Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Singapore Management University (2961)
- Wright State University (632)
- Walden University (447)
- Selected Works (287)
- New Jersey Institute of Technology (137)
-
- University of Nebraska at Omaha (119)
- California State University, San Bernardino (96)
- Old Dominion University (95)
- San Jose State University (85)
- University of Dayton (82)
- The University of Maine (67)
- City University of New York (CUNY) (65)
- University of Nebraska - Lincoln (54)
- Air Force Institute of Technology (53)
- SelectedWorks (53)
- Technological University Dublin (51)
- University of South Florida (50)
- Kennesaw State University (46)
- Nova Southeastern University (43)
- Claremont Colleges (42)
- University of Wisconsin Milwaukee (42)
- University of Arkansas, Fayetteville (41)
- Western Kentucky University (41)
- Dakota State University (39)
- Institute of Business Administration (38)
- California Polytechnic State University, San Luis Obispo (36)
- Western University (35)
- Ateneo de Manila University (34)
- Governors State University (34)
- Purdue University (34)
- Keyword
-
- Machine learning (101)
- Information technology (93)
- Data mining (89)
- Social media (78)
- Twitter (64)
-
- Machine Learning (57)
- Cybersecurity (54)
- Semantic Web (54)
- Deep learning (52)
- Artificial intelligence (49)
- Online learning (49)
- Information Technology (47)
- Classification (46)
- Cloud computing (45)
- Information retrieval (45)
- Privacy (45)
- Big data (44)
- Database (43)
- Ontology (43)
- Computer science (42)
- Information security (41)
- Algorithms (40)
- Security (40)
- Databases (39)
- Information systems (39)
- Management (37)
- Clustering (36)
- Data Mining (36)
- Northern Ohio Data and Information Service (NODIS) (36)
- Technology (35)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (2867)
- Kno.e.sis Publications (541)
- Walden Dissertations and Doctoral Studies (447)
- Theses and Dissertations (116)
- Dissertations (107)
-
- Computer Science Faculty Publications (91)
- Computer Science and Engineering Faculty Publications (91)
- Theses Digitization Project (84)
- Master's Projects (68)
- Information Systems and Quantitative Analysis Faculty Proceedings & Presentations (64)
- Electronic Theses and Dissertations (55)
- Dissertations and Theses Collection (Open Access) (50)
- Theses (46)
- USF Tampa Graduate Theses and Dissertations (46)
- CCE Theses and Dissertations (42)
- Information Systems and Quantitative Analysis Faculty Publications (41)
- Kyriakos MOURATIDIS (40)
- CGU Faculty Publications and Research (37)
- International Conference on Information and Communication Technologies (36)
- Open Educational Resources (34)
- Department of Information Systems & Computer Science Faculty Publications (33)
- All Capstone Projects (32)
- Graduate Theses and Dissertations (32)
- Masters Theses & Doctoral Dissertations (32)
- Articles (29)
- Conference papers (28)
- David LO (28)
- Journal of Spatial Information Science (28)
- All Maxine Goodman Levin School of Urban Affairs Publications (27)
- Saverio Perugini (25)
- Publication Type
Articles 841 - 870 of 6720
Full-Text Articles in Physical Sciences and Mathematics
A Predictive Model To Predict Cyberattack Using Self-Normalizing Neural Networks, Oluwapelumi Eniodunmo
A Predictive Model To Predict Cyberattack Using Self-Normalizing Neural Networks, Oluwapelumi Eniodunmo
Theses, Dissertations and Capstones
Cyberattack is a never-ending war that has greatly threatened secured information systems. The development of automated and intelligent systems provides more computing power to hackers to steal information, destroy data or system resources, and has raised global security issues. Statistical and Data mining tools have received continuous research and improvements. These tools have been adopted to create sophisticated intrusion detection systems that help information systems mitigate and defend against cyberattacks. However, the advancement in technology and accessibility of information makes more identifiable elements that can be used to gain unauthorized access to systems and resources. Data mining and classification tools …
Exploring The Integration Of Corporate Sustainability Into Small-Scale Business Activities, Olushola O. Odutola
Exploring The Integration Of Corporate Sustainability Into Small-Scale Business Activities, Olushola O. Odutola
Walden Dissertations and Doctoral Studies
Small and medium-scale enterprises contribute 49% of the gross domestic product in Nigeria. The lack of research studies on how small and medium-scale enterprises integrate corporate sustainability into their business operations might present challenges for policymakers in achieving Nigeria’s sustainable development goals (SDG). The purpose of this descriptive phenomenological study was to explore how managers of small and medium-scale enterprises integrate the corporate sustainability dimensions into their business operations based on the concepts of the corporate entity, corporate nature, and corporate obligations. The central research question of this study was how managers of small and medium-scale enterprises integrate the economic, …
