-making processes to adopt cloud services. There is little understanding of the decision-making processes managers use in cloud services adoption. The purpose of this qualitative multiple case study was to explore the decision-making processes of 3 small businesses in …


The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo Jan 2020

The Role Of Internet Of Things In Hotels’ Profitability, Gershwin Narraidoo

Walden Dissertations and Doctoral Studies

As consumers increase the use of smart technologies, the lack of or improper implementation of Internet of Things (IoT) systems may affect the profitability of hotel businesses. For this qualitative single case study, Porter’s value chain model was the conceptual framework. The data collection process also included direct observations, participant observations, company performance documents, and reflective journaling. Data analysis from multiple sources of data was triangulated to hoteliers revealing that the implementation of IoT systems strategies may increase profit through the use of IoT system technology. Using Yin’s 5-step process, data were coded and analyzed and produced 3 themes: offer …


Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten Jan 2020

Relationship Between Specific Security Concerns And Cio Intention To Adopt Cloud, Johnathan Francis Van Houten

Walden Dissertations and Doctoral Studies

Cloud computing adoption rates have not grown commensurate with several well-known and substantially tangible benefits such as horizontal distribution and reduced cost, the latter both in terms of infrastructure and specialized personnel. The lack of adoption presents a challenge to both service providers from a sales perspective and service consumers from a usability focus. The purpose of this quantitative correlational study utilizing the technological, organizational, and environmental framework was to examine the relationship between shared technology (ST), malicious insiders (MI), account hijacking, data leakage, data protection, service partner trust (SP), regulatory concerns and the key decision-makers intention to adopt cloud …


Strategies Used In Ehealth Systems Adoption, Joshua Adams Jan 2020

Strategies Used In Ehealth Systems Adoption, Joshua Adams

Walden Dissertations and Doctoral Studies

Failure to adopt an interoperable eHealth system limits the accurate communication exchange of pertinent health-care-related data for diagnosis and treatment. Patient data are located in disparate health information systems, and the adoption of an interoperable eHealth system is complex and requires strategic planning by senior health care IT leaders. Grounded in DeLone and McLean’s information system success model, the purpose of this qualitative case study was to explore strategies used by some senior information technology (IT) health care leaders in the successful adoption of an eHealth system. The participants were 8 senior health care IT leaders in the eastern United …


Leadership Styles And Emotional Intelligence Of Federal Employees In Diversified Work Environments, Richard Lopez Jan 2020

Leadership Styles And Emotional Intelligence Of Federal Employees In Diversified Work Environments, Richard Lopez

Walden Dissertations and Doctoral Studies

On the Office of Personnel Management Federal Viewpoint Surveys, followers rated their leaders as ineffective. The public expects federal government leaders to effectively lead their followers in order to efficiently manage public services. The purpose of this correlational nonexperimental study was to determine whether there is a correlation between emotional intelligence (EQ) and a full range of leadership styles, as measured by the multileadership questionnaire (MLQ), from the perspective of the follower. Grounded in the theory of EQ, the extant scholarly literature revealed EQ skills complements leadership styles and predict leader success in a variety of business sectors, cultures, and …


Enterprise Resource Planning Implementation In Higher Education: Cost Containment Strategies, Tysha K. Tolefree Jan 2020

Enterprise Resource Planning Implementation In Higher Education: Cost Containment Strategies, Tysha K. Tolefree

Walden Dissertations and Doctoral Studies

Lack of effective cost containment strategies to support enterprise resource planning (ERP) system implementations within higher education institutions (HEIs) result in budget overruns 50% of the time. Grounded in Gartner’s IT cost containment techniques, the purpose of this qualitative multiple case study was to explore strategies HEI project directors use to support a successful ERP implementation on time and within budget. The participants comprised 5 project directors and managers from HEIs and another public organization in the state of Washington. Data were collected from semistructured interviews, archival data, and organization documents. Thematic analysis was used to analyze the data, and …


Strategies Universities’ And Colleges’ It Leaders Use To Prevent Malware Attacks, Felix Agyei Jan 2020

Strategies Universities’ And Colleges’ It Leaders Use To Prevent Malware Attacks, Felix Agyei

