Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2791 - 2820 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin Jan 2017

Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin

Walden Dissertations and Doctoral Studies

Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government …


Exploring Strategies For Early Identification Of Risks In Information Technology Projects, Nina Michele Mack-Cain Jan 2017

Exploring Strategies For Early Identification Of Risks In Information Technology Projects, Nina Michele Mack-Cain

Walden Dissertations and Doctoral Studies

Project managers must ensure risk management and business justification for their projects. Approximately, 53% of IT projects failed due to project managers not identifying risks early in the projects' lifecycle. The purpose of this single case study was to explore strategies IT project managers utilize to identify risks early in the project's lifecycle. The study population consisted of 5 lead IT project managers from a telecom company located in the Midwest region of the United States who had managed IT projects. The conceptual framework that grounded this study was the general systems theory. The data collection process involved semistructured interviews, …


The Core Competencies Necessary For Global Information Technology Project Management, Gregory Michael Von Schleh Jan 2017

The Core Competencies Necessary For Global Information Technology Project Management, Gregory Michael Von Schleh

Walden Dissertations and Doctoral Studies

Global information technology (IT) project management organizations can create more value in their operations by presenting the core competencies possessed by global IT project managers (PMs) who are successful in their respective projects. The purpose of this multiple case study was to explore the core competencies and business strategies that IT PMs use to meet global IT project deadlines and budgets. This study involved 5 IT PMs from the Pacific Northwest (United States and Canada) who increased the quality of outsourced IT projects from 4 different companies. The data collection method included in-person semistructured interviews of participants and review of …


Effective Competitive Strategies Of U.S. In Vitro Device Manufacturers, Sofia M. Beglari Jan 2017

Effective Competitive Strategies Of U.S. In Vitro Device Manufacturers, Sofia M. Beglari

Walden Dissertations and Doctoral Studies

Medical manufacturing leaders struggle to maintain their competitive position due to inefficient business strategies. The purpose of this multiple case study was to explore strategies that in vitro diagnostics (IVD) medical manufacturing's leaders have used to gain and maintain a competitive advantage in the global marketplace. Porter's competitive advantage theory was used to understand how IVD medical business leaders maintain their competitive edge. Data were gathered through interviews with a purposive sample of 3 IVD medical device leaders from companies in California, Connecticut, and New York who had run IVD medical businesses for at least 10 years and who attended …


Social Media Strategies For Increasing Sales, Loretta N. Ezeife Jan 2017

Social Media Strategies For Increasing Sales, Loretta N. Ezeife

Walden Dissertations and Doctoral Studies

Social media have transformed business commerce and consumer communication, yet organizational leaders lack clear strategies for using social media platforms to their advantage. The purpose of this qualitative multicase study was to explore social media marketing strategies for increasing sales. The relationship marketing conceptual framework grounded this study. Data collection included semistructured interviews with 5 organizational leaders from 5 different organizations in the San Francisco, California, Bay Area and a review of participants’ documents including marketing materials, social media posts, and published sales reports. Data analysis included coding, categorization, and identification of major themes. The thematic assessment approach revealed 5 …


The Relationship Between Technology Threat Avoidance And Innovation In Health Care Organizations, Melvin R. Fenner Jr Jan 2017

The Relationship Between Technology Threat Avoidance And Innovation In Health Care Organizations, Melvin R. Fenner Jr

Walden Dissertations and Doctoral Studies

Most leaders of healthcare delivery organizations have increased their rate of technological innovation, but some still struggle to keep pace with other industries. The problem addressed in this study was that senior leaders in some rural ambulatory healthcare facilities failed to innovate, even with recent healthcare technological innovations, which could lead to increased medical errors and a loss of efficiency. The purpose of the study was to examine if a relationship exists between the avoidance of technology threats by senior leaders in ambulatory healthcare organizations and the innovation propensity of the organization. Technology threat avoidance theory served as the theoretical …


Information Communication Technology Management As A Gdp Growth Contributor Within Arab League Nations, Jamal Alexander Thompson Jan 2017

Information Communication Technology Management As A Gdp Growth Contributor Within Arab League Nations, Jamal Alexander Thompson

