Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 871 - 900 of 6720

Full-Text Articles in Physical Sciences and Mathematics

Examination Of Strategies To Implementing Chip-And-Personal Identification Number Credit Card Authentication Infrastructures, Neville Arthur Gallimore Jan 2022

Examination Of Strategies To Implementing Chip-And-Personal Identification Number Credit Card Authentication Infrastructures, Neville Arthur Gallimore

Walden Dissertations and Doctoral Studies

Chip-and-Personal Identification Number (PIN) technology is seen as a game changer in many e-commerce industries and a transformational technology in the 21st century. However, security concerns have made chip-and-PIN adoption relatively slow. Massive unauthorized card payment transactions in the United States (U.S.) cost victims an estimate totaling billions of dollars. Information Technology (IT) managers are concerned with credit card fraud's financial loss and liability cost. Grounded in Rogers’s diffusion of innovation theory, the purpose of this qualitative pragmatic study was to explore strategies used by IT managers to transition their e-commerce organizations to chip-and-PIN credit card authentication infrastructures. The participants …


Relationship Between Information System Success Model Dimensions And Electronic Health Records Use, Gloria Oshegbo Jan 2022

Relationship Between Information System Success Model Dimensions And Electronic Health Records Use, Gloria Oshegbo

Walden Dissertations and Doctoral Studies

The rise in the use of electronic health records (EHRs) in health care facilities necessitates a standardized tool for evaluating their effectiveness. Delone and McLean’s information system success model (ISSM) was the theoretical foundation, which consists of seven dimensions namely system, information, service qualities, user satisfaction, use, system usefulness, and net benefits. The purpose of this study was to examine EHRs’ efficiency and identify ISSM dimensions that influenced net benefits, the dependent variable. The research questions examined the relationship between dimensions of ISSM and the dimensions that affect net benefits. Participants were recruited using purposeful sampling via social media and …


Digital Strategies To Improve The Performance Of Pharmaceutical Supply Chains, Manish Shashi Jan 2022

Digital Strategies To Improve The Performance Of Pharmaceutical Supply Chains, Manish Shashi

Walden Dissertations and Doctoral Studies

Some supply chain managers at pharmaceutical companies lack strategies to digitalize integrated supply chain systems impacting their profitability. Digitalized supply chain management in a pharmaceutical company can help reduce operation costs, improve assets, enhance shareholders’ value, positively respond to customer demand, and generate profits. Guided by the theory of constraints, the purpose of this qualitative multiple case study was to explore strategies some pharmaceutical managers use to digitalize integrated supply chain systems to increase their profitability. The participants were five managers from four pharmaceutical companies in New Jersey with strategies to digitalize their integrated supply chain systems. Data collection included …


Enterprise Resource Planning Implementation Strategies In Small- And Medium-Sized Manufacturing Enterprises, Tatianna Gilliam Jan 2022

Enterprise Resource Planning Implementation Strategies In Small- And Medium-Sized Manufacturing Enterprises, Tatianna Gilliam

Walden Dissertations and Doctoral Studies

The difficulty SME leaders of manufacturing firms experience in the executing of enterprise resource planning (ERP) systems threatens the longevity of innovative change within firms seeking to adopt ERP systems. Grounded in the diffusion of innovation theory, the purpose of this multiple case study was to examine critical success factors used to successfully implement ERP systems. The participants were four ERP business leaders of small to medium size manufacturing firms based on the east and west coasts of the United States. Data were collected using semistructured online interviews and a review of company documents. Through thematic analysis, five themes were …


Administrative Leaders’ Experiences With Information Communication Technology Platforms And Best Practices In Smart Schools, Byron B. Jackson Jan 2022

Administrative Leaders’ Experiences With Information Communication Technology Platforms And Best Practices In Smart Schools, Byron B. Jackson