An Empirical Study On The Impact Of Deep Parameters On Mobile App Energy Usage, Qiang Xu, James C. Davis, Y Charlie Hu, Abhilash Jindal
An Empirical Study On The Impact Of Deep Parameters On Mobile App Energy Usage, Qiang Xu, James C. Davis, Y Charlie Hu, Abhilash Jindal
Department of Electrical and Computer Engineering Faculty Publications
Improving software performance through configuration parameter tuning is a common activity during software maintenance. Beyond traditional performance metrics like latency, mobile app developers are interested in reducing app energy usage. Some mobile apps have centralized locations for parameter tuning, similar to databases and operating systems, but it is common for mobile apps to have hundreds of parameters scattered around the source code. The correlation between these "deep" parameters and app energy usage is unclear. Researchers have studied the energy effects of deep parameters in specific modules, but we lack a systematic understanding of the energy impact of mobile deep parameters. …
Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger
Strategies For The Reduction Of Cybersecurity Breaches In Hospitals, Donovan M. A. Pottinger
Walden Dissertations and Doctoral Studies
AbstractRecent cyberattacks in hospitals show the urgency of the need to enhance secure information technology (IT) infrastructure. Hospitals are statistically more at cyber risk than all the multiple industries against ransomware, malware, hacking and internal threats. Guided by routine activity theory, the purpose of this exploratory multiple case study was to explore strategies utilized by hospitals' IT security managers to reduce cybersecurity breaches associated with sensitive data. The participants were nine IT security managers from hospitals in the eastern United States. Data were collected via semistructured interviews and supporting documentation from the consenting participants and hospitals' websites. Through thematic analysis, …
Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte
Strategies For Information Technology Small Business Owners To Sustain Beyond The First 5 Years, Edward Alan Rodarte
Walden Dissertations and Doctoral Studies
Small businesses are the foundation of an economy and spawn innovation, but small business owners fail at an alarming rate because they lack strategies to sustain business operations. Since 50% of small businesses fail within the first 5 years, small business sustainability research is critical to support small business owners. Grounded in entrepreneurial theory, the purpose of this multiple case study was to identify strategies information technology (IT) small business owners use to sustain operation beyond the first 5 years. The participants included four IT small business owners in the Southwestern United States who sustained operations beyond the first 5 …
Website Accessibility Strategies, Gary W. Hrezo
Website Accessibility Strategies, Gary W. Hrezo
Walden Dissertations and Doctoral Studies
Most websites cannot be readily used by people with disabilities, despite the internet being an essential component for people to be part of a community. Applying web accessibility strategies means that people with disabilities can better interact with the web. Grounded in Davis’s technology acceptance model, the purpose of this qualitative multiple case study was to examine strategies used by web designers to make websites accessible for people with disabilities. The participants were experienced web developers from organizations in Florida with websites that have a Web Content Accessibility Guidelines Level 2 of three levels, i.e., AA- rating. The data collection …
Social Media Analytics Use Among Small Business Owners, Melody White
Social Media Analytics Use Among Small Business Owners, Melody White
Walden Dissertations and Doctoral Studies
As of January 2018, small businesses created 47.5% of private jobs in the United States, but little is known about whether and why small business owners use social media analytics. This topic is important because social media analytics assist businesses in identifying social media effectiveness, gaining new customers, and staying connected with current customers. The purpose of this generic qualitative research study was to explore the use of social media analytics by small business owners, which can increase customer interaction and help monitor company perception and effectiveness. The conceptual foundation used in this study was the technology acceptance model. The …
Exploring Security Strategies To Protect Personally Identifiable Information In Small Businesses, Erin Banks
Exploring Security Strategies To Protect Personally Identifiable Information In Small Businesses, Erin Banks
Walden Dissertations and Doctoral Studies
Organizations that do not adequately protect sensitive data are at high risk of data breaches. Organization leaders must protect confidential information as failing to do so could result in irreparable reputation damage, severe financial implications, and legal consequences. This study used a multiple case study design to explore small businesses’ strategies for protecting their customers’ PII against phishing attacks. This study’s population comprised information technology (IT) managers in small businesses in Northern Virginia. The conceptual framework used in this study was the technology acceptance model. Data collection was performed using telephone interviews with IT managers (n = 6) as well …
Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham
Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham
Walden Dissertations and Doctoral Studies
AbstractAfter organizations successfully adopt the internet of things (IoT) technology, many corporate information technology (IT) leaders face challenges during the implementation phase. Corporate IT leaders' potential failures in implementing IoT devices may impede organizations from integrating IoT solutions and promoting business benefits. Grounded in technology-organization-environment (TOE) theory, the purpose of this qualitative, pragmatic inquiry study was to explore strategies that corporate IT leaders use to implement IoT technology in their organizations. The participants were six corporate healthcare IT leaders who successfully used implementation strategies for implementing IoT solutions for their organizations. Data were collected using semistructured interviews and industry security …
Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii
Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii
Walden Dissertations and Doctoral Studies
Supply chain inflexibility results in reduced efficiency and profitability. Without supply chain flexibility, supply chain managers in manufacturing firms risk the loss of competitive advantage due to reduced efficiency and profitability. Grounded in business process engineering conceptual framework, the purpose of this qualitative multiple case study was to explore strategies supply chain leaders in manufacturing organizations use to achieve supply chain flexibility. The participants were five supply chain leaders in the manufacturing industry in the midwestern United States and successfully implemented innovative solutions to achieve supply chain flexibility. Data were collected using semistructured interviews and a review of company documents …
Impact Of Internal Control, Cybersecurity Risk, And Competitive Advantage On Retail Cybersecurity Budget, Samuel William Pfanstiel
Impact Of Internal Control, Cybersecurity Risk, And Competitive Advantage On Retail Cybersecurity Budget, Samuel William Pfanstiel
Walden Dissertations and Doctoral Studies
Retail organizations are driven to improve security posture for many reasons, including meeting financial regulation requirements, mitigating threats of data breach, and differentiating themselves within markets affected by customer perception. The problem was that little was known about how these drivers of internal control, cybersecurity risk, and competitive advantage impact retail cybersecurity budgets within the retail sector. The purpose of this quantitative nonexperimental correlational study was to describe the relationship between cybersecurity budget and drivers of internal control, cybersecurity risk, and competitive advantage among U.S.-based retail merchant organizations. Real options theory provided a foundation for explaining this decision-making process. Data …
Information Communication And Technology Strategies For Improving Nonprofit Organizations’ Effectiveness, Richard T. Evans
Information Communication And Technology Strategies For Improving Nonprofit Organizations’ Effectiveness, Richard T. Evans
Walden Dissertations and Doctoral Studies
AbstractSome nonprofit organization leaders lack strategies to incorporate information communication and technology (ICT) into the business operations of organizations. A nonprofit organization lacking strategies involving integrating technology into their business operations decreases the likelihood of being efficient, productive, and effective. Grounded in the information technology (IT) competency model, the purpose of this qualitative single case study was to explore the ICT strategies of a nonprofit organization leader in the south suburbs of Chicago. Data were collected through semi-structured interviews, direct observations, and reviews of organizational documents. The Marshall and Rossman seven-step process was used to analyze data. Three themes emerged …
Using Agile Strategies To Improve Project Success Rates, Tim Kirkland
Using Agile Strategies To Improve Project Success Rates, Tim Kirkland
Walden Dissertations and Doctoral Studies
Project failures can be costly to businesses, but on average, program managers’ (PMs’) success rates for managing information technology (IT) projects is less than 35%. Organizational cultures struggle to adapt to agile project management (APM) that provides stakeholder flexibility for dynamic environments. Grounded by project management theory, the purpose of this qualitative multiple case study was to explore strategies project managers use to reduce IT project failures. The participants consisted of nine project managers in the northeastern United States with APM experience managing successful IT projects. Data were collected from virtual semi-structured interviews and journal notes. Ten open-ended interview questions …
Challenges Of Digital Privacy In Banking Organizations, Okechukwu Innocent Ogudebe