Walden Dissertations and Doctoral Studies

Information systems at universities and colleges are not exempt from the threat of malware. Preventing and mitigating malware attacks is important to universities’ and colleges’ IT leaders to protect sensitive data confidentiality. Grounded in general system theory, the purpose of this exploratory multiple case study was to explore strategies universities’ and colleges’ information technology (IT) leaders use to prevent and mitigate malware attacks. Participants consisted of 6 IT leaders from 3 universities and colleges in Southern California responsible for preventing and mitigating malware attacks. Data were collected through semistructured video teleconferences and 7 organizational documents. Three significant themes emerged through …


Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde Jan 2020

Tailored Information Security Strategies For Financial Services Companies In Nigeria, Kayode Alawonde

Walden Dissertations and Doctoral Studies

Some financial institutions in Nigeria have not deployed strategies that mitigate cyber exploitation risks in the financial services industry. Financial institution leaders are concerned because cyber exploitation contributed to the reduction in the adult banking population to a low 38%. Grounded in the integrated systems theory of information security management, the purpose of this multiple case study was to explore strategies some financial institution leaders in Nigeria use to prevent cyber exploitations. The participants included 6 chief information security officers of 6 financial institutions. Data were collected from semistructured interviews and company and public documents. A thematic analysis identified themes …


The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase Jan 2020

The Perceptions And Lived Experiences Of Female Students In A Computer Science Program At A Community College, Terry Voldase

Walden Dissertations and Doctoral Studies

America's higher education institutions have aligned computer science curricula with today's modern technology. Despite these efforts, data have shown that there is slow growth among young women majoring in computer science and even slower growth in this area at community colleges. Higher education institutions have also acknowledged a gap between men and women entering the computer science field and a need to explore options for computer science programs to engage women in the industry. The purpose of this phenomenological study was to gain an understanding of the perceptions and lived experiences of female students enrolled in computer classes at New …


Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson Jan 2020

Cybersecurity Using Risk Management Strategies Of U.S. Government Health Organizations, Ian Cornelius Wilkinson

Walden Dissertations and Doctoral Studies

Seismic data loss attributed to cybersecurity attacks has been an epidemic-level threat currently plaguing the U.S. healthcare system. Addressing cyber attacks is important to information technology (IT) security managers to minimize organizational risks and effectively safeguard data from associated security breaches. Grounded in the protection motivation theory, the purpose of this qualitative multiple case study was to explore risk-based strategies used by IT security managers to safeguard data effectively. Data were derived from interviews of eight IT security managers of four U.S. government health institutions and a review of relevant organizational documentation. The research data were coded and organized to …


Strategies For Information Technology Employee Retention, Stephen Horton Jan 2020

Strategies For Information Technology Employee Retention, Stephen Horton

Walden Dissertations and Doctoral Studies

Information technology (IT) employee retention is essential to IT departments tasked with supporting the goals and objectives of the organization. IT employees manage, support, and direct IT to drive business, pursue innovation, and create a competitive edge. The purpose of this qualitative exploratory multiple case study was to identify strategies that IT managers use to retain IT employees in order to support the goals and objectives of the IT organization. The population for this study consisted of 5 IT managers in the transportation industry. The IT managers selected for this study had subordinates and delegation duties and worked for employers …


Strategies For The Development Of It Disaster Recovery Plans In The Manufacturing Industry, Michael Landry Sartwell Jan 2020

Strategies For The Development Of It Disaster Recovery Plans In The Manufacturing Industry, Michael Landry Sartwell

Walden Dissertations and Doctoral Studies

Information technology (IT) leaders have reported technology disruptions because of natural disasters, terror attacks, or adversarial threats. Information technology leaders are concerned with technology disruptions, as these disruptions are costing organizations as much as $22,000 per minute. Grounded in Zachman’s framework, the purpose of this qualitative multiple case study was to explore strategies IT managers in the manufacturing industry use to develop IT disaster recovery (DR) plans to support business operations. The participants included 3 manufacturing IT professionals, 2 Department of Defense manufacturing infrastructure specialists, and 1outsourcing contractor, each from firms located in the central United States who successfully developed …


Factors Influencing Cloud Computing Adoption By Small Firms In The Payment Card Industry, Marie Njanje Tambe Jan 2020

