Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2071 - 2100 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Perceptions Of Factors That Contribute To Employee Retention Of It Project Managers, Julie Ann Wiebell Jan 2019

Perceptions Of Factors That Contribute To Employee Retention Of It Project Managers, Julie Ann Wiebell

Walden Dissertations and Doctoral Studies

The low retention rate of information technology (IT) project managers from a region in the southeastern United States has increased an organization's operational costs and decreased the organization's global competitiveness. The conceptual foundation for this study was the resource-based theory of competitive advantage. This multiple case study explored IT project managers' perceptions of the factors that contributed to their retention. Participants in the study included 10 IT project managers with at least 5 years of experience who were also members of a chapter of the Project Management Institute (PMI). Semistructured interviews were conducted via teleconference to collect data that were …


Knowledge Transfer Strategy Implementation In Contract Organizations, Delano Clyde Hudson Jan 2019

Knowledge Transfer Strategy Implementation In Contract Organizations, Delano Clyde Hudson

Walden Dissertations and Doctoral Studies

Despite economic perils of government shutdowns, foreclosures, bankruptcies, and employee layoffs, some contract leaders consistently fail to implement knowledge transfer strategies that could improve production and profitability and maintain operational readiness when employees transition in and out of the organization. The conceptual framework for this descriptive research study was Nonaka and Takeuchi's socialization, externalization, combination, and internalization model for knowledge creation. A purposive sample of 20 leaders from 2 contract organizations within the south central United States with at least 10 years of experience in contracting were interviewed. Member checking was used for reliability of the synthesized interviews, and triangulation …


Reducing Errors With Blood Administration Transfusion Systems, Kim D. Stevens Jan 2019

Reducing Errors With Blood Administration Transfusion Systems, Kim D. Stevens

Walden Dissertations and Doctoral Studies

The intention of implementing technology into healthcare practices is to reduce opportunity for errors in the delivery of providing health care. However, errors still occur, and many times are preventable. Configurations of health information technology systems should match clinical workflows to promote usage as intended. The purpose of this quality improvement project was to evaluate the impact of revised system configurations and use of a blood product transfusion system for the administration of blood products after one year of implementation. The method of heuristic evaluation is a usability engineering method for finding problems in a user interface design with the …


Cybersecurity Policy Development At The State Level: A Case Study Of Middle Tennessee, Daniel Leslie Scherr Jan 2019

Cybersecurity Policy Development At The State Level: A Case Study Of Middle Tennessee, Daniel Leslie Scherr

Walden Dissertations and Doctoral Studies

Cybersecurity is a growing threat not only to nations, critical infrastructure, and major entities, but also to smaller organizations and individuals. The growing number of successful attacks on all manner of U.S. targets highlights the need for effective and comprehensive policy from the local to federal level, though most research focuses on federal policy issues, not state issues. The purpose of this study was to examine the effectiveness of the decision-making process within the current cybersecurity policy environment in a southern state of the United States. Sabatier's advocacy coalition framework served as the theoretical framework for the study. Data were …


Strategies To Lower Information Technology Employee Voluntary Turnover, Nelson Velez Jan 2019

Strategies To Lower Information Technology Employee Voluntary Turnover, Nelson Velez

Walden Dissertations and Doctoral Studies

For information technology (IT) professionals, the average turnover rate of voluntary employees is approximately 21.5% and occurs in fewer than 5 years. The purpose of this single case study was to explore strategies IT outsourcing business executives used to retain key IT employees in the New England region of the United States. Three IT business leaders from a single organization were selected to participate because they had implemented strategies to retain key IT employees. Herzberg's 2-factor theory of motivation was used as the conceptual framework for this doctoral study. Data were collected using semistructured interviews and review of company policies …


Examination Of Adoption Theory On The Devops Practice Of Continuous Delivery, Andrew John Anderson Jan 2019

Examination Of Adoption Theory On The Devops Practice Of Continuous Delivery, Andrew John Anderson

Walden Dissertations and Doctoral Studies

Many organizations have difficulty adopting advanced software development practices. Some software development project managers in large organizations are not aligned with the relationship between performance expectancy, effort expectancy, social influence, and facilitating conditions, as moderated by experience, with intent to adopt the DevOps practice of continuous delivery. The purpose of this study was to examine the statistical relationships between the independent variables—performance expectancy, effort expectancy, social influence, and facilitating conditions, as moderated by experience—and the dependent variable of behavioral intent to adopt a continuous delivery system. Venkatesh, Morris, Davis, and Davis's unified theory of acceptance and use of technology provided …


