Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2961)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Wisconsin Milwaukee (42)
- University of Arkansas, Fayetteville (41)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2867)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- All Capstone Projects (32)
- Graduate Theses and Dissertations (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 2791 - 2820 of 6720
Full-Text Articles in Physical Sciences and Mathematics
Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin
Strategies To Prevent Security Breaches Caused By Mobile Devices, Tony Griffin
Walden Dissertations and Doctoral Studies
Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government …
Exploring Strategies For Early Identification Of Risks In Information Technology Projects, Nina Michele Mack-Cain
Exploring Strategies For Early Identification Of Risks In Information Technology Projects, Nina Michele Mack-Cain
Walden Dissertations and Doctoral Studies
Project managers must ensure risk management and business justification for their projects. Approximately, 53% of IT projects failed due to project managers not identifying risks early in the projects' lifecycle. The purpose of this single case study was to explore strategies IT project managers utilize to identify risks early in the project's lifecycle. The study population consisted of 5 lead IT project managers from a telecom company located in the Midwest region of the United States who had managed IT projects. The conceptual framework that grounded this study was the general systems theory. The data collection process involved semistructured interviews, …
The Core Competencies Necessary For Global Information Technology Project Management, Gregory Michael Von Schleh
The Core Competencies Necessary For Global Information Technology Project Management, Gregory Michael Von Schleh
Walden Dissertations and Doctoral Studies
Global information technology (IT) project management organizations can create more value in their operations by presenting the core competencies possessed by global IT project managers (PMs) who are successful in their respective projects. The purpose of this multiple case study was to explore the core competencies and business strategies that IT PMs use to meet global IT project deadlines and budgets. This study involved 5 IT PMs from the Pacific Northwest (United States and Canada) who increased the quality of outsourced IT projects from 4 different companies. The data collection method included in-person semistructured interviews of participants and review of …
Effective Competitive Strategies Of U.S. In Vitro Device Manufacturers, Sofia M. Beglari
Effective Competitive Strategies Of U.S. In Vitro Device Manufacturers, Sofia M. Beglari
Walden Dissertations and Doctoral Studies
Medical manufacturing leaders struggle to maintain their competitive position due to inefficient business strategies. The purpose of this multiple case study was to explore strategies that in vitro diagnostics (IVD) medical manufacturing's leaders have used to gain and maintain a competitive advantage in the global marketplace. Porter's competitive advantage theory was used to understand how IVD medical business leaders maintain their competitive edge. Data were gathered through interviews with a purposive sample of 3 IVD medical device leaders from companies in California, Connecticut, and New York who had run IVD medical businesses for at least 10 years and who attended …
Social Media Strategies For Increasing Sales, Loretta N. Ezeife
Social Media Strategies For Increasing Sales, Loretta N. Ezeife
Walden Dissertations and Doctoral Studies
Social media have transformed business commerce and consumer communication, yet organizational leaders lack clear strategies for using social media platforms to their advantage. The purpose of this qualitative multicase study was to explore social media marketing strategies for increasing sales. The relationship marketing conceptual framework grounded this study. Data collection included semistructured interviews with 5 organizational leaders from 5 different organizations in the San Francisco, California, Bay Area and a review of participants’ documents including marketing materials, social media posts, and published sales reports. Data analysis included coding, categorization, and identification of major themes. The thematic assessment approach revealed 5 …
The Relationship Between Technology Threat Avoidance And Innovation In Health Care Organizations, Melvin R. Fenner Jr
The Relationship Between Technology Threat Avoidance And Innovation In Health Care Organizations, Melvin R. Fenner Jr
Walden Dissertations and Doctoral Studies
Most leaders of healthcare delivery organizations have increased their rate of technological innovation, but some still struggle to keep pace with other industries. The problem addressed in this study was that senior leaders in some rural ambulatory healthcare facilities failed to innovate, even with recent healthcare technological innovations, which could lead to increased medical errors and a loss of efficiency. The purpose of the study was to examine if a relationship exists between the avoidance of technology threats by senior leaders in ambulatory healthcare organizations and the innovation propensity of the organization. Technology threat avoidance theory served as the theoretical …
Information Communication Technology Management As A Gdp Growth Contributor Within Arab League Nations, Jamal Alexander Thompson
Information Communication Technology Management As A Gdp Growth Contributor Within Arab League Nations, Jamal Alexander Thompson