Walden Dissertations and Doctoral Studies

Administrative leaders in traditional schools have failed to manage resources, implement best practices, and successfully integrate information communication technology (ICT) platforms into K-12 programs. The purpose of this qualitative, transcendental phenomenological study was to explore and discover the lived experiences of administrative leaders who have been successful in their integration of ICT platforms and best practices in K-12 smart schools. This study was framed by two concepts: (a) building digital capacity in smart schools and (b) ICT platforms integration in smart schools. Both concepts were theoretically grounded in social cognitive theory and system theory. Data were collected in semi structured …


Strategies For Small-And Medium-Sized Business Growth And Survival, Abiodun Nestamanuel Ogunmuyiwa Jan 2022

Strategies For Small-And Medium-Sized Business Growth And Survival, Abiodun Nestamanuel Ogunmuyiwa

Walden Dissertations and Doctoral Studies

In the United States, approximately 50% of small businesses fail within the first five years (Small Business Administration, 2018b). Small and medium sized enterprises (SMEs) owners and managers would benefit from strategies to identify and mitigate constraints to sustain their business beyond the first five years of business operation. Grounded in the system theory framework, the purpose of this qualitative multiple case study was to explore strategies leaders of small and medium sized enterprises (SMEs) in Austin, Texas, used to grow and sustain their business’s operations beyond five years. The participants were five small and medium sized businesses owners in …


Strategies For Cryptocurrency Adoption In Contemporary Businesses, Jacqueline Rodriguez Jan 2022

Strategies For Cryptocurrency Adoption In Contemporary Businesses, Jacqueline Rodriguez

Walden Dissertations and Doctoral Studies

Millions of Bitcoin transactions occur daily, worth nearly $2 billion annually. With the proliferation of cryptocurrency markets, the reluctance to adopt the currency as an alternate payment method could cause businesses to forgo growth opportunities within this expanding market. Grounded in the diffusion of innovation theory, the purpose of this qualitative multiple-case study was to explore strategies business leaders use to respond to the alternative payment concerns perpetuated by cryptocurrency markets. The participants comprised 6 business leaders who effectively employed cryptocurrency adoption strategies. Data were collected through semistructured interviews, corporate documents, and other company social media resources. Thematic analysis of …


Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii Jan 2022

Strategies For Catalyzing Supply Chain Innovation In Midsized Manufacturing Firms, Matthew J. Szukalowski Iii

Walden Dissertations and Doctoral Studies

Supply chain inflexibility results in reduced efficiency and profitability. Without supply chain flexibility, supply chain managers in manufacturing firms risk the loss of competitive advantage due to reduced efficiency and profitability. Grounded in business process engineering conceptual framework, the purpose of this qualitative multiple case study was to explore strategies supply chain leaders in manufacturing organizations use to achieve supply chain flexibility. The participants were five supply chain leaders in the manufacturing industry in the midwestern United States and successfully implemented innovative solutions to achieve supply chain flexibility. Data were collected using semistructured interviews and a review of company documents …


Exploration Of Cybersecurity Managers’ Experiences Protecting Users’ Privacy, Emmanuel Abayomi Segun Jan 2022

Exploration Of Cybersecurity Managers’ Experiences Protecting Users’ Privacy, Emmanuel Abayomi Segun

Walden Dissertations and Doctoral Studies

The protection of individual privacy and personal data in cyberspace continues to be a problem. The research problem was that cybersecurity managers must constantly navigate between the adoption of new security laws, new applications, and the internet of things (IoT) to protect the privacy of individual users. The purpose of this descriptive phenomenological study was to explore the lived experiences of cybersecurity managers who have adopted new security laws, new applications, and the IoT to protect users’ privacy. The conceptual framework that grounded this study was protection motivation theory and cybersecurity awareness. Data were collected through telephone and web-based interviews …


Increasing Nurse Leader Knowledge And Awareness Of Information And Communication Technologies, Cory Stephens Jan 2022

Increasing Nurse Leader Knowledge And Awareness Of Information And Communication Technologies, Cory Stephens

