Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 841 - 870 of 6720

Full-Text Articles in Physical Sciences and Mathematics

A Predictive Model To Predict Cyberattack Using Self-Normalizing Neural Networks, Oluwapelumi Eniodunmo Jan 2022

A Predictive Model To Predict Cyberattack Using Self-Normalizing Neural Networks, Oluwapelumi Eniodunmo

Theses, Dissertations and Capstones

Cyberattack is a never-ending war that has greatly threatened secured information systems. The development of automated and intelligent systems provides more computing power to hackers to steal information, destroy data or system resources, and has raised global security issues. Statistical and Data mining tools have received continuous research and improvements. These tools have been adopted to create sophisticated intrusion detection systems that help information systems mitigate and defend against cyberattacks. However, the advancement in technology and accessibility of information makes more identifiable elements that can be used to gain unauthorized access to systems and resources. Data mining and classification tools …


Exploring The Integration Of Corporate Sustainability Into Small-Scale Business Activities, Olushola O. Odutola Jan 2022

Exploring The Integration Of Corporate Sustainability Into Small-Scale Business Activities, Olushola O. Odutola

Walden Dissertations and Doctoral Studies

Small and medium-scale enterprises contribute 49% of the gross domestic product in Nigeria. The lack of research studies on how small and medium-scale enterprises integrate corporate sustainability into their business operations might present challenges for policymakers in achieving Nigeria’s sustainable development goals (SDG). The purpose of this descriptive phenomenological study was to explore how managers of small and medium-scale enterprises integrate the corporate sustainability dimensions into their business operations based on the concepts of the corporate entity, corporate nature, and corporate obligations. The central research question of this study was how managers of small and medium-scale enterprises integrate the economic, …


An Empirical Study On The Impact Of Deep Parameters On Mobile App Energy Usage, Qiang Xu, James C. Davis, Y Charlie Hu, Abhilash Jindal Jan 2022

An Empirical Study On The Impact Of Deep Parameters On Mobile App Energy Usage, Qiang Xu, James C. Davis, Y Charlie Hu, Abhilash Jindal

Department of Electrical and Computer Engineering Faculty Publications

Improving software performance through configuration parameter tuning is a common activity during software maintenance. Beyond traditional performance metrics like latency, mobile app developers are interested in reducing app energy usage. Some mobile apps have centralized locations for parameter tuning, similar to databases and operating systems, but it is common for mobile apps to have hundreds of parameters scattered around the source code. The correlation between these "deep" parameters and app energy usage is unclear. Researchers have studied the energy effects of deep parameters in specific modules, but we lack a systematic understanding of the energy impact of mobile deep parameters. …


Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger Jan 2022

Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger

Walden Dissertations and Doctoral Studies

AbstractRecent cyberattacks in hospitals show the urgency of the need to enhance secure information technology (IT) infrastructure. Hospitals are statistically more at cyber risk than all the multiple industries against ransomware, malware, hacking and internal threats. Guided by routine activity theory, the purpose of this exploratory multiple case study was to explore strategies utilized by hospitals' IT security managers to reduce cybersecurity breaches associated with sensitive data. The participants were nine IT security managers from hospitals in the eastern United States. Data were collected via semistructured interviews and supporting documentation from the consenting participants and hospitals' websites. Through thematic analysis, …


Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte Jan 2022

Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte

Walden Dissertations and Doctoral Studies

Small businesses are the foundation of an economy and spawn innovation, but small business owners fail at an alarming rate because they lack strategies to sustain business operations. Since 50% of small businesses fail within the first 5 years, small business sustainability research is critical to support small business owners. Grounded in entrepreneurial theory, the purpose of this multiple case study was to identify strategies information technology (IT) small business owners use to sustain operation beyond the first 5 years. The participants included four IT small business owners in the Southwestern United States who sustained operations beyond the first 5 …


Website Accessibility Strategies, Gary W. Hrezo Jan 2022

Website Accessibility Strategies, Gary W. Hrezo

Walden Dissertations and Doctoral Studies

Most websites cannot be readily used by people with disabilities, despite the internet being an essential component for people to be part of a community. Applying web accessibility strategies means that people with disabilities can better interact with the web. Grounded in Davis’s technology acceptance model, the purpose of this qualitative multiple case study was to examine strategies used by web designers to make websites accessible for people with disabilities. The participants were experienced web developers from organizations in Florida with websites that have a Web Content Accessibility Guidelines Level 2 of three levels, i.e., AA- rating. The data collection …