Walden Dissertations and Doctoral Studies
The general problem addressed in this study was Arab League nations' over-reliance on fossil fuels as a gross domestic product (GDP) growth driver. Arab League nations that depend primarily on fossil fuel production lack alternative resources for growth in times of fossil fuel usage or price decline. Overdependence on fossil fuels has led to minimal development in other economic sectors, primarily in skilled domestic labor, and to a high dependency on foreign skilled labor for skilled domestic jobs. The purpose of this study was to examine to what extent information communication technology (ICT) management can be a viable GDP growth …
Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo
Strategic Cyber-Risk Implications Of Cloud Technology Adoption In The U.S. Financial Services Sector, Olatunji Mujib Arowolo
Walden Dissertations and Doctoral Studies
According to research, the risks of adopting new technology and the technological and organizational factors that influence adopting it are not clear. Thus, many financial institutions have hesitated to adopt cloud-computing. The purpose of this quantitative, cross-sectional study was to evaluate the cyber-risk implications of cloud-computing adoption in the U.S. financial services sector. The study examined 6 technological and organizational factors: organization size, relative advantage, compliance, security, compatibility, and complexity within the context of cyber-risk. Using a combination of diffusion of innovation theory and technology-organization-environment framework as the foundation, a predictive cybersecurity model was developed to determine the factors that …
Assessing The Influence Of Smart Mobile Devices On How Employees Work, Adam L. Gorski
Assessing The Influence Of Smart Mobile Devices On How Employees Work, Adam L. Gorski
Walden Dissertations and Doctoral Studies
The smart mobile device market penetration reached 50% and has been increasing an average of 39% per year in the United States. More than 70% of the smart mobile device owners use such devices for personal and work activities. The problem was the lack of management's understanding of the effect smart mobile device use has on how employees work when they are in the office, while traveling, or during the off-hours to improve productivity and customer service. The purpose of this phenomenological study was to understand why, when, and how employees used smart mobile devices. The transformational technology conceptual framework …
Offshore Outsourcing Of The United States Semiconductor Manufacturing: Management Approaches And Strategies, Oscar Mostofi
Offshore Outsourcing Of The United States Semiconductor Manufacturing: Management Approaches And Strategies, Oscar Mostofi
Walden Dissertations and Doctoral Studies
The United States manufacturing employment decreased 33% from 1985 to 2014. During the same period, the United States semiconductor manufacturing, accounting for 1.7% of the total of the United States manufacturing workforce, lost 35% of its employees. The decline in semiconductor manufacturing jobs began in 1985 when semiconductor firms began offshoring product manufacturing overseas because of low cost of qualified labor force and facilities. This qualitative case study explored the analytical approaches and strategies business leaders of semiconductor firms that offshore manufacturing use in making informed strategic outsourcing and offshoring decisions conducive to sustainability and profitability of operations. The location …
Exploring Strategies For Successful Implementation Of Electronic Health Records, Richard Alton Warren
Exploring Strategies For Successful Implementation Of Electronic Health Records, Richard Alton Warren
Walden Dissertations and Doctoral Studies
Adoption of electronic health records (EHR) systems in nonfederal acute care hospitals has increased, with adoption rates across the United States reaching as high as 94%. Of the 330 plus acute care hospital EHR implementations in Texas, only 31% have completed attestation to Stage 2 of the meaningful use (MU) criteria. The purpose of this multiple case study was to explore strategies that hospital chief information officers (CIOs) used for the successful implementation of EHR. The target population consists of 3 hospitals CIOs from a multi-county region in North Central Texas who successfully implemented EHRs meeting Stage 2 MU criteria. …
A Gamification Framework For Sensor Data Analytics, Alexandra L'Heureux, Katarina Grolinger, Wilson A. Higashino, Miriam A. M. Capretz
A Gamification Framework For Sensor Data Analytics, Alexandra L'Heureux, Katarina Grolinger, Wilson A. Higashino, Miriam A. M. Capretz
Electrical and Computer Engineering Publications
The Internet of Things (IoT) enables connected objects to capture, communicate, and collect information over the network through a multitude of sensors, setting the foundation for applications such as smart grids, smart cars, and smart cities. In this context, large scale analytics is needed to extract knowledge and value from the data produced by these sensors. The ability to perform analytics on these data, however, is highly limited by the difficulties of collecting labels. Indeed, the machine learning techniques used to perform analytics rely upon data labels to learn and to validate results. Historically, crowdsourcing platforms have been used to …
Data Analytics In Performance Of Kick-Out Distribution And Effectiveness In Senior Championship Football In Ireland, Roisin Donnelly, Darragh Daly
Data Analytics In Performance Of Kick-Out Distribution And Effectiveness In Senior Championship Football In Ireland, Roisin Donnelly, Darragh Daly