Walden Dissertations and Doctoral Studies

Due to the recent coronavirus disease (COVID-19) pandemic, rapid technological innovation and nursing practice transformation exposed a deepening divide in the knowledge and awareness of information and communication technologies (ICT) among nurses. This technological skills gap undermines the benefits of ICT to nursing practice such as increased nurse satisfaction, improved care quality, and reduced costs. Nurse leaders are positioned to promote the use of ICT among nurses but may suffer from the same knowledge deficit of ICT as their followers. Guided by Locsin’s technological competencies as caring in nursing theory, Staggers and Parks’ nurse-computer interaction framework, and Covell’s nursing intellectual …


Strategies For Cybercrime Prevention In Information Technology Businesses, Sophfronia G. Tucker Jan 2022

Strategies For Cybercrime Prevention In Information Technology Businesses, Sophfronia G. Tucker

Walden Dissertations and Doctoral Studies

Cybercrime continues to be a devastating phenomenon, impacting individuals and businesses across the globe. Information technology (IT) businesses need solutions to defend and secure their data and networks from cyberattacks. Grounded in general systems theory and transformational leadership theory, the purpose of this qualitative multiple case study was to explore strategies IT business leaders use to protect their systems from a cyberattack. The participants included six IT business leaders with experience in cybersecurity or system security in the Midlands region of South Carolina. Data were collected using semistructured interviews and reviews of government standards documents; data were analyzed using thematic …


Employee Training Strategies For New Technology Implementation In Small Business, Eddy Varela Jan 2022

Employee Training Strategies For New Technology Implementation In Small Business, Eddy Varela

Walden Dissertations and Doctoral Studies

Failure to implement new technology creates a barrier to success for small businesses. Small business owners must create competitive advantages by implementing new technology as there is a need to maintain an advantage when competing in the local market economy. Grounded in the human capital theory, the purpose of this qualitative multiple case study was to explore the employee training strategies small business owners use to implement new technology. The participants were five small business owners in Central Florida who used employee training strategies to implement new technologies Data were collected using (a) semistructured interviews, (b) member checking interviews, (c) …


Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams Jan 2022

Strategies For Implementing Critical Success Factors For Improving Information Technology Information Systems’ Performance In Financial Organizations, Sherri L. Williams

Walden Dissertations and Doctoral Studies

Information technology infrastructure library (ITIL) business leaders lack strategies for implementing critical success factors (CSFs) to promote organizational effectiveness and project success. As a result, ITIL leaders may experience less project success if CSF strategies are not effectively implemented. Grounded in the balanced scorecard (BSC) theory, this qualitative multiple case study aimed to explore strategies ITIL business leaders use to implement CSFs successfully to improve organizational efficiency for project success. The participants comprised five ITIL business leaders in the financial industry located in the southwestern region of the United States who successfully implemented strategies to implement CSFs to improve organizational …


Data Processing In A Database Management System Using Parallel Processing, Stephen Shears Jan 2022

Data Processing In A Database Management System Using Parallel Processing, Stephen Shears

Williams Honors College, Honors Research Projects

This research project will be focused on parallel processing as it is used with database management systems to process data. Specifically, the goal is to see if creating a database management system with parallel processing at the forefront of its data processing can offer enough of an efficiency increase to warrant using it against a sequential database management system and is it possible to make that system just as reliable as those databases without parallel processing. A parallel processed database will be created with a focus on monitoring its data reliability and consistency. It will then be compared to two …


Resume Parser And Job Search, Stephan Gunawardana Jan 2022

Resume Parser And Job Search, Stephan Gunawardana

Williams Honors College, Honors Research Projects

The basic goal of this project was to create a four-tier web application which would allow users to upload their personal resumes to the website, and it ultimately would parse the resume and look for keywords. Then using these keywords, it would use a job API to look for these values and ultimately display job information to the user based on their skills. While applications exist which would look for jobs based on skills, it was mostly manually inputted skills. However, with my application you can simply upload your resume to the website, and it will basically take care of …