Leadership Characteristics In Flexible Information Technology Environments, Chrisilia Bristow Jan 2019

Leadership Characteristics In Flexible Information Technology Environments, Chrisilia Bristow

Walden Dissertations and Doctoral Studies

Researchers have found that a positive correlation exists between information technology (IT) flexibility, IT effectiveness, and strategic alignment in organizations. It has been determined that within inflexible IT environments maintainability is reduced and key business factors become at risk. An IT flexibility measurement matrix was developed to assess IT flexibility however leadership characteristics were not identified for measurement with that model. Determining the leadership characteristics needed for IT flexibility was the purpose of this multiple case study. Leveraging the empowerment, situational leadership, IT-business equilibrium, and complexity change theories, the research questions were focused on the leadership characteristics exhibited by organizational …


Factors Affecting Employee Intentions To Comply With Password Policies, Ernest Tamanji Anye Jan 2019

Factors Affecting Employee Intentions To Comply With Password Policies, Ernest Tamanji Anye

Walden Dissertations and Doctoral Studies

Password policy compliance is a vital component of organizational information security. Although many organizations make substantial investments in information security, employee-related security breaches are prevalent, with many breaches being caused by negative password behavior such as password sharing and the use of weak passwords. The purpose of this quantitative correlational study was to examine the relationship between employees’ attitudes towards password policies, information security awareness, password self-efficacy, and employee intentions to comply with password policies. This study was grounded in the theory of planned behavior and social cognitive theory. A cross-sectional survey was administered online to a random sample of …


Correlational Analysis Of The Relationship Among Mastery Experience, Self-Efficacy, And Project Success, Olakunle Taofeek Lemboye Jan 2019

Correlational Analysis Of The Relationship Among Mastery Experience, Self-Efficacy, And Project Success, Olakunle Taofeek Lemboye

Walden Dissertations and Doctoral Studies

Project managers are important to organizational performance and survival because of their role in managing, controlling, and steering organizational projects to success. Research has shown that project failures are globally pervasive due to the shortage of experienced and well-skilled project managers. The purpose of this descriptive correlational study was to improve the current understanding of the relationships among project managers' project management experience, self-efficacy, and project success, for which the research questions were focused on in addition to the role of project management experience on self-efficacy and project success. The theoretical framework was based on the social cognitive theory. This …


Strategies To Recover From Satellite Communication Failures, Charles Lomotey Jan 2019

Strategies To Recover From Satellite Communication Failures, Charles Lomotey

Walden Dissertations and Doctoral Studies

In natural and manmade disasters, inadequate strategies to recover from satellite communication (SATCOM) failures can affect the ability of humanitarian organizations to provide timely assistance to the affected populations. This single case study explored strategies used by network administrators (NAs) to recover from SATCOM failures in humanitarian operations. The study population were NAs in Asia, the Middle East, Central Africa, East Africa, and West Africa. Data were collected from semistructured interviews with 9 NAs and an analysis of network statistics for their locations. The resource-based view was used as the conceptual framework for the study. Using inductive analysis, 3 themes …


Telehealth Implementation Strategies For Healthcare Providers, Ismaila Gbenga Olatinwo Jan 2019

Telehealth Implementation Strategies For Healthcare Providers, Ismaila Gbenga Olatinwo

Walden Dissertations and Doctoral Studies

The shift in the landscape of healthcare services from inpatient care to outpatient care prompts healthcare leaders to re-evaluate their strategies to boost declining revenue. Telehealth offers potential for increasing efficiency and access to care, and the acceptance of its modal quality is essential for its diffusion and adoption. The purpose of this single case study was to explore strategies that healthcare providers used to implement telehealth to increase profitability. The conceptual framework was the technology acceptance model. Data were collected through semistructured interviews and review of organizational documents. The research population comprised 4 healthcare leaders in 1 organization in …


Adoption Of Cloud Computing Services In An Illinois-Based Insurance Company, Nekerral Polk Jan 2019

Adoption Of Cloud Computing Services In An Illinois-Based Insurance Company, Nekerral Polk

Walden Dissertations and Doctoral Studies

The decision to adopt cloud computing services should involve business units of an insurance company as well as information technology (IT) because cloud computing services are viewed as both a technology offering and business alternative. The purpose of this qualitative exploratory case study was to explore the strategies used by IT architects of an Illinois-based insurance company when adopting cloud computing services. The theory supporting this study was the technology acceptance model. The study's population consisted of IT architects from an Illinois-based insurance company that have used strategies to adopt cloud computing services. This study's data collection included semistructured interviews …