Factors Influencing Cloud Computing Adoption By Small Firms In The Payment Card Industry, Marie Njanje Tambe

Walden Dissertations and Doctoral Studies

Technology acceptance is increasingly gaining attention in research considering the continuous exploits of innovation and various derived advantages. Cloud computing (CC) has shown to be the ideal solution for aligning information technology with business strategies. However, small to medium-sized enterprises (SMEs) in the payment card industry are reluctantly adopting this technology despite the benefits. This correlational study aims at investigating whether security, cost effectiveness, or regulatory compliance influence CC adoption by U.S. SMEs in the payment card sector. The study builds on the technology-organization-environment (TOE) framework and uses a previously validated instrument to assess CC adoption by decision-makers in U.S. …


Exploring Software Testing Strategies Used On Software Applications In The Government, Angel Diane Cross Jan 2020

Exploring Software Testing Strategies Used On Software Applications In The Government, Angel Diane Cross

Walden Dissertations and Doctoral Studies

Developing a defect-free software application is a challenging task. Despite many years of experience, the intense development of reliable software remains a challenge. For this reason, software defects identified at the end of the testing phase are more expensive than those detected sooner. The purpose of this multiple case study is to explore the testing strategies software developers use to ensure the reliability of software applications in the government contracting industry. The target population consisted of software developers from 3 government contracting organizations located along the East Coast region of the United States. Lehman’s laws of software evolution was the …


Small-To-Medium-Size Enterprise Managers’ Experiences With Cloud Computing, Anthony Effiong Jan 2020

Small-To-Medium-Size Enterprise Managers’ Experiences With Cloud Computing, Anthony Effiong

Walden Dissertations and Doctoral Studies

Historically, managers of small- and medium-sized enterprises (SMEs) have had concerns regarding cloud computing and cybersecurity. Their resistance to using cloud computing has influenced their ability to do business effectively and to compete with businesses that use cloud computing. The purposes of this descriptive phenomenological study were to explore the lived experiences and perceptions of SME managers that might influence their decisions to adopt cloud computing. Watson’s concept of resistance to change and Davis, Bagozzi, and Warhaw’s technology acceptance model were the conceptual frameworks that guided this qualitative study. Data collection consisted of conducting 16 semi-structured interviews with open-ended questions …


Security Strategies To Prevent Data Breaches In Infrastructure As A Service Cloud Computing, Alberta Amanda Pratt-Sensie Jan 2020

Security Strategies To Prevent Data Breaches In Infrastructure As A Service Cloud Computing, Alberta Amanda Pratt-Sensie

Walden Dissertations and Doctoral Studies

Due to the ever-growing threat of security breaches that information technology (IT) organizations continually face, protecting customer information stored within the cloud is critical to ensuring data integrity. Research shows that new categories of data breaches constantly emerge; thus, security strategies that build trust in consumers and improve system performance are a must. The purpose of this qualitative multiple case study was to explore and analyze the strategies used by database administrators (DBAs) to secure data in a private infrastructure as a service (IaaS) cloud computing. The participants comprised of 6 DBAs from 2 IT companies in Baltimore, Maryland, with …


Telecommunications Database, Tristan Hess Jan 2020

Telecommunications Database, Tristan Hess

Williams Honors College, Honors Research Projects

The final goal of this project was to create a web application that is specifically tailored to make management of data for the Telecommunications department easier. The software that the department uses for phone service generates monthly reports that cannot be stored into their current database system. The Telecommunications Database project is a four-tier web application that was developed to store the monthly report information and alleviate the burden of manually searching through the reports for information. The web application implements basic database functionality for searching, inserting, updating, and deleting data contained in the monthly reports. Advanced searching functionality and …


It Security Managers' Strategies For Mitigating Data Breaches In Texas School Districts, Mercy Ikhuoria Nwankwo Jan 2020

It Security Managers' Strategies For Mitigating Data Breaches In Texas School Districts, Mercy Ikhuoria Nwankwo

Walden Dissertations and Doctoral Studies

School districts are increasingly becoming a prime target for cybercriminals. As a result, information technology (IT) security managers in Texas school districts are concerned about hackers gaining access to network resources that could lead to data breaches on their network. Grounded in the technology threat avoidance theory, the purpose of this qualitative multiple case study was to explore strategies IT security managers use to mitigate data breaches in school district networks in Texas. The participants comprised 6 IT security managers in 3 Texas school districts whose roles involved managing and implementing data security strategies. Data collection involved conducting semistructured interviews …