Walden Dissertations and Doctoral Studies

The general problem addressed in this study was Arab League nations' over-reliance on fossil fuels as a gross domestic product (GDP) growth driver. Arab League nations that depend primarily on fossil fuel production lack alternative resources for growth in times of fossil fuel usage or price decline. Overdependence on fossil fuels has led to minimal development in other economic sectors, primarily in skilled domestic labor, and to a high dependency on foreign skilled labor for skilled domestic jobs. The purpose of this study was to examine to what extent information communication technology (ICT) management can be a viable GDP growth …


Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo Jan 2017

Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo

Walden Dissertations and Doctoral Studies

According to research, the risks of adopting new technology and the technological and organizational factors that influence adopting it are not clear. Thus, many financial institutions have hesitated to adopt cloud-computing. The purpose of this quantitative, cross-sectional study was to evaluate the cyber-risk implications of cloud-computing adoption in the U.S. financial services sector. The study examined 6 technological and organizational factors: organization size, relative advantage, compliance, security, compatibility, and complexity within the context of cyber-risk. Using a combination of diffusion of innovation theory and technology-organization-environment framework as the foundation, a predictive cybersecurity model was developed to determine the factors that …


Assessing The Influence Of Smart Mobile Devices On How Employees Work, Adam L. Gorski Jan 2017

Assessing The Influence Of Smart Mobile Devices On How Employees Work, Adam L. Gorski

Walden Dissertations and Doctoral Studies

The smart mobile device market penetration reached 50% and has been increasing an average of 39% per year in the United States. More than 70% of the smart mobile device owners use such devices for personal and work activities. The problem was the lack of management's understanding of the effect smart mobile device use has on how employees work when they are in the office, while traveling, or during the off-hours to improve productivity and customer service. The purpose of this phenomenological study was to understand why, when, and how employees used smart mobile devices. The transformational technology conceptual framework …


Offshore Outsourcing Of The United States Semiconductor Manufacturing: Management Approaches And Strategies, Oscar Mostofi Jan 2017

Offshore Outsourcing Of The United States Semiconductor Manufacturing: Management Approaches And Strategies, Oscar Mostofi

Walden Dissertations and Doctoral Studies

The United States manufacturing employment decreased 33% from 1985 to 2014. During the same period, the United States semiconductor manufacturing, accounting for 1.7% of the total of the United States manufacturing workforce, lost 35% of its employees. The decline in semiconductor manufacturing jobs began in 1985 when semiconductor firms began offshoring product manufacturing overseas because of low cost of qualified labor force and facilities. This qualitative case study explored the analytical approaches and strategies business leaders of semiconductor firms that offshore manufacturing use in making informed strategic outsourcing and offshoring decisions conducive to sustainability and profitability of operations. The location …


Exploring Strategies For Successful Implementation Of Electronic Health Records, Richard Alton Warren Jan 2017

Exploring Strategies For Successful Implementation Of Electronic Health Records, Richard Alton Warren

Walden Dissertations and Doctoral Studies

Adoption of electronic health records (EHR) systems in nonfederal acute care hospitals has increased, with adoption rates across the United States reaching as high as 94%. Of the 330 plus acute care hospital EHR implementations in Texas, only 31% have completed attestation to Stage 2 of the meaningful use (MU) criteria. The purpose of this multiple case study was to explore strategies that hospital chief information officers (CIOs) used for the successful implementation of EHR. The target population consists of 3 hospitals CIOs from a multi-county region in North Central Texas who successfully implemented EHRs meeting Stage 2 MU criteria. …


A Gamification Framework For Sensor Data Analytics, Alexandra L'Heureux, Katarina Grolinger, Wilson A. Higashino, Miriam A. M. Capretz Jan 2017

A Gamification Framework For Sensor Data Analytics, Alexandra L'Heureux, Katarina Grolinger, Wilson A. Higashino, Miriam A. M. Capretz

Electrical and Computer Engineering Publications

The Internet of Things (IoT) enables connected objects to capture, communicate, and collect information over the network through a multitude of sensors, setting the foundation for applications such as smart grids, smart cars, and smart cities. In this context, large scale analytics is needed to extract knowledge and value from the data produced by these sensors. The ability to perform analytics on these data, however, is highly limited by the difficulties of collecting labels. Indeed, the machine learning techniques used to perform analytics rely upon data labels to learn and to validate results. Historically, crowdsourcing platforms have been used to …


Data Analytics In Performance Of Kick-Out Distribution And Effectiveness In Senior Championship Football In Ireland, Roisin Donnelly, Darragh Daly Jan 2017