Social Media Analytics Use Among Small Business Owners, Melody White Jan 2022

Social Media Analytics Use Among Small Business Owners, Melody White

Walden Dissertations and Doctoral Studies

As of January 2018, small businesses created 47.5% of private jobs in the United States, but little is known about whether and why small business owners use social media analytics. This topic is important because social media analytics assist businesses in identifying social media effectiveness, gaining new customers, and staying connected with current customers. The purpose of this generic qualitative research study was to explore the use of social media analytics by small business owners, which can increase customer interaction and help monitor company perception and effectiveness. The conceptual foundation used in this study was the technology acceptance model. The …


Exploring Security Strategies To Protect Personally Identifiable Information In Small Businesses, Erin Banks Jan 2022

Exploring Security Strategies To Protect Personally Identifiable Information In Small Businesses, Erin Banks

Walden Dissertations and Doctoral Studies

Organizations that do not adequately protect sensitive data are at high risk of data breaches. Organization leaders must protect confidential information as failing to do so could result in irreparable reputation damage, severe financial implications, and legal consequences. This study used a multiple case study design to explore small businesses’ strategies for protecting their customers’ PII against phishing attacks. This study’s population comprised information technology (IT) managers in small businesses in Northern Virginia. The conceptual framework used in this study was the technology acceptance model. Data collection was performed using telephone interviews with IT managers (n = 6) as well …


Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham Jan 2022

Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham

Walden Dissertations and Doctoral Studies

AbstractAfter organizations successfully adopt the internet of things (IoT) technology, many corporate information technology (IT) leaders face challenges during the implementation phase. Corporate IT leaders' potential failures in implementing IoT devices may impede organizations from integrating IoT solutions and promoting business benefits. Grounded in technology-organization-environment (TOE) theory, the purpose of this qualitative, pragmatic inquiry study was to explore strategies that corporate IT leaders use to implement IoT technology in their organizations. The participants were six corporate healthcare IT leaders who successfully used implementation strategies for implementing IoT solutions for their organizations. Data were collected using semistructured interviews and industry security …


Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii Jan 2022

Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii

Walden Dissertations and Doctoral Studies

Supply chain inflexibility results in reduced efficiency and profitability. Without supply chain flexibility, supply chain managers in manufacturing firms risk the loss of competitive advantage due to reduced efficiency and profitability. Grounded in business process engineering conceptual framework, the purpose of this qualitative multiple case study was to explore strategies supply chain leaders in manufacturing organizations use to achieve supply chain flexibility. The participants were five supply chain leaders in the manufacturing industry in the midwestern United States and successfully implemented innovative solutions to achieve supply chain flexibility. Data were collected using semistructured interviews and a review of company documents …


Impact Of Internal Control, Cybersecurity Risk, And Competitive Advantage On Retail Cybersecurity Budget, Samuel William Pfanstiel Jan 2022

Impact Of Internal Control, Cybersecurity Risk, And Competitive Advantage On Retail Cybersecurity Budget, Samuel William Pfanstiel

Walden Dissertations and Doctoral Studies

Retail organizations are driven to improve security posture for many reasons, including meeting financial regulation requirements, mitigating threats of data breach, and differentiating themselves within markets affected by customer perception. The problem was that little was known about how these drivers of internal control, cybersecurity risk, and competitive advantage impact retail cybersecurity budgets within the retail sector. The purpose of this quantitative nonexperimental correlational study was to describe the relationship between cybersecurity budget and drivers of internal control, cybersecurity risk, and competitive advantage among U.S.-based retail merchant organizations. Real options theory provided a foundation for explaining this decision-making process. Data …


Information Communication And Technology Strategies For Improving Nonprofit Organizations’ Effectiveness, Richard T. Evans Jan 2022

Information Communication And Technology Strategies For Improving Nonprofit Organizations’ Effectiveness, Richard T. Evans

Walden Dissertations and Doctoral Studies

AbstractSome nonprofit organization leaders lack strategies to incorporate information communication and technology (ICT) into the business operations of organizations. A nonprofit organization lacking strategies involving integrating technology into their business operations decreases the likelihood of being efficient, productive, and effective. Grounded in the information technology (IT) competency model, the purpose of this qualitative single case study was to explore the ICT strategies of a nonprofit organization leader in the south suburbs of Chicago. Data were collected through semi-structured interviews, direct observations, and reviews of organizational documents. The Marshall and Rossman seven-step process was used to analyze data. Three themes emerged …