Influential Determinants Of Internet Of Things Adoption In The U.S. Manufacturing Sector, Ronville D. Savoury Jan 2019

Influential Determinants Of Internet Of Things Adoption In The U.S. Manufacturing Sector, Ronville D. Savoury

Walden Dissertations and Doctoral Studies

Manufacturers have been hesitant to adopt Internet of things (IoT) due to a lack of understanding about the innovate characteristics, technology, organizational and environmental factors related to IoT adoption and how their organizations can apply IoT correctly. This quantitative, correlational study used a combination of diffusion of innovation theory and technology–organization–environment framework as the foundation to examine if a relationship exists between relative advantage, complexity, compatibility, technology readiness, top management support, firm size, competitive pressure, and regulatory support and IT leaders' intent to adopt IoT in U.S. manufacturing organizations. A sample of 168 information technology (IT) leaders from the U.S. …


Use Of Mobile Telephones: Experiences Of First Responders In Rural African Communities, James Harding Jan 2019

Use Of Mobile Telephones: Experiences Of First Responders In Rural African Communities, James Harding

Walden Dissertations and Doctoral Studies

Emergency medical technicians (EMTs) usually participate in disaster response in rural African communities. Disasters in African communities are often characterized by huge fatalities, which are associated with a slow pace of response. The use of information and communication technology in disaster response is recognized as an effective conduit for enhancing response. Previous research indicates the efficacy of the use of mobile telephones in disaster response in advance countries. However, there remains a critical gap in the available literature on the experiences of EMTs with the use of mobile telephones in disaster response in rural African communities. The purpose of this …


Information Technology Outsourcing Strategies To Ensure Customer Satisfaction, Clyde Rajack Jan 2019

Information Technology Outsourcing Strategies To Ensure Customer Satisfaction, Clyde Rajack

Walden Dissertations and Doctoral Studies

Many information technology (IT) outsourcing initiatives fail, resulting in a high impact on business results and customer satisfaction. Without effective strategies, business leaders who outsource their IT services are at considerable risk of failure and stakeholder dissatisfaction. The purpose of this multiple case study was to explore outsourcing strategies that IT managers in Southern Ontario, Canada, used to ensure customer satisfaction. Participants included 9 executives with experience in complex IT outsourcing initiatives. Stakeholder theory and transaction cost economics theory were the conceptual frameworks for the study. Data were gathered using semistructured interviews to query 8 topical areas including IT outsourcing …


Exploration Of K-5 Teacher Decision-Making Related To Student Use Of Technology, Eric Noel Rodriguez Jan 2019

Exploration Of K-5 Teacher Decision-Making Related To Student Use Of Technology, Eric Noel Rodriguez

Walden Dissertations and Doctoral Studies

Student technology literacy is critical for success in today’s world; however, little is understood about how teachers make the decision for students to use technology for learning due to limited empirical research on the topic of teacher decision-making regarding student use of information communication technologies (ICT). The purpose of this generic qualitative study was to explore the decision-making process of kindergarten to Grade 5 (K-5) teachers regarding implementation of ICT for student use at varying levels. The framework for this study comprised the substitution augmentation modification redefinition model and the technology acceptance model. The research questions focused on how teachers …


Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe Jan 2019

Relationship Between Perceived Usefulness, Ease Of Use, And Acceptance Of Business Intelligence Systems, Christina Ndiwa Sandema-Sombe

Walden Dissertations and Doctoral Studies

In retail, the explosion of data sources and data has provided incentive to invest in information systems (IS), which enable leaders to understand the market and make timely decisions to improve performance. Given that users’ perceptions of IS affects their use of IS, understanding the factors influencing user acceptance is critical to acquiring an effective business intelligence system (BIS) for an organization. Grounded in the technology acceptance model theory, the purpose of this correlational study was to examine the relationship between perceived usefulness (PU), perceived ease of use (PEOU), and user acceptance of business intelligence systems (BIS) in retail organizations. …


Exploring Firm-Level Cloud Adoption And Diffusion, William J. Wood Jan 2019

Exploring Firm-Level Cloud Adoption And Diffusion, William J. Wood

Walden Dissertations and Doctoral Studies

Cloud computing innovation adoption literature has primarily focused on individuals, small businesses, and nonprofit organizations. The functional linkage between cloud adoption and diffusion is instrumental toward understanding enterprise firm-level adoption. The purpose of this qualitative collective case study was to explore strategies used by information technology (IT) executives to make advantageous enterprise cloud adoption and diffusion decisions. This study was guided by an integrated diffusion of innovation and technology, organization, and environment conceptual framework to capture and model this complex, multifaceted problem. The study’s population consisted of IT executives with cloud-centric roles in 3 large (revenues greater than $5 billion) …