Exploring Strategies For Capturing Requirements For Developing Ict4d Applications, Jonathan Makanjera Jan 2020

Exploring Strategies For Capturing Requirements For Developing Ict4d Applications, Jonathan Makanjera

Walden Dissertations and Doctoral Studies

Some software engineers make decisions using applications designed from poorly captured user requirements. The quality of user requirements is crucial in the requirements engineering process, costing 50 times more to remedy the defects of using poorly captured user requirements. Grounded in the socialization, externalization, combination and internalization model of Nonaka theoretical framework, the purpose of this qualitative multiple case study was to explore strategies software engineers in Southern African software houses and IT departments use for capturing information and communication technology for development (ICT4D) requirements. The participants consisted of software 12 engineers who were working in Southern Africa, capturing ICT4D …


Exploring Strategies For Enforcing Cybersecurity Policies, Bayo Olushola Omoyiola Jan 2020

Exploring Strategies For Enforcing Cybersecurity Policies, Bayo Olushola Omoyiola

Walden Dissertations and Doctoral Studies

Some cybersecurity leaders have not enforced cybersecurity policies in their organizations. The lack of employee cybersecurity policy compliance is a significant threat in organizations because it leads to security risks and breaches. Grounded in the theory of planned behavior, the purpose of this qualitative case study was to explore the strategies cybersecurity leaders utilize to enforce cybersecurity policies. The participants were cybersecurity leaders from 3 large organizations in southwest and northcentral Nigeria responsible for enforcing cybersecurity policies. The data collection included semi-structured interviews of participating cybersecurity leaders (n = 12) and analysis of cybersecurity policy documents (n = 20). Thematic …


Design Strategies For User Interfaces In Virtual Reality Environments, Jennifer Maple Jan 2020

Design Strategies For User Interfaces In Virtual Reality Environments, Jennifer Maple

Walden Dissertations and Doctoral Studies

The virtual reality market is rapidly increasing and is projected to drastically expand soon as more head-mounted displays are released to customers. These changes have made it more critical that organizations have adequate user interface strategies. Yet there is still a lack of research on how to design quality virtual reality user interfaces that result in positive user experiences. The purpose of this qualitative multiple-case study was to identify design strategies software developers use to create user interfaces for virtual reality environments. Constructionist and constructivist theories served as the conceptual frameworks. The participants consisted of 6 developers from 3 different …


Exploring Trust In Cloud Computing For A Governmental Organization In Ethiopia: A Case Study, Estifanos Abebe Seyoum Jan 2020

Exploring Trust In Cloud Computing For A Governmental Organization In Ethiopia: A Case Study, Estifanos Abebe Seyoum

Walden Dissertations and Doctoral Studies

Organizations face a rapidly changing environment that forces them to seek high computing power. The problem was how to overcome factors that cause managers at governmental organizations in Ethiopia to be reluctant to trust cloud computing, while some managers overcame this lack of trust. The purpose of this qualitative, single case study was to provide a deeper understanding of how a governmental organization in Ethiopia overcame the factors that adversely influenced managers of other organizations to the extent that they distrusted and decided against adopting cloud computing. The population for this study was comprised of 12 managers from a governmental …


The Challenges Of Adopting Cloud Computing In Nigerian Government Organizations, Ayodele Adegbenga Bakare Jan 2020

The Challenges Of Adopting Cloud Computing In Nigerian Government Organizations, Ayodele Adegbenga Bakare

Walden Dissertations and Doctoral Studies

Several technical challenges prevent the adoption of cloud computing by government organizations in Nigeria. Information technology (IT) leaders in the Nigerian government are concerned about this problem because the lack of cloud computing adoption may prevent the Nigerian government from taking advantage of cloud-based information systems to improve its service delivery to citizens and businesses. Grounded in the technology acceptance model, the purpose of this quantitative correlational study was to examine if IT administrators’ perception of data security and perception of fault tolerance can predict their intentions to adopt cloud computing. Data were collected from 79 IT administrators in government …