Data Analytics In Performance Of Kick-Out Distribution And Effectiveness In Senior Championship Football In Ireland, Roisin Donnelly, Darragh Daly

Articles

n recent years, data analytics has been a growing phenomenon in many fields, including sport, and there has been an increased focus on how technology will impact the work of coaching andperformance professionals. This paper provides a reflection of the use of data analytics within the Gaelic Athletic Association’s (GAA) football coaching practice in Ireland, and evaluates for coaches how to enhance kick- out distribution and effectiveness. Specifically, the study aimed to dissect and analyse kick- out strategies to assess from a coaching perspective, the impact on distribution andeffectiveness. The research is a …


Extracting A Relational Database Schema From A Document Database, Jared Thomas Wheeler Jan 2017

Extracting A Relational Database Schema From A Document Database, Jared Thomas Wheeler

UNF Graduate Theses and Dissertations

As NoSQL databases become increasingly used, more methodologies emerge for migrating from relational databases to NoSQL databases. Meanwhile, there is a lack of methodologies that assist in migration in the opposite direction, from NoSQL to relational. As software is being iterated upon, use cases may change. A system which was originally developed with a NoSQL database may accrue needs which require Atomic, Consistency, Isolation, and Durability (ACID) features that NoSQL systems lack, such as consistency across nodes or consistency across re-used domain objects. Shifting requirements could result in the system being changed to utilize a relational database. While there are …


Strategies Hospital Leaders Use In Implementing Electronic Medical Record Systems, Shaunette Miller Jan 2017

Strategies Hospital Leaders Use In Implementing Electronic Medical Record Systems, Shaunette Miller

Walden Dissertations and Doctoral Studies

Some hospital leaders lacked strategies for implementing electronic medical record (EMR) systems. The purpose of this case study was to explore successful strategies that hospital leaders used in implementing EMR systems. The target population consisted of hospital leaders who succeeded in implementing EMR systems in a single healthcare organization located in the Los Angeles, California region. The conceptual framework used was Kotter's (1996) eight-step process for leading change, and data were collected from face-to-face recorded interviews with 5 participants and from company documents related to EMR design and development. Data were analyzed through methodological triangulation of data types, and exploring …


Educating Nurses On Workflow Changes From Electronic Health Record Adoption, Rhoda Lynn Atienza San Jose Jan 2017

Educating Nurses On Workflow Changes From Electronic Health Record Adoption, Rhoda Lynn Atienza San Jose

Walden Dissertations and Doctoral Studies

Workflow issues related to adoption of the electronic health record (EHR) has led to unsafe workarounds, decreased productivity, inefficient clinical documentation and slow rates of EHR adoption. The problem addressed in this quality improvement project was nurses' lack of knowledge about workflow changes due to EHR adoption. The purpose of this project was to identify changes in workflow and to develop an educational module to communicate the changes. This project was guided by both the ADDIE model (analysis, design, development, implementation, and evaluation) and the diffusion of innovations theory. Five stages were involved: process mapping, cognitive walkthrough, eLearning module development, …


Strategies For U.S. City Government Enterprise Resource Planning System Implementation Success, Jennifer Miller Jan 2017

Strategies For U.S. City Government Enterprise Resource Planning System Implementation Success, Jennifer Miller

Walden Dissertations and Doctoral Studies

Strategies for enterprise resource planning (ERP) system implementation success have been a focus of scholars since the 1990s. Researchers have demonstrated that ERP system implementation could cause both system failures and organization failures, affecting both operations and stakeholders. The theory of constraints was the conceptual framework for this single qualitative case study that explored ERP system critical success factors (CSFs) and strategies U.S. city governments use to successfully implement ERP systems. One city government in New Mexico with a successful ERP system served as the case study's population. Data were collected from semistructured interviews and relevant documents and then open …


Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley Jan 2017

Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley

Walden Dissertations and Doctoral Studies

The cost of resolving user requests for IT assistance rises annually. Researchers have demonstrated that data warehouse analytic techniques can improve service, but they have not established the benefit of using global organizational data to reduce reported IT incidents. The purpose of this quantitative, quasi-experimental study was to examine the extent to which IT staff use of organizational knowledge generated from data warehouse analytical measures reduces the number of IT incidents over a 30-day period, as reported by global users of IT within an international pharmaceutical company headquartered in Germany. Organizational learning theory was used to approach the theorized relationship …