Security Strategies Of Electronic Health Record Systems, Benjamin Gerke Jan 2022

Security Strategies Of Electronic Health Record Systems, Benjamin Gerke

Walden Dissertations and Doctoral Studies

Users of electronic health record (EHR) systems lack data security mechanisms and are at risk of patient data breaches. Grounded in routine activities theory, the purpose of this qualitative case study was to explore strategies information technology security managers in the health care industry use to minimize electronic health record data breaches. The participants were nine information security managers of large, medium, and small health care organizations in the Midwest United States. Data collection included semistructured interviews and organizational documents. Through methodological triangulation, three themes emerged: (a) requirements based on government and organizational regulations, (b) implementation of best practice industry-standard …


Modernization Of Legacy Information Technology Systems, Rabie Khabouze Jan 2022

Modernization Of Legacy Information Technology Systems, Rabie Khabouze

Walden Dissertations and Doctoral Studies

Large enterprises spend a large portion of their Information Technology (IT) budget on maintaining their legacy systems. Legacy systems modernization projects are a catalyst for IT architects to save cost, provide new and efficient systems that increase profitability, and create value for their organization. Grounded in sociotechnical systems theory, the purpose of this qualitative multiple case study was to explore strategies IT architects use to modernize their legacy systems. The population included IT architects in large enterprises involved in legacy systems modernization projects, one in healthcare, and one in the financial services industry in the San Antonio-New Braunfels, Texas metropolitan …


Strategies Business Leaders Use To Mitigate Online Credit Card Fraud, Clarissa Rosario-Tavarez Jan 2022

Strategies Business Leaders Use To Mitigate Online Credit Card Fraud, Clarissa Rosario-Tavarez

Walden Dissertations and Doctoral Studies

Online credit card fraud targeting banks, customers, and businesses costs millions of U.S. dollars annually. Online business leaders face challenges securing and regulating the online payment processing environment. Grounded in the situational crime prevention theory, the purpose of this qualitative multiple case study was to explore strategies online business leaders use to mitigate the loss of revenue caused by online credit card fraud. The participants comprised five online business leaders of an organization in the Southwest of the United States, who implemented strategies that successfully mitigated revenue losses due to online credit card fraud. The data were collected from semistructured …


Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham Jan 2022

Exploring Implementation Strategies Of Iot Technology In Organizations: Technology, Organization, And Environment, Khanhhung Hoang Pham

Walden Dissertations and Doctoral Studies

AbstractAfter organizations successfully adopt the internet of things (IoT) technology, many corporate information technology (IT) leaders face challenges during the implementation phase. Corporate IT leaders' potential failures in implementing IoT devices may impede organizations from integrating IoT solutions and promoting business benefits. Grounded in technology-organization-environment (TOE) theory, the purpose of this qualitative, pragmatic inquiry study was to explore strategies that corporate IT leaders use to implement IoT technology in their organizations. The participants were six corporate healthcare IT leaders who successfully used implementation strategies for implementing IoT solutions for their organizations. Data were collected using semistructured interviews and industry security …


Factors Influencing The Effectiveness Of Managing Human–Robot Teams, Theodore B. Terry Jan 2022

Factors Influencing The Effectiveness Of Managing Human–Robot Teams, Theodore B. Terry

Walden Dissertations and Doctoral Studies

Certain factors can influence the capabilities of a robot–human team by affecting their social and behavioral dynamics in a work environment. But these factors were not known due to the progressive nature of human–robot partnerships and a lack of peer-reviewed literature on the topic. This e-Delphi study aimed to identify and understand these unknown influential factors based on the participants’ insights. The overarching research question asked about the need to determine factors that might influence the effectiveness of managing human-robot teams. The basis for the conceptual framework for this study was the theory of communication used in organizational management. Twelve …


Successful Strategies For Adopting Electronic Medical Records Systems At Hospitals, Vazi Okhandiar Jan 2022