Using Agile Strategies To Improve Project Success Rates, Tim Kirkland Jan 2022

Using Agile Strategies To Improve Project Success Rates, Tim Kirkland

Walden Dissertations and Doctoral Studies

Project failures can be costly to businesses, but on average, program managers’ (PMs’) success rates for managing information technology (IT) projects is less than 35%. Organizational cultures struggle to adapt to agile project management (APM) that provides stakeholder flexibility for dynamic environments. Grounded by project management theory, the purpose of this qualitative multiple case study was to explore strategies project managers use to reduce IT project failures. The participants consisted of nine project managers in the northeastern United States with APM experience managing successful IT projects. Data were collected from virtual semi-structured interviews and journal notes. Ten open-ended interview questions …


Challenges Of Digital Privacy In Banking Organizations, Okechukwu Innocent Ogudebe Jan 2022

Challenges Of Digital Privacy In Banking Organizations, Okechukwu Innocent Ogudebe

Walden Dissertations and Doctoral Studies

As the information and technology age becomes more advanced, digital privacy flaws have become more challenging. Information technology (IT) security managers, chief information security officers, and other stakeholders in banks are concerned with identity-based authentication attacks because identity-theft attacks cause data breaches. Grounded in the protection motivation theory, the purpose of this qualitative pragmatic study was to examine strategies IT security professionals working on internet banking platforms use to mitigate identity-based authentication attacks. The study participants comprised five IT security professionals currently working in the online banking industry from the northeastern United States with at least 5 years of experience …


Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2022

Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Formal Modeling And Verification Of A Blockchain-Based Crowdsourcing Consensus Protocol, Hamra Afzaal, Muhammad Imran, Muhammad Umar Janjua, Sarada Prasad Gochhayat Jan 2022

Formal Modeling And Verification Of A Blockchain-Based Crowdsourcing Consensus Protocol, Hamra Afzaal, Muhammad Imran, Muhammad Umar Janjua, Sarada Prasad Gochhayat

VMASC Publications

Crowdsourcing is an effective technique that allows humans to solve complex problems that are hard to accomplish by automated tools. Some significant challenges in crowdsourcing systems include avoiding security attacks, effective trust management, and ensuring the system’s correctness. Blockchain is a promising technology that can be efficiently exploited to address security and trust issues. The consensus protocol is a core component of a blockchain network through which all the blockchain peers achieve an agreement about the state of the distributed ledger. Therefore, its security, trustworthiness, and correctness have vital importance. This work proposes a Secure and Trustworthy Blockchain-based Crowdsourcing (STBC) …


Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem Jan 2022

Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem

Walden Dissertations and Doctoral Studies

Since 2001, most government organizations’ IT modernization programs had failed because of ineffective implementation strategies from IT leaders. The research problem was the absence of effective strategies to modernize IT legacy systems. The purpose of this qualitative single case study was to explore effective IT modernization strategies to revolutionize IT legacy systems. The researcher sought to answer how organizations create effective strategies to modernize IT legacy systems. The study used purposeful sampling, including 13 IT leaders, IT technicians, and customers based on their experience in implementing successful IT modernization programs’ strategies. Data were collected using semi-structured interviews and agency documentation. …


Equipment Rental Companies Leaders’ Customer Retention Strategies, Katrell Shalaine Mcneil Jan 2022

Equipment Rental Companies Leaders’ Customer Retention Strategies, Katrell Shalaine Mcneil

Walden Dissertations and Doctoral Studies

Equipment rental business leaders that employ inadequate customer retention strategies negatively impact organizations’ performance and profitability. Improved customer retention strategies might improve key customer retention and increase market share. Grounded in the customer retention management theory, the purpose of this qualitative multiple case study was to explore strategies rental leaders use to retain customers. Participants were 10 equipment rental leaders from the Southwest Region of the United States that successfully retained their key customers through effective customer retention strategies. Data were collected using semistructured interviews and a review of materials from organizational websites regarding customer order fulfillment and technology. Through …


Optimal Domotic Systems Based On Archival Data Trend Analysis, Bettina Yvette Moore Jan 2022