Examining The Behavioral Intention Of Individuals' Compliance With Information Security Policies, David A. Brown Jan 2017

Examining The Behavioral Intention Of Individuals' Compliance With Information Security Policies, David A. Brown

Walden Dissertations and Doctoral Studies

Target Corporation experienced an information security breach resulting in compromising customers' financial information. Management is responsible for implementing adequate information security policies that protect corporate data and minimize financial losses. The purpose of this experimental study was to examine the effect of a fear appeal communication on an individual's information security policy behavioral intention. The sample population involved information technology professionals randomly selected from the SurveyMonkey audience. A research model, developed using constructs from deterrence theory and protection motivation theory, became the structural model used for partial least squares-structural equation modeling (PLS-SEM) analysis of the survey response data, which indicated …


Faculty Perceptions Of Instructional Strategies That Foster Student Engagement In Online Courses, Sharon M. Hope Jan 2017

Faculty Perceptions Of Instructional Strategies That Foster Student Engagement In Online Courses, Sharon M. Hope

Walden Dissertations and Doctoral Studies

Developing online instructional strategies for increasing student engagement and success is significant locally and nationally due to growth in the online field, advances in technology, and the need for colleges to maximize student success. This study stemmed from the desire of administrators at an upstate New York private college to discover additional ways to design and deliver effective online instruction. The purpose of this qualitative instrumental case study was to discover faculty perceptions of and experiences with instructional strategies that they used to foster student engagement in online learning. Kearsley and Shneiderman's engagement theory formed the study's conceptual framework. Ten …


Antecedents Of Employees' Behavioral Intentions Regarding Information Technology Consumerization, Alain Ouattara Jan 2017

Antecedents Of Employees' Behavioral Intentions Regarding Information Technology Consumerization, Alain Ouattara

Walden Dissertations and Doctoral Studies

The majority of organizations worldwide have adopted IT consumerization. However, only a small percentage of them explicitly manage the dual use of personal devices and applications for work purposes. This correlational study used the extended unified technology acceptance and use technology model (UTAUT2) to examine whether employees' perceptions of habit, effort expectancy, performance expectancy, facilitating conditions, hedonic motivation, social influence, and price value can predict IT consumerization behavioral intentions (BI). A pre-existing UTAUT2 survey instrument was used to collect data from employees (N = 112) of small- and medium-sized organizations across different industries in Ontario, Canada. The regression analysis confirmed …


Strategies For Integrating Technological Innovations In Small Businesses, Petra Samuel Jan 2017

Strategies For Integrating Technological Innovations In Small Businesses, Petra Samuel

Walden Dissertations and Doctoral Studies

The effective integration of technological innovation is vital to the success of small businesses and can catapult growth and profitability. Some business managers and supervisors, however, may not have a firm understanding of strategies for integrating technological innovations in businesses; this lack of knowledge may result in employee frustration and costly roadblocks to achieving business objectives. This case study was conducted to identify the strategies used by business managers and supervisors to integrate technological innovations in small businesses. Christensen's theory of disruptive innovation and Rogers' theory of diffusion of innovation served as the conceptual framework. Ten business managers and supervisors …


Improving Bespoke Software Quality: Strategies For Application And Enterprise Architects, Daniel Scott Wagner Jan 2017

Improving Bespoke Software Quality: Strategies For Application And Enterprise Architects, Daniel Scott Wagner

Walden Dissertations and Doctoral Studies

Despite over 50 years of software engineering as a formal practice, contemporary developers of bespoke software follow development practices that result in low-quality products with high development and maintenance costs. This qualitative case study sought to identify strategies used by software and enterprise architects for applying architectural best practices to improve bespoke software quality and lower the total cost of ownership. The study population was application and enterprise architects associated with delivering bespoke software for the enterprise architecture team at a large enterprise in the Nashville, Tennessee metropolitan area. Interview data were collected from 7 enterprise or solution architects; in …


Relationship Between Corporate Governance And Information Security Governance Effectiveness In United States Corporations, Robert Elliot Davis Jan 2017

Relationship Between Corporate Governance And Information Security Governance Effectiveness In United States Corporations, Robert Elliot Davis

Walden Dissertations and Doctoral Studies

Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information security governance (ISG) effectiveness in United States-based corporations. Surveys were used to collect data from 95 strategic and tactical leaders of the 500 …


