• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 264
  • Tagged with
  • 477
  • 477
  • 477
  • 214
  • 179
  • 169
  • 155
  • 130
  • 128
  • 98
  • 88
  • 87
  • 71
  • 66
  • 62
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

Exploring SME Vulnerabilities to Cyber-criminal Activities Through Employee Behavior and Internet Access

Twisdale, Jerry Allen 01 January 2018 (has links)
Cybercriminal activity may be a relatively new concern to small and medium enterprises (SMEs), but it has the potential to create financial and liability issues for SME organizations. The problem is that SMEs are a future growth target for cybercrime activity as larger corporations begin to address security issues to reduce cybercriminal risks and vulnerabilities. The purpose of this study was to explore a small business owner's knowledge about to the principal elements of decision making for SME investment into cybersecurity education for employees with respect to internet access and employee vulnerabilities. The theoretical framework consisted of the psychological studies by Bandura and Jaishankar that might affect individual decision making in terms of employee risks created through internet use. This qualitative case study involved a participant interview and workplace observations to solicit a small rural business owner's knowledge of cybercriminal exploitation of employees through internet activities such as social media and the potential exploitation of workers by social engineers. Word frequency analysis of the collected data concluded that SME owners are ill equipped to combat employee exploitation of their business through social engineering. Qualitative research is consistent with understanding the decision factors for cost, technical support, and security threat prevention SME organizational leadership use and is the focus of this study as emergent themes. The expectation is that this study will aid in the prevention of social engineering tactics against SME employees and provide a platform for future research for SMEs and cybercriminal activity prevention.
162

Black Business Owners Overcoming Barriers in Texas

Williams, Henry 01 January 2018 (has links)
Black entrepreneurs in the state of Texas reported that they did not achieve the same level of success as nonminority enterprises. Many Black entrepreneurs have obtained education from top tier institutions and have the managerial experiences, skills, and working knowledge that facilitate business success, but they are not able to sustain business growth. The purpose of this phenomenological study was to explore the lived experiences of Black Texan entrepreneurs. This research was established using the conceptual framework of human capital. The overarching research question concerned the lived experiences of Black Texas entrepreneurs who were not as successful in business as their counterparts. Data were collected in the form of semistructured face-to-face interviews with 14 Black participants, using the African American Chamber of Commerce to facilitate networking among Black entrepreneurs. NVivo 11 software was used for data codification and thematic reduction. Emergent themes included (a) feeling good about being in business, (b) resourcefulness in business, (c) network advertising systems, (d) education, (e) having alternative plans if business closes, (f) feeling independent, and (g) activeness in business. The implications for positive social change include the potential for advising researchers on barriers confronted by Black entrepreneurs and potential steps to overcome those barriers. Additionally, scholars have recognized the need for greater understanding of how businesses are structured and managed by Black business-owners because this knowledge is vital to creating business prosperity for Black entrepreneurs who have dreams of becoming business owners.
163

Adoption of Cloud Computing Services in an Illinois-Based Insurance Company

Polk, Nekerral 01 January 2019 (has links)
The decision to adopt cloud computing services should involve business units of an insurance company as well as information technology (IT) because cloud computing services are viewed as both a technology offering and business alternative. The purpose of this qualitative exploratory case study was to explore the strategies used by IT architects of an Illinois-based insurance company when adopting cloud computing services. The theory supporting this study was the technology acceptance model. The study's population consisted of IT architects from an Illinois-based insurance company that have used strategies to adopt cloud computing services. This study's data collection included semistructured interviews and review of organizational documents. Member checking with each participant increased the validity of this study's findings. Four major themes emerged from this study: strategies to adopt cloud computing services, strategies to adopt cloud services models, strategies to adopt cloud computing models, and concerns affecting the strategies to adopt cloud computing services. The study findings may assist IT architects in developing effective strategies to adopt cloud computing services for their respective business unit. This study might serve as a foundation for positive social change by decreasing customer concerns regarding critical information being compromised when adopting cloud computing services.
164

Strategies to Prevent Security Breaches Caused by Mobile Devices

Griffin, Tony 01 January 2017 (has links)
Data breaches happen almost every day in the United States and, according to research, the majority of these breaches occur due to a lack of security with organizations' mobile devices. Although most of the security policies related to mobile devices currently in place may meet the guidelines required by law, they often fail to prevent a data breach caused by a mobile device. The main purpose of this qualitative single case study was to explore the strategies used by security managers to prevent data breaches caused by mobile devices. The study population consisted of security managers working for a government contractor located in the southeastern region of the United States. Ludwig von Bertalanffy's general systems theory was used as the conceptual framework of this study. The data collection process included interviews with organization security managers (n = 5) and company documents and procedures (n = 13) from the target organization related to mobile device security. Data from the interviews and organizational documents were coded using thematic analysis. Methodological triangulation of the data uncovered 4 major themes: information security policies and procedures, security awareness, technology management tools, and defense-in-depth. The implications for positive social change from this study include the potential to enhance the organizations' security policies, cultivate a better security awareness training program, and improve the organizations data protection strategies. In addition, this study outlines some strategies for preventing data breaches caused by mobile devices while still providing maximum benefit to its external and internal customers.
165