Optimal Domotic Systems Based On Archival Data Trend Analysis, Bettina Yvette Moore

Walden Dissertations and Doctoral Studies

Domotics is the integration of technology into building systems. Due to the rapid growth in the use of domotic systems in recent years, the industry is struggling to establish consistency and standardization. The purpose of this archival-based qualitative case study was to identify current trends and patterns in scholarly domotic research to create an instrument to evaluate domotic systems and domotic interrelationships using bibliometric searches. The facilities management and modeling system provided the framework for the study. Archival research data were examined to identify trends and patterns in domotic research and provide visualization of domotic relationships through technology trajectory mapping …


Use Of Human–Computer Interaction Devices And Web 3.0 Skills Among Engineers, Dr. Robbie L. Walker Jan 2022

Use Of Human–Computer Interaction Devices And Web 3.0 Skills Among Engineers, Dr. Robbie L. Walker

Walden Dissertations and Doctoral Studies

Despite massive company investments in human–computer interaction devices and software, such as Web 3.0 technologies, engineers are not demonstrating measurable performance and productivity increases. There is a lack of knowledge and understanding related to the motivation of engineers to use Web 3.0 technologies including the semantic web and cloud applications for increased performance. The purpose of this quantitative correlational study was to investigate whether the use of human–computer interaction devices predict Web 3.0 skills among engineers. Solow’s information technology productivity paradox was the theoretical foundation for this study. Convenience sampling was used for a sample of 214 participants from metropolitan …


Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson Jan 2022

Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson

Walden Dissertations and Doctoral Studies

Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …


Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao Jan 2022

Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao

Walden Dissertations and Doctoral Studies

User Experience (UX) design improvement can alter business results. Information technology (IT) company leaders are concerned with UX design improvement, as it is the number one indication of product innovation success and user satisfaction. Grounded in Christensen’s disruptive innovation theory, the purpose of the qualitative single case study was to explore strategies IT company leaders and UX designers used to identify critical UX design elements that lead to improved product innovations. The participants were five IT company leaders and a focus group of four UX designers employed by a sizeable telecom organization in Beijing, China. The data were collected from …


Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith Jan 2022

Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith

Walden Dissertations and Doctoral Studies

Business leaders do not often consider investing in informational technology (IT) to increase performance. These business leaders lack knowledge of innovative IT adoption strategies to expand their revenue and reduce costs to sustain a competitive advantage. Grounded in the technology-organization-environment (TOE) theory, the purpose of this qualitative multiple case study was to explore IT innovation adoption strategies business leaders use to increase performance. The participants were four successful business leaders selected from finalists for international entrepreneurial awards presented annually in the Mid-Atlantic region of the United States. The data were collected using semistructured telephone interviews, media releases, and online publications. …


Information Systems Management And Sustainable Urban Development: A Case Study, Endris A. Suraj Jan 2022

Information Systems Management And Sustainable Urban Development: A Case Study, Endris A. Suraj

Walden Dissertations and Doctoral Studies

Sustainable Urban Development of Ethiopia lacks strategies to implement information systems management (ISM). Lacking appropriate ISM implementation has influenced the government’s plan on the four indicators of urban sustainability - Water, Air, Climate Change, and Population Growth. Grounded in the conceptual frameworks of Technology Acceptance Model (TAM) and Diffusion Of Innovation (DOI), the purpose of this qualitative single case study aims to explore ISM for sustainable urban development in Ethiopia. The participants were 12 Development Associates (DAs) who have been participating in implementing of ISM. Data was collected through a one-to-one interview, National documents, the Environmental Protection Office of Ethiopia, …


Successful Information Technology Project Process Management Best Practices, Jude Oderaa Orazulike Jan 2022

Successful Information Technology Project Process Management Best Practices, Jude Oderaa Orazulike

Walden Dissertations and Doctoral Studies

Globally, most information technology projects (ITPs) are reported as unsuccessful. Poor project management practices have consistently been identified as the leading cause of ITP failures. However, ITP practitioners manage project processes in diverse ways without clear guiding principles in terms of what does or does not work in practice for success. Process management practices in projects were explored in this grounded theory qualitative study from a systems theory perspective. The purpose was to understand from project practitioners' experiences what guiding principles potentially influenced ITPs to success. These experiences were then analyzed to develop a theory describing how to best use …