Successful Strategies For Adopting Electronic Medical Records Systems At Hospitals, Vazi Okhandiar

Walden Dissertations and Doctoral Studies

Some healthcare leaders lack strategies to successfully implement electronic medical record (EMR) systems to improve patient care efficiency and effectiveness. Grounded in the technology acceptance model, the purpose of this qualitative multiple case study was to explore strategies healthcare leaders use to implement EMR systems. The participants comprised five healthcare leaders who implemented EMRs in U.S. hospitals. Data were collected using semistructured interviews, government websites, and relevant documents and analyzed using Yin’s five-step data analysis method. Three themes emerged: (a) adequate training, (b) workflow analysis, and (c) technical support. A key recommendation is for management to provide customized training to …


Towards More Efficient Collaborative Distributed Data Analysis And Learning, Zixia Liu Jan 2022

Towards More Efficient Collaborative Distributed Data Analysis And Learning, Zixia Liu

Electronic Theses and Dissertations, 2020-2023

Modern information era gives rise to the persistent generation of large amounts of data with rapid speed and broad geographical distribution. Obtaining knowledge and understanding via analysis and learning from such data have invaluable worth. Features of such data analytical tasks commonly include: data can be large scale and geographically distributed; computing capability demand can be enormous; tasks can be time-critical; some data can be private; participants can have heterogeneous capabilities and non-IID data; and multiple simultaneously submitted data analytical tasks can be possible. These bring challenges to contemporary computing infrastructure and learning models. In view of this, we develop …


Do Sequels Outperform Or Disappoint? Insights From An Analysis Of Amazon Echo Consumer Reviews, Kyong Jin Shim, Siaw Ling Lo, Su Yee Liew Jan 2022

Do Sequels Outperform Or Disappoint? Insights From An Analysis Of Amazon Echo Consumer Reviews, Kyong Jin Shim, Siaw Ling Lo, Su Yee Liew

Research Collection School Of Computing and Information Systems

Rapid technological advances in recent years drastically transformed our world. Amidst modern technological inventions such as smart phones, smart watches and smart home devices, consumers of electronic digital devices experience greatly improved automation, productivity, and efficiency in conducting routine daily tasks, information searching, shopping as well as finding entertainment. In the last few years, the global smart speaker market has undergone significant growth. As technology continues to advance and smart speakers are equipped with innovative features, the adoption of smart speakers will increase and so will consumer expectations. This research paper presents an aspect-specific sentiment analysis of consumer reviews of …


Infrastructure As Code Strategies And Benefits In Cloud Computing, Jeffrey Chijioke-Uche Jan 2022

Infrastructure As Code Strategies And Benefits In Cloud Computing, Jeffrey Chijioke-Uche

Walden Dissertations and Doctoral Studies

Hybrid and multicloud infrastructure implementation without automation and versioning strategy can negatively impact organizations’ productivity. Organization leaders must ensure that infrastructures are implemented using the infrastructure as code (IaC) strategy because implementation solutions, including automated and DevOps procedures, provide assets for repeatable infrastructure implementation use cases. Grounded in the disruptive innovation theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies solution architects use to implement IaC architecture using repeatable assets with DevOps procedures in cloud computing. The participants were seven solution architects in the information technology (IT) industry within the United States who have successfully implemented …


Forward-Looking Strategies For Safely Adopting Digital Transformation In Aviation, Melissa King Jan 2022

Forward-Looking Strategies For Safely Adopting Digital Transformation In Aviation, Melissa King

Walden Dissertations and Doctoral Studies

Aviation leaders in the U.S. federal government face challenges in adopting technical evolution and advancing modernization while adhering to the rigor of a deeply entrenched safety culture. The purpose of this qualitative modified Delphi study was to determine how a panel of 21 aerospace experts based in Washington, DC viewed strategies for adopting to new technologies while ensuring safety. The management concepts that framed the study were safety culture and digital transformation. The study addressed the research question of how a panel of aviation experts viewed the desirability, feasibility, and importance of forward-looking strategies for adopting digital transformation while adhering …