On Comparative Algorithmic Pathfinding In Complex Networks For Resource-Constrained Software Agents, Michael Moran Jan 2017

On Comparative Algorithmic Pathfinding In Complex Networks For Resource-Constrained Software Agents, Michael Moran

Walden Dissertations and Doctoral Studies

Software engineering projects that utilize inappropriate pathfinding algorithms carry a

significant risk of poor runtime performance for customers. Using social network theory,

this experimental study examined the impact of algorithms, frameworks, and map

complexity on elapsed time and computer memory consumption. The 1,800 2D map

samples utilized were computer random generated and data were collected and processed

using Python language scripts. Memory consumption and elapsed time results for each of

the 12 experimental treatment groups were compared using factorial MANOVA to

determine the impact of the 3 independent variables on elapsed time and computer

memory consumption. The MANOVA indicated a …


Strategies To Minimize The Effects Of Information Security Threats On Business Performance, Stella Ifeyinwa Okoye Jan 2017

Strategies To Minimize The Effects Of Information Security Threats On Business Performance, Stella Ifeyinwa Okoye

Walden Dissertations and Doctoral Studies

Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worked in SME firms that support oil and gas industry sector in Port Harcourt, Nigeria, had …


The Trilogy Of Science: Filling The Knowledge Management Gap With Knowledge Science And Theory, Anthony Shawn Bates Jan 2017

The Trilogy Of Science: Filling The Knowledge Management Gap With Knowledge Science And Theory, Anthony Shawn Bates

Walden Dissertations and Doctoral Studies

The international knowledge management field has different ways of investigating, developing, believing, and studying knowledge management. Knowledge management (KM) is distinguished deductively by know-how, and its intangible nature establishes different approaches to KM concepts, practices, and developments. Exploratory research and theoretical principles have formed functional intelligences from 1896 to 2013, leading to a knowledge management knowledge science (KMKS) concept that derived a grounded theory of knowledge activity (KAT). This study addressed the impact of knowledge production problems on KM practice. The purpose of this qualitative meta-analysis study was to fit KM practice within the framework of knowledge science (KS) study. …


Nursing Informatics Competency Program, Kristina Ann Dunn Jan 2017

Nursing Informatics Competency Program, Kristina Ann Dunn

Walden Dissertations and Doctoral Studies

Currently, C Hospital lacks a standardized nursing informatics competency program to validate nurses' skills and knowledge in using electronic medical records (EMRs). At the study locale, the organization is about to embark on the implementation of a new, more comprehensive EMR system. All departments will be required to use the new EMR, unlike the current policy that allows some areas to still document on paper. The Institute of Medicine, National League of Nursing, and American Association of Colleges of Nursing support and recommend that information technology be an essential core competency for nurses. Evidence of the need for nursing informatic …


Educator's Technology Integration Barriers And Student Technology Preparedness As 21st Century Professionals, Joy Anne Pine-Thomas Jan 2017

Educator's Technology Integration Barriers And Student Technology Preparedness As 21st Century Professionals, Joy Anne Pine-Thomas

Walden Dissertations and Doctoral Studies

Millions of dollars have been spent to acquire educational computing tools, and many education, government, and business leaders believe that investing in these computing tools will improve teaching and learning. The purpose of this quantitative study was to determine whether charter school educators face technological barriers hindering them from incorporating technology into their classrooms. If they experienced self-efficacy issues integrating technology in their classrooms and if they believed their students were technologically prepared as 21st century professionals. A 5-point Likert scale survey, validated by a pilot study, was completed by 61 charter high school teachers. Their responses were analyzed, scores …


Reducing Technology Costs For Small Real Estate Businesses Using Cloud And Mobility, Linda Anne-Marie Mcintosh Jan 2017

Reducing Technology Costs For Small Real Estate Businesses Using Cloud And Mobility, Linda Anne-Marie Mcintosh

Walden Dissertations and Doctoral Studies

Increased client accessibility strategies, awareness of technology cost, and factors of third-party data security capabilities are elements small real estate business (SREB) owners need to know before adopting cloud and mobility technology. The purpose of this multiple case study was to explore the strategies SREB owners use to implement cloud and mobility products to reduce their technology costs. The target population consisted of 3 SREB owners who had experience implementing cloud and mobility products in their businesses in the state of Texas. The conceptual framework of this research study was the technology acceptance model theory. Semistructured interviews were conducted and …