Articles
n recent years, data analytics has been a growing phenomenon in many fields, including sport, and there has been an increased focus on how technology will impact the work of coaching andperformance professionals. This paper provides a reflection of the use of data analytics within the Gaelic Athletic Association’s (GAA) football coaching practice in Ireland, and evaluates for coaches how to enhance kick- out distribution and effectiveness. Specifically, the study aimed to dissect and analyse kick- out strategies to assess from a coaching perspective, the impact on distribution andeffectiveness. The research is a …
Extracting A Relational Database Schema From A Document Database, Jared Thomas Wheeler
Extracting A Relational Database Schema From A Document Database, Jared Thomas Wheeler
UNF Graduate Theses and Dissertations
As NoSQL databases become increasingly used, more methodologies emerge for migrating from relational databases to NoSQL databases. Meanwhile, there is a lack of methodologies that assist in migration in the opposite direction, from NoSQL to relational. As software is being iterated upon, use cases may change. A system which was originally developed with a NoSQL database may accrue needs which require Atomic, Consistency, Isolation, and Durability (ACID) features that NoSQL systems lack, such as consistency across nodes or consistency across re-used domain objects. Shifting requirements could result in the system being changed to utilize a relational database. While there are …
Strategies Hospital Leaders Use In Implementing Electronic Medical Record Systems, Shaunette Miller
Strategies Hospital Leaders Use In Implementing Electronic Medical Record Systems, Shaunette Miller
Walden Dissertations and Doctoral Studies
Some hospital leaders lacked strategies for implementing electronic medical record (EMR) systems. The purpose of this case study was to explore successful strategies that hospital leaders used in implementing EMR systems. The target population consisted of hospital leaders who succeeded in implementing EMR systems in a single healthcare organization located in the Los Angeles, California region. The conceptual framework used was Kotter's (1996) eight-step process for leading change, and data were collected from face-to-face recorded interviews with 5 participants and from company documents related to EMR design and development. Data were analyzed through methodological triangulation of data types, and exploring …
Educating Nurses On Workflow Changes From Electronic Health Record Adoption, Rhoda Lynn Atienza San Jose
Educating Nurses On Workflow Changes From Electronic Health Record Adoption, Rhoda Lynn Atienza San Jose
Walden Dissertations and Doctoral Studies
Workflow issues related to adoption of the electronic health record (EHR) has led to unsafe workarounds, decreased productivity, inefficient clinical documentation and slow rates of EHR adoption. The problem addressed in this quality improvement project was nurses' lack of knowledge about workflow changes due to EHR adoption. The purpose of this project was to identify changes in workflow and to develop an educational module to communicate the changes. This project was guided by both the ADDIE model (analysis, design, development, implementation, and evaluation) and the diffusion of innovations theory. Five stages were involved: process mapping, cognitive walkthrough, eLearning module development, …
Strategies For U.S. City Government Enterprise Resource Planning System Implementation Success, Jennifer Miller
Strategies For U.S. City Government Enterprise Resource Planning System Implementation Success, Jennifer Miller
Walden Dissertations and Doctoral Studies
Strategies for enterprise resource planning (ERP) system implementation success have been a focus of scholars since the 1990s. Researchers have demonstrated that ERP system implementation could cause both system failures and organization failures, affecting both operations and stakeholders. The theory of constraints was the conceptual framework for this single qualitative case study that explored ERP system critical success factors (CSFs) and strategies U.S. city governments use to successfully implement ERP systems. One city government in New Mexico with a successful ERP system served as the case study's population. Data were collected from semistructured interviews and relevant documents and then open …
Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley
Proactive It Incident Prevention: Using Data Analytics To Reduce Service Interruptions, Mark G. Malley
Walden Dissertations and Doctoral Studies
The cost of resolving user requests for IT assistance rises annually. Researchers have demonstrated that data warehouse analytic techniques can improve service, but they have not established the benefit of using global organizational data to reduce reported IT incidents. The purpose of this quantitative, quasi-experimental study was to examine the extent to which IT staff use of organizational knowledge generated from data warehouse analytical measures reduces the number of IT incidents over a 30-day period, as reported by global users of IT within an international pharmaceutical company headquartered in Germany. Organizational learning theory was used to approach the theorized relationship …
Examining The Behavioral Intention Of Individuals' Compliance With Information Security Policies, David A. Brown
Examining The Behavioral Intention Of Individuals' Compliance With Information Security Policies, David A. Brown
Walden Dissertations and Doctoral Studies