The Effects Of Recommender System On Sales Promotion Of High-Value Products: Evidence From A Field Experiment In The Real Estate Industry, Lian Liu Jan 2022

The Effects Of Recommender System On Sales Promotion Of High-Value Products: Evidence From A Field Experiment In The Real Estate Industry, Lian Liu

Dissertations and Theses Collection (Open Access)

Real estate sales industry in China has long suffered the problem of inefficient matching of customers to projects. Inspired by the design of recommender systems, which have been widely used in the online retail industry, and are shown to facility customer-product matching and improve sales, we apply this system to the real estate sales industry using a novel approach. Instead of recommending products to customers, we suggest the best potential customers to salespeople with whom they will conduct sales with. Using city-wide sales data from the largest real estate sales company in China, we first develop a recommend system based …


Deep Learning For Video-Grounded Dialogue Systems, Hung Le Jan 2022

Deep Learning For Video-Grounded Dialogue Systems, Hung Le

Dissertations and Theses Collection (Open Access)

In recent years, we have witnessed significant progress in building systems with artificial intelligence. However, despite advancements in machine learning and deep learning, we are still far from achieving autonomous agents that can perceive multi-dimensional information from the surrounding world and converse with humans in natural language. Towards this goal, this thesis is dedicated to building intelligent systems in the task of video-grounded dialogues. Specifically, in a video-grounded dialogue, a system is required to hold a multi-turn conversation with humans about the content of a video. Given an input video, a dialogue history, and a question about the video, the …


The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu Jan 2022

The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

This paper aims to present a comprehensive survey on information integration (II) in space informatics. With an ever-increasing scale and dynamics of complex space systems, II has become essential in dealing with the complexity, changes, dynamics, and uncertainties of space systems. The applications of space II (SII) require addressing some distinctive functional requirements (FRs) of heterogeneity, networking, communication, security, latency, and resilience; while limited works are available to examine recent advances of SII thoroughly. This survey helps to gain the understanding of the state of the art of SII in sense that (1) technical drivers for SII are discussed and …


Predictive Models In Software Engineering: Challenges And Opportunities, Yanming Yang, Xin Xia, David Lo, Tingting Bi, John C. Grundy, Xiaohu Yang Jan 2022

Predictive Models In Software Engineering: Challenges And Opportunities, Yanming Yang, Xin Xia, David Lo, Tingting Bi, John C. Grundy, Xiaohu Yang

Research Collection School Of Computing and Information Systems

Predictive models are one of the most important techniques that are widely applied in many areas of software engineering. There have been a large number of primary studies that apply predictive models and that present well-performed studies in various research domains, including software requirements, software design and development, testing and debugging, and software maintenance. This article is a first attempt to systematically organize knowledge in this area by surveying a body of 421 papers on predictive models published between 2009 and 2020. We describe the key models and approaches used, classify the different models, summarize the range of key application …


Orchestration Or Automation: Authentication Flaw Detection In Android Apps, Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay K. Jha, Robert H. Deng, Elisa Bertino Jan 2022

Orchestration Or Automation: Authentication Flaw Detection In Android Apps, Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay K. Jha, Robert H. Deng, Elisa Bertino

Research Collection School Of Computing and Information Systems

Passwords are pervasively used to authenticate users' identities in mobile apps. To secure passwords against attacks, protection is applied to the password authentication protocol (PAP). The implementation of the protection scheme becomes an important factor in protecting PAP against attacks. We focus on two basic protection in Android, i.e., SSL/TLS-based PAP and timestamp-based PAP. Previously, we proposed an automated tool, GLACIATE, to detect authentication flaws. We were curious whether orchestration (i.e., involving manual-effort) works better than automation. To answer this question, we propose an orchestrated approach, AUTHEXPLOIT and compare its effectiveness GLACIATE. We study requirements for correct implementation of PAP …