Challenges Of Digital Privacy In Banking Organizations, Okechukwu Innocent Ogudebe
Walden Dissertations and Doctoral Studies
As the information and technology age becomes more advanced, digital privacy flaws have become more challenging. Information technology (IT) security managers, chief information security officers, and other stakeholders in banks are concerned with identity-based authentication attacks because identity-theft attacks cause data breaches. Grounded in the protection motivation theory, the purpose of this qualitative pragmatic study was to examine strategies IT security professionals working on internet banking platforms use to mitigate identity-based authentication attacks. The study participants comprised five IT security professionals currently working in the online banking industry from the northeastern United States with at least 5 years of experience …
Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Formal Modeling And Verification Of A Blockchain-Based Crowdsourcing Consensus Protocol, Hamra Afzaal, Muhammad Imran, Muhammad Umar Janjua, Sarada Prasad Gochhayat
Formal Modeling And Verification Of A Blockchain-Based Crowdsourcing Consensus Protocol, Hamra Afzaal, Muhammad Imran, Muhammad Umar Janjua, Sarada Prasad Gochhayat
VMASC Publications
Crowdsourcing is an effective technique that allows humans to solve complex problems that are hard to accomplish by automated tools. Some significant challenges in crowdsourcing systems include avoiding security attacks, effective trust management, and ensuring the system’s correctness. Blockchain is a promising technology that can be efficiently exploited to address security and trust issues. The consensus protocol is a core component of a blockchain network through which all the blockchain peers achieve an agreement about the state of the distributed ledger. Therefore, its security, trustworthiness, and correctness have vital importance. This work proposes a Secure and Trustworthy Blockchain-based Crowdsourcing (STBC) …
Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem
Exploring Critical Success Factors For Implementing It Modernization Systems In Michigan State Agencies, Luc Armand Kamdem
Walden Dissertations and Doctoral Studies
Since 2001, most government organizations’ IT modernization programs had failed because of ineffective implementation strategies from IT leaders. The research problem was the absence of effective strategies to modernize IT legacy systems. The purpose of this qualitative single case study was to explore effective IT modernization strategies to revolutionize IT legacy systems. The researcher sought to answer how organizations create effective strategies to modernize IT legacy systems. The study used purposeful sampling, including 13 IT leaders, IT technicians, and customers based on their experience in implementing successful IT modernization programs’ strategies. Data were collected using semi-structured interviews and agency documentation. …
Equipment Rental Companies Leaders’ Customer Retention Strategies, Katrell Shalaine Mcneil
Equipment Rental Companies Leaders’ Customer Retention Strategies, Katrell Shalaine Mcneil
Walden Dissertations and Doctoral Studies
Equipment rental business leaders that employ inadequate customer retention strategies negatively impact organizations’ performance and profitability. Improved customer retention strategies might improve key customer retention and increase market share. Grounded in the customer retention management theory, the purpose of this qualitative multiple case study was to explore strategies rental leaders use to retain customers. Participants were 10 equipment rental leaders from the Southwest Region of the United States that successfully retained their key customers through effective customer retention strategies. Data were collected using semistructured interviews and a review of materials from organizational websites regarding customer order fulfillment and technology. Through …
Optimal Domotic Systems Based On Archival Data Trend Analysis, Bettina Yvette Moore
Optimal Domotic Systems Based On Archival Data Trend Analysis, Bettina Yvette Moore
Walden Dissertations and Doctoral Studies
Domotics is the integration of technology into building systems. Due to the rapid growth in the use of domotic systems in recent years, the industry is struggling to establish consistency and standardization. The purpose of this archival-based qualitative case study was to identify current trends and patterns in scholarly domotic research to create an instrument to evaluate domotic systems and domotic interrelationships using bibliometric searches. The facilities management and modeling system provided the framework for the study. Archival research data were examined to identify trends and patterns in domotic research and provide visualization of domotic relationships through technology trajectory mapping …
Use Of Human–Computer Interaction Devices And Web 3.0 Skills Among Engineers, Dr. Robbie L. Walker
Use Of Human–Computer Interaction Devices And Web 3.0 Skills Among Engineers, Dr. Robbie L. Walker
Walden Dissertations and Doctoral Studies