Exploring Strategies For Implementing Information Security Training And Employee Compliance Practices, Alan Robert Dawson Jan 2019

Exploring Strategies For Implementing Information Security Training And Employee Compliance Practices, Alan Robert Dawson

Walden Dissertations and Doctoral Studies

Humans are the weakest link in any information security (IS) environment. Research has shown that humans account for more than half of all security incidents in organizations. The purpose of this qualitative case study was to explore the strategies IS managers use to provide training and awareness programs that improve compliance with organizational security policies and reduce the number of security incidents. The population for this study was IS security managers from 2 organizations in Western New York. Information theory and institutional isomorphism were the conceptual frameworks for this study. Data collection was performed using face-to-face interviews with IS managers …


Cloud Computing Adoption In Afghanistan: A Quantitative Study Based On The Technology Acceptance Model, George T. Nassif Jan 2019

Cloud Computing Adoption In Afghanistan: A Quantitative Study Based On The Technology Acceptance Model, George T. Nassif

Walden Dissertations and Doctoral Studies

Cloud computing emerged as an alternative to traditional in-house data centers that businesses can leverage to increase the operation agility and employees' productivity. IT solution architects are tasked with presenting to IT managers some analysis reflecting cloud computing adoption critical barriers and challenges. This quantitative correlational study established an enhanced technology acceptance model (TAM) with four external variables: perceived security (PeS), perceived privacy (PeP), perceived connectedness (PeN), and perceived complexity (PeC) as antecedents of perceived usefulness (PU) and perceived ease of use (PEoU) in a cloud computing context. Data collected from 125 participants, who responded to the invitation through an …


Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome Jan 2019

Women Leaders In Information Technology: A Phenomenological Study Of Their Career Paths, Michelle Newsome

Walden Dissertations and Doctoral Studies

In the United States, women remain underrepresented in senior level positions in the information technology (IT) field. Despite this challenge, a few women have successfully ascended into senior leadership in IT. Using the social cognitive theory as the conceptual framework, the purpose of this qualitative transcendental phenomenological study was to understand the lived experiences of senior women leaders in the IT field. The research question explored the lived personal and professional experiences of senior women leaders in IT to gain an understanding of their career advancement into senior leadership positions. Through the use of the modified Van Kaam method of …


Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey Jan 2019

Probabilistic Algorithms, Lean Methodology Techniques, And Cell Optimization Results, Michael Mccurrey

Walden Dissertations and Doctoral Studies

There is a significant technology deficiency within the U.S. manufacturing industry compared to other countries. To adequately compete in the global market, lean manufacturing organizations in the United States need to look beyond their traditional methods of evaluating their processes to optimize their assembly cells for efficiency. Utilizing the task-technology fit theory this quantitative correlational study examined the relationships among software using probabilistic algorithms, lean methodology techniques, and manufacturer cell optimization results. Participants consisted of individuals performing the role of the systems analyst within a manufacturing organization using lean methodologies in the Southwestern United States. Data were collected from 118 …


Exploring Data Security Management Strategies For Preventing Data Breaches, Michael Samuel Ofori-Duodu Jan 2019

Exploring Data Security Management Strategies For Preventing Data Breaches, Michael Samuel Ofori-Duodu

Walden Dissertations and Doctoral Studies

Insider threat continues to pose a risk to organizations, and in some cases, the country at large. Data breach events continue to show the insider threat risk has not subsided. This qualitative case study sought to explore the data security management strategies used by database and system administrators to prevent data breaches by malicious insiders. The study population consisted of database administrators and system administrators from a government contracting agency in the northeastern region of the United States. The general systems theory, developed by Von Bertalanffy, was used as the conceptual framework for the research study. The data collection process …


Successful Strategies For Implementing Health Information Technology In Primary Care Practice, Samuel O. Otoo Jan 2019

Successful Strategies For Implementing Health Information Technology In Primary Care Practice, Samuel O. Otoo

Walden Dissertations and Doctoral Studies

Health information technology (HIT) owner-practitioners who adopt effective strategies for HIT implementation can improve primary facility care delivery and profitability. However, some HIT owner-practitioners have ineffective implementation strategies, so they have not realized the total revenue increases of more than 8%. Grounded in general systems theory, the purpose of this multiple case study was to explore successful strategies primary care practitioners (PCPs) use to implement HIT to improve primary facility care delivery and profitability. The participants included 6 owner-practitioners located in Queens County, NY, who successfully implemented HIT to improve facility care delivery and profitability. Data were collected through face-to-face …