Analyzing Secure Access Strategies To Protect Clinical-Information Systems In The Healthcare Industry, Manjit S. Kang Jan 2022

Analyzing Secure Access Strategies To Protect Clinical-Information Systems In The Healthcare Industry, Manjit S. Kang

Walden Dissertations and Doctoral Studies

Securing patient health records within cloud-based health records is a critical security challenge for hospitals and healthcare organizations. Some information technology (IT) leaders working in the U.S. healthcare industry or hospitals are concerned with their patient cloud-based health records due to data breaches in their healthcare systems. Grounded in the task technology fit theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies healthcare information leaders use to implement security procedures to protect patient health records on private cloud-based clinical information systems (CIS). The participants were six IT managers in metropolitan San Francisco Bay healthcare facilities. The …


Strategies For Attracting And Retaining Highly Skilled It Professionals For The High-Tech Workforce, Mia Gyjuan Moore Jan 2022

Strategies For Attracting And Retaining Highly Skilled It Professionals For The High-Tech Workforce, Mia Gyjuan Moore

Walden Dissertations and Doctoral Studies

Many information technology (IT) managers have experienced challenges retaining high-tech professionals. Organization leaders lose investments of time and money when essential personnel leave. Grounded in the task-technology fit theory and the technology acceptance model, the purpose of this qualitative multiple-case study was to explore technology-focused strategies IT managers use to attract and retain IT professionals. The participants included five IT managers from five high-tech organizations who implemented strategies to attract and retain IT professionals. Data were collected from semistructured interviews and online resources. Thematic analysis revealed four themes: (a) using high-tech tools and alternative methods, (b) employing talent management techniques, …


Individual Contributor Experiences Of Task Uncertainty And Task Interdependence Under Different Structures, Andrew R. Barbeau Jan 2022

Individual Contributor Experiences Of Task Uncertainty And Task Interdependence Under Different Structures, Andrew R. Barbeau

Walden Dissertations and Doctoral Studies

Approximately 84% of North American individual contributors work in organizations with functionally specialized structures where task uncertainty (TU) and task interdependence (TI) undermine cross-functional task execution. However, there is a lack of research into the TU and TI experiences of individual contributors under different organizational structures. It is important that senior leaders have this missing knowledge to inform structural decisions. The purpose of this generic qualitative, exploratory, snowball sampling study is to explore how individual contributors experience TU and TI following a reorganization from a functional to a horizontal organizational structure. In the current study, the research questions explored were …


Adoption Of It Governance Strategies For Multiproduct Devops Teams: A Correlational Quantitative Study, Russell Camilleri Jan 2022

Adoption Of It Governance Strategies For Multiproduct Devops Teams: A Correlational Quantitative Study, Russell Camilleri

Walden Dissertations and Doctoral Studies

Many multiproduct delivery organizations have difficulty adopting Information Technology (IT) governance practices within their Development and Operations (DevOps) teams. IT leaders who are managing DevOps teams, need to understand the factors influencing IT governance (ITG) adoption; otherwise this may impact DevOps maturity, resulting in reduced product delivery capabilities. Grounded in the technology acceptance model, the purpose of this quantitative correlational study was to examine the relationship between performance expectancy (PE), effort expectancy (EE), social influence (SI), and facilitating conditions (FC), as moderated by experience (EXP), gender (GND), age (AGE), and voluntariness of use (VOL) with behavioral intention (BI) to adopt …


Strategies Using Threat Intelligence To Detect Advanced Persistent Threats: A Qualitative Case Study, Melisa A. Joyner Jan 2022

Strategies Using Threat Intelligence To Detect Advanced Persistent Threats: A Qualitative Case Study, Melisa A. Joyner

Walden Dissertations and Doctoral Studies

Advanced persistent threats (APTs) targeting critical infrastructures can adversely impact human lives. Cyber security analysts are concerned with APT attacks because they make it challenging to defend critical infrastructures. Grounded in routines activity theory (RAT), the purpose of this qualitative exploratory multiple case study was to explore strategies cybersecurity analysts use to defend critical infrastructures from APT attacks. Data were collected through interviews with 8 participants and documents from two organizations. Participants were required to have experience analyzing network traffic on a critical infrastructure network, one year of cyber threat hunting experience, prior or current knowledge of cyber threat intelligence …