Despite massive company investments in human–computer interaction devices and software, such as Web 3.0 technologies, engineers are not demonstrating measurable performance and productivity increases. There is a lack of knowledge and understanding related to the motivation of engineers to use Web 3.0 technologies including the semantic web and cloud applications for increased performance. The purpose of this quantitative correlational study was to investigate whether the use of human–computer interaction devices predict Web 3.0 skills among engineers. Solow’s information technology productivity paradox was the theoretical foundation for this study. Convenience sampling was used for a sample of 214 participants from metropolitan …
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Relationship Between Vendor/Client Complementarity, Vendor Technology Maturity, Vendor Financial Stability, And It Outsourcing Project Outcomes, Everton A. Wilson
Walden Dissertations and Doctoral Studies
Business and IT leaders in financial services are concerned with the limited benefits they are reaping from information technology outsourcing (ITO) projects, despite continued heavy investments in ITO. Grounded in the transaction cost, agency, and resource-based view theories, the purpose of this quantitative correlational study was to examine the relationship between vendor/client complementarity, vendor technology maturity, vendor financial stability, and ITO success. Participants were 65 business and IT leaders in financial institutions engaged in ITO projects. The result of the multiple linear regression was significant, F(3, 61) = 4.845, p = .004, R2 = .192. In the final analysis, vendor/client …
Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao
Strategies That Improve Ux (User Experience) Design Through Product Innovation, Jibing Zhao
Walden Dissertations and Doctoral Studies
User Experience (UX) design improvement can alter business results. Information technology (IT) company leaders are concerned with UX design improvement, as it is the number one indication of product innovation success and user satisfaction. Grounded in Christensen’s disruptive innovation theory, the purpose of the qualitative single case study was to explore strategies IT company leaders and UX designers used to identify critical UX design elements that lead to improved product innovations. The participants were five IT company leaders and a focus group of four UX designers employed by a sizeable telecom organization in Beijing, China. The data were collected from …
Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith
Strategies For Adoption Of Innovative Information Technology For Business Performance Improvement, James Melvin Smith
Walden Dissertations and Doctoral Studies
Business leaders do not often consider investing in informational technology (IT) to increase performance. These business leaders lack knowledge of innovative IT adoption strategies to expand their revenue and reduce costs to sustain a competitive advantage. Grounded in the technology-organization-environment (TOE) theory, the purpose of this qualitative multiple case study was to explore IT innovation adoption strategies business leaders use to increase performance. The participants were four successful business leaders selected from finalists for international entrepreneurial awards presented annually in the Mid-Atlantic region of the United States. The data were collected using semistructured telephone interviews, media releases, and online publications. …
Information Systems Management And Sustainable Urban Development: A Case Study, Endris A. Suraj
Information Systems Management And Sustainable Urban Development: A Case Study, Endris A. Suraj
Walden Dissertations and Doctoral Studies
Sustainable Urban Development of Ethiopia lacks strategies to implement information systems management (ISM). Lacking appropriate ISM implementation has influenced the government’s plan on the four indicators of urban sustainability - Water, Air, Climate Change, and Population Growth. Grounded in the conceptual frameworks of Technology Acceptance Model (TAM) and Diffusion Of Innovation (DOI), the purpose of this qualitative single case study aims to explore ISM for sustainable urban development in Ethiopia. The participants were 12 Development Associates (DAs) who have been participating in implementing of ISM. Data was collected through a one-to-one interview, National documents, the Environmental Protection Office of Ethiopia, …
Successful Information Technology Project Process Management Best Practices, Jude Oderaa Orazulike
Successful Information Technology Project Process Management Best Practices, Jude Oderaa Orazulike
Walden Dissertations and Doctoral Studies
Globally, most information technology projects (ITPs) are reported as unsuccessful. Poor project management practices have consistently been identified as the leading cause of ITP failures. However, ITP practitioners manage project processes in diverse ways without clear guiding principles in terms of what does or does not work in practice for success. Process management practices in projects were explored in this grounded theory qualitative study from a systems theory perspective. The purpose was to understand from project practitioners' experiences what guiding principles potentially influenced ITPs to success. These experiences were then analyzed to develop a theory describing how to best use …