Target Corporation experienced an information security breach resulting in compromising customers' financial information. Management is responsible for implementing adequate information security policies that protect corporate data and minimize financial losses. The purpose of this experimental study was to examine the effect of a fear appeal communication on an individual's information security policy behavioral intention. The sample population involved information technology professionals randomly selected from the SurveyMonkey audience. A research model, developed using constructs from deterrence theory and protection motivation theory, became the structural model used for partial least squares-structural equation modeling (PLS-SEM) analysis of the survey response data, which indicated …
Faculty Perceptions Of Instructional Strategies That Foster Student Engagement In Online Courses, Sharon M. Hope
Faculty Perceptions Of Instructional Strategies That Foster Student Engagement In Online Courses, Sharon M. Hope
Walden Dissertations and Doctoral Studies
Developing online instructional strategies for increasing student engagement and success is significant locally and nationally due to growth in the online field, advances in technology, and the need for colleges to maximize student success. This study stemmed from the desire of administrators at an upstate New York private college to discover additional ways to design and deliver effective online instruction. The purpose of this qualitative instrumental case study was to discover faculty perceptions of and experiences with instructional strategies that they used to foster student engagement in online learning. Kearsley and Shneiderman's engagement theory formed the study's conceptual framework. Ten …
Antecedents Of Employees' Behavioral Intentions Regarding Information Technology Consumerization, Alain Ouattara
Antecedents Of Employees' Behavioral Intentions Regarding Information Technology Consumerization, Alain Ouattara
Walden Dissertations and Doctoral Studies
The majority of organizations worldwide have adopted IT consumerization. However, only a small percentage of them explicitly manage the dual use of personal devices and applications for work purposes. This correlational study used the extended unified technology acceptance and use technology model (UTAUT2) to examine whether employees' perceptions of habit, effort expectancy, performance expectancy, facilitating conditions, hedonic motivation, social influence, and price value can predict IT consumerization behavioral intentions (BI). A pre-existing UTAUT2 survey instrument was used to collect data from employees (N = 112) of small- and medium-sized organizations across different industries in Ontario, Canada. The regression analysis confirmed …
Strategies For Integrating Technological Innovations In Small Businesses, Petra Samuel
Strategies For Integrating Technological Innovations In Small Businesses, Petra Samuel
Walden Dissertations and Doctoral Studies
The effective integration of technological innovation is vital to the success of small businesses and can catapult growth and profitability. Some business managers and supervisors, however, may not have a firm understanding of strategies for integrating technological innovations in businesses; this lack of knowledge may result in employee frustration and costly roadblocks to achieving business objectives. This case study was conducted to identify the strategies used by business managers and supervisors to integrate technological innovations in small businesses. Christensen's theory of disruptive innovation and Rogers' theory of diffusion of innovation served as the conceptual framework. Ten business managers and supervisors …
Improving Bespoke Software Quality: Strategies For Application And Enterprise Architects, Daniel Scott Wagner
Improving Bespoke Software Quality: Strategies For Application And Enterprise Architects, Daniel Scott Wagner
Walden Dissertations and Doctoral Studies
Despite over 50 years of software engineering as a formal practice, contemporary developers of bespoke software follow development practices that result in low-quality products with high development and maintenance costs. This qualitative case study sought to identify strategies used by software and enterprise architects for applying architectural best practices to improve bespoke software quality and lower the total cost of ownership. The study population was application and enterprise architects associated with delivering bespoke software for the enterprise architecture team at a large enterprise in the Nashville, Tennessee metropolitan area. Interview data were collected from 7 enterprise or solution architects; in …
Relationship Between Corporate Governance And Information Security Governance Effectiveness In United States Corporations, Robert Elliot Davis
Relationship Between Corporate Governance And Information Security Governance Effectiveness In United States Corporations, Robert Elliot Davis
Walden Dissertations and Doctoral Studies
Cyber attackers targeting large corporations achieved a high perimeter penetration success rate during 2013, resulting in many corporations incurring financial losses. Corporate information technology leaders have a fiduciary responsibility to implement information security domain processes that effectually address the challenges for preventing and deterring information security breaches. Grounded in corporate governance theory, the purpose of this correlational study was to examine the relationship between strategic alignment, resource management, risk management, value delivery, performance measurement implementations, and information security governance (ISG) effectiveness in United States-based corporations. Surveys were used to collect data from 95 strategic and tactical leaders of the 500 …