Basketball Charts, Kevin Lewis Jan 2019

Basketball Charts, Kevin Lewis

Williams Honors College, Honors Research Projects

The purpose of this project was to develop an interactive web application with access to a self-updating database of basketball statistics. This data would then be used to allow users to generate informative visuals about specific sets of players. Obtaining statistics from the National Basketball Association (NBA) for the 2018-19 season was the original target goal. By utilizing an open source and community driven API, this goal was successfully achieved. With the data in place, the development of the chart building tool that was intended to be the primary functionality of the web application could begin. Highcharts was used as …


Gms - Guest Management System, Ethan Clark Jan 2019

Gms - Guest Management System, Ethan Clark

Williams Honors College, Honors Research Projects

This paper examines the benefits of custom built as opposed to licensed software, using a guest management system as a comparison. The University of Akron employs a web application that allows residents to check guests into each residence hall on campus. In addition to this paper, a custom web application was built to contrast against the university's current system and to recognize the issues raised by its employee staff. This paper is written using the software development lifecycle as its main structure; the planning and analysis through the development process is discussed at length.


How Does Customer Service Offshoring Impact Customer Satisfaction?, Jonathan W. Whitaker, M. S. Krishnan, Claes Fornell, Forrest Morgeson Jan 2019

How Does Customer Service Offshoring Impact Customer Satisfaction?, Jonathan W. Whitaker, M. S. Krishnan, Claes Fornell, Forrest Morgeson

Management Faculty Publications

Information technology (IT) plays a vital role in customer relationship management (CRM), because CRM processes include the collection and analysis of customer information, firms use technology tools to interact with customers, and IT created the conditions under which firms can offshore CRM processes. Customers have negative perceptions toward offshoring, which suggests that firms might be reluctant to offshore IT-enabled CRM processes. However, firms have significantly increased offshoring for CRM processes, presenting a conundrum. Why would firms increase offshoring for CRM processes if there could be a risk to customer satisfaction?

This paper helps to resolve the conundrum by studying the …


Semi-Supervised Deep Embedded Clustering, Yazhou Ren, Kangrong Hu, Xinyi Dai, Lili Pan, Steven C. H. Hoi, Zenglin Xu Jan 2019

Semi-Supervised Deep Embedded Clustering, Yazhou Ren, Kangrong Hu, Xinyi Dai, Lili Pan, Steven C. H. Hoi, Zenglin Xu

Research Collection School Of Computing and Information Systems

Clustering is an important topic in machine learning and data mining. Recently, deep clustering, which learns feature representations for clustering tasks using deep neural networks, has attracted increasing attention for various clustering applications. Deep embedded clustering (DEC) is one of the state-of-theart deep clustering methods. However, DEC does not make use of prior knowledge to guide the learning process. In this paper, we propose a new scheme of semi-supervised deep embedded clustering (SDEC) to overcome this limitation. Concretely, SDEC learns feature representations that favor the clustering tasks and performs clustering assignments simultaneously. In contrast to DEC, SDEC incorporates pairwise constraints …


Feature Set Selection For Improved Classification Of Static Analysis Alerts, Kathleen Goeschel Jan 2019

Feature Set Selection For Improved Classification Of Static Analysis Alerts, Kathleen Goeschel

CCE Theses and Dissertations

With the extreme growth in third party cloud applications, increased exposure of applications to the internet, and the impact of successful breaches, improving the security of software being produced is imperative. Static analysis tools can alert to quality and security vulnerabilities of an application; however, they present developers and analysts with a high rate of false positives and unactionable alerts. This problem may lead to the loss of confidence in the scanning tools, possibly resulting in the tools not being used. The discontinued use of these tools may increase the likelihood of insecure software being released into production. Insecure software …


The Relationship Between Housing Affordability And Demographic Factors: Case Study For The Atlanta Beltline, Chapman T. Lindstrom Jan 2019

The Relationship Between Housing Affordability And Demographic Factors: Case Study For The Atlanta Beltline, Chapman T. Lindstrom

Electronic Theses and Dissertations

Housing affordability has been a widely examined subject for populations residing in major metropolitan regions around the world. The relationship between housing affordability and the city’s demographics and its volume of urban development are important to take into consideration. In the past two decades there has been an increasing volume of literature detailing Atlanta Georgia’s large-scale redevelopment project, the Atlanta BeltLine (ABL), and its relationship with Atlanta’s Metropolitan population and housing affordability. The first objective of this paper is to study the relationship between housing affordability at two scales within the Atlanta Metropolitan Area (AMA) for both renters and homeowners. …