Analyzing Secure Access Strategies To Protect Clinical-Information Systems In The Healthcare Industry, Manjit S. Kang
Analyzing Secure Access Strategies To Protect Clinical-Information Systems In The Healthcare Industry, Manjit S. Kang
Walden Dissertations and Doctoral Studies
Securing patient health records within cloud-based health records is a critical security challenge for hospitals and healthcare organizations. Some information technology (IT) leaders working in the U.S. healthcare industry or hospitals are concerned with their patient cloud-based health records due to data breaches in their healthcare systems. Grounded in the task technology fit theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies healthcare information leaders use to implement security procedures to protect patient health records on private cloud-based clinical information systems (CIS). The participants were six IT managers in metropolitan San Francisco Bay healthcare facilities. The …
Strategies For Attracting And Retaining Highly Skilled It Professionals For The High-Tech Workforce, Mia Gyjuan Moore
Strategies For Attracting And Retaining Highly Skilled It Professionals For The High-Tech Workforce, Mia Gyjuan Moore
Walden Dissertations and Doctoral Studies
Many information technology (IT) managers have experienced challenges retaining high-tech professionals. Organization leaders lose investments of time and money when essential personnel leave. Grounded in the task-technology fit theory and the technology acceptance model, the purpose of this qualitative multiple-case study was to explore technology-focused strategies IT managers use to attract and retain IT professionals. The participants included five IT managers from five high-tech organizations who implemented strategies to attract and retain IT professionals. Data were collected from semistructured interviews and online resources. Thematic analysis revealed four themes: (a) using high-tech tools and alternative methods, (b) employing talent management techniques, …
Individual Contributor Experiences Of Task Uncertainty And Task Interdependence Under Different Structures, Andrew R. Barbeau
Individual Contributor Experiences Of Task Uncertainty And Task Interdependence Under Different Structures, Andrew R. Barbeau
Walden Dissertations and Doctoral Studies
Approximately 84% of North American individual contributors work in organizations with functionally specialized structures where task uncertainty (TU) and task interdependence (TI) undermine cross-functional task execution. However, there is a lack of research into the TU and TI experiences of individual contributors under different organizational structures. It is important that senior leaders have this missing knowledge to inform structural decisions. The purpose of this generic qualitative, exploratory, snowball sampling study is to explore how individual contributors experience TU and TI following a reorganization from a functional to a horizontal organizational structure. In the current study, the research questions explored were …
Adoption Of It Governance Strategies For Multiproduct Devops Teams: A Correlational Quantitative Study, Russell Camilleri
Adoption Of It Governance Strategies For Multiproduct Devops Teams: A Correlational Quantitative Study, Russell Camilleri
Walden Dissertations and Doctoral Studies
Many multiproduct delivery organizations have difficulty adopting Information Technology (IT) governance practices within their Development and Operations (DevOps) teams. IT leaders who are managing DevOps teams, need to understand the factors influencing IT governance (ITG) adoption; otherwise this may impact DevOps maturity, resulting in reduced product delivery capabilities. Grounded in the technology acceptance model, the purpose of this quantitative correlational study was to examine the relationship between performance expectancy (PE), effort expectancy (EE), social influence (SI), and facilitating conditions (FC), as moderated by experience (EXP), gender (GND), age (AGE), and voluntariness of use (VOL) with behavioral intention (BI) to adopt …
Strategies Using Threat Intelligence To Detect Advanced Persistent Threats: A Qualitative Case Study, Melisa A. Joyner
Strategies Using Threat Intelligence To Detect Advanced Persistent Threats: A Qualitative Case Study, Melisa A. Joyner
Walden Dissertations and Doctoral Studies
Advanced persistent threats (APTs) targeting critical infrastructures can adversely impact human lives. Cyber security analysts are concerned with APT attacks because they make it challenging to defend critical infrastructures. Grounded in routines activity theory (RAT), the purpose of this qualitative exploratory multiple case study was to explore strategies cybersecurity analysts use to defend critical infrastructures from APT attacks. Data were collected through interviews with 8 participants and documents from two organizations. Participants were required to have experience analyzing network traffic on a critical infrastructure network, one year of cyber threat hunting experience, prior or current knowledge of cyber threat intelligence …