On Comparative Algorithmic Pathfinding In Complex Networks For Resource-Constrained Software Agents, Michael Moran
On Comparative Algorithmic Pathfinding In Complex Networks For Resource-Constrained Software Agents, Michael Moran
Walden Dissertations and Doctoral Studies
Software engineering projects that utilize inappropriate pathfinding algorithms carry a
significant risk of poor runtime performance for customers. Using social network theory,
this experimental study examined the impact of algorithms, frameworks, and map
complexity on elapsed time and computer memory consumption. The 1,800 2D map
samples utilized were computer random generated and data were collected and processed
using Python language scripts. Memory consumption and elapsed time results for each of
the 12 experimental treatment groups were compared using factorial MANOVA to
determine the impact of the 3 independent variables on elapsed time and computer
memory consumption. The MANOVA indicated a …
Strategies To Minimize The Effects Of Information Security Threats On Business Performance, Stella Ifeyinwa Okoye
Strategies To Minimize The Effects Of Information Security Threats On Business Performance, Stella Ifeyinwa Okoye
Walden Dissertations and Doctoral Studies
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory multiple case study was to explore the strategies small and medium-sized enterprise (SME) leaders use to minimize the effects of information security threats on business performance. Semistructured interviews were conducted with 5 SME leaders who worked in SME firms that support oil and gas industry sector in Port Harcourt, Nigeria, had …
The Trilogy Of Science: Filling The Knowledge Management Gap With Knowledge Science And Theory, Anthony Shawn Bates
The Trilogy Of Science: Filling The Knowledge Management Gap With Knowledge Science And Theory, Anthony Shawn Bates
Walden Dissertations and Doctoral Studies
The international knowledge management field has different ways of investigating, developing, believing, and studying knowledge management. Knowledge management (KM) is distinguished deductively by know-how, and its intangible nature establishes different approaches to KM concepts, practices, and developments. Exploratory research and theoretical principles have formed functional intelligences from 1896 to 2013, leading to a knowledge management knowledge science (KMKS) concept that derived a grounded theory of knowledge activity (KAT). This study addressed the impact of knowledge production problems on KM practice. The purpose of this qualitative meta-analysis study was to fit KM practice within the framework of knowledge science (KS) study. …
Nursing Informatics Competency Program, Kristina Ann Dunn
Nursing Informatics Competency Program, Kristina Ann Dunn
Walden Dissertations and Doctoral Studies
Currently, C Hospital lacks a standardized nursing informatics competency program to validate nurses' skills and knowledge in using electronic medical records (EMRs). At the study locale, the organization is about to embark on the implementation of a new, more comprehensive EMR system. All departments will be required to use the new EMR, unlike the current policy that allows some areas to still document on paper. The Institute of Medicine, National League of Nursing, and American Association of Colleges of Nursing support and recommend that information technology be an essential core competency for nurses. Evidence of the need for nursing informatic …
Educator's Technology Integration Barriers And Student Technology Preparedness As 21st Century Professionals, Joy Anne Pine-Thomas
Educator's Technology Integration Barriers And Student Technology Preparedness As 21st Century Professionals, Joy Anne Pine-Thomas
Walden Dissertations and Doctoral Studies
Millions of dollars have been spent to acquire educational computing tools, and many education, government, and business leaders believe that investing in these computing tools will improve teaching and learning. The purpose of this quantitative study was to determine whether charter school educators face technological barriers hindering them from incorporating technology into their classrooms. If they experienced self-efficacy issues integrating technology in their classrooms and if they believed their students were technologically prepared as 21st century professionals. A 5-point Likert scale survey, validated by a pilot study, was completed by 61 charter high school teachers. Their responses were analyzed, scores …
Reducing Technology Costs For Small Real Estate Businesses Using Cloud And Mobility, Linda Anne-Marie Mcintosh
Reducing Technology Costs For Small Real Estate Businesses Using Cloud And Mobility, Linda Anne-Marie Mcintosh
Walden Dissertations and Doctoral Studies
Increased client accessibility strategies, awareness of technology cost, and factors of third-party data security capabilities are elements small real estate business (SREB) owners need to know before adopting cloud and mobility technology. The purpose of this multiple case study was to explore the strategies SREB owners use to implement cloud and mobility products to reduce their technology costs. The target population consisted of 3 SREB owners who had experience implementing cloud and mobility products in their businesses in the state of Texas. The conceptual framework of this research study was the technology acceptance model theory. Semistructured interviews were conducted and …