Evaluating Intention to Use Remote Robotics Experimentation in Programming Courses

Cheng, Pericles Leng 01 January 2017 (has links)
The Digital Agenda for Europe (2015) states that there will be 825,000 unfilled vacancies for Information and Communications Technology by 2020. This lack of IT professionals stems from the small number of students graduating in computer science. To retain more students in the field, teachers can use remote robotic experiments to explain difficult concepts. This correlational study used the unified theory of acceptance and use of technology (UTAUT) to examine if performance expectancy, effort expectancy, social influence, and facilitating conditions can predict the intention of high school computer science teachers in Cyprus, to use remote robotic experiments in their classes. Surveys, based on the UTAUT survey instrument, were collected from 90 high school computer science teachers in Cyprus, and a multiple regression analysis was used to measure the correlations between the constructs and finally the model fit of the analysis. The model was able to predict approximately 35% of the variation of the teachers' intent to use remote robotic experiments. The biggest predictor was facilitating conditions followed by effort expectancy. Performance expectancy had little impact, whereas social influence had no impact on the intention of high school teachers to use remote robotic experiments in their classes. These results can help curriculum decision makers in the Ministry of Education in Cyprus to examine what factors affect the acceptance of remote robotic experiments and develop them in ways that would increase their implementation in high schools. By incorporating remote robotic experiments in high schools, students may learn difficult concepts, leading to an increase in computer science graduates and ultimately an increase in IT professionals.
166

Strategies for Applying Electronic Health Records to Achieve Cost Saving Benefits

Ngunyu, Daniel Kanyi 01 January 2018 (has links)
The American Recovery and Reinvestment Act (ARRA) of 2009 authorized the distribution of about $30 billion incentive funds to accelerate electronic health record (EHR) applications to improve the quality of care, safety, privacy, care coordination, and patients' involvement in healthcare. EHR use has the potential of saving $731 in costs for hospitals per patient admission; however, most hospitals are not applying EHR to reach the level at which cost savings are possible. The purpose of this single case study was to explore strategies that IT leaders in hospitals can use to apply EHR to achieve the cost saving benefits. The participants were IT leaders and EHR super users at a large hospital in Texas with successful experience in applying EHR. Information systems success model formed the conceptual framework for the study. I conducted face-to-face interviews and analyzed organizational documents. I used qualitative textual data analysis method to identify themes. Five themes emerged from this study, which are ensuring information quality, ensuring system quality, assuring service quality, promoting usability, and maximizing net benefits of the EHR system. The findings of this study included four strategies to apply EHR; these strategies include engaging training staff, documenting accurately and in a timely manner, protecting patient data, and enforcing organizational best practice policies to maximize reimbursement and cost savings. The findings of this study could contribute to positive social change for the communities because EHR successful application includes lower cost for hospitals that may lead to the provision of affordable care to more low-income patients.
167

The Successful Implementation of Electronic Health Records at Small Rural Hospitals

Richardson, Daniel 01 January 2016 (has links)
Electronic health records (EHRs) have been in use since the 1960s. U.S. rural hospital leaders and administrators face significant pressure to implement health information technology because of the American Recovery and Reinvestment Act of 2009. However, some leaders and managers of small rural hospital lack strategies to develop and implement EHRs. The focus of this descriptive phenomenological study was to explore lived experiences of hospital leaders and administrators who have used successful strategies to implement EHRs in small rural hospitals. Diffusion of innovation theory shaped the theoretical framework of this study. Data were collected through telephone interviews conducted with participants who successfully deployed EHRs at 10 hospitals in the Appalachian regions of Maryland, Virginia, and West Virginia. Data analysis occurred using a modified Husserlian approach in search of common themes from interview transcripts. The main themes were strategies to address standards and incentives, implementation, and challenges. The exploration of these strategies provides insight that small rural hospital leaders and administrators could consider for implementing EHRs. The study findings might enable small rural hospital leaders and administrators to contribute to positive social change by engaging communities in using EHRs; these findings may also expand information sharing among individuals and organizations and build social relationships with an expectation of future benefits. Results from this study are designed to inform other small rural hospital leaders and administrators to conduct further research on successful strategies for implementation of EHRs.
168

Strategies for E-Commerce Platform Adoption in the Manufacturing Sector in Western India

Parikh, Neeraj 01 January 2016 (has links)
While 95% of Indian SME leaders have not adopted an e-commerce platform, the few SME leaders having adopted such platforms reported 64% higher sales and 65% higher profits. The purpose of this multi-case study, guided by the diffusion of innovation (DOI) theory, was to explore the strategies that Indian SME leaders used to adopt e-commerce platforms to expand their businesses. Data for this study emerged from conducting face-to-face, semistructured interviews with 3 SME leaders who operated in the manufacturing industry in western India. The data analysis process included validating, coding, interpreting, and summarizing data and generating themes. Methodological triangulation of data obtained from interviews, observations, and document review resulted in 4 major themes: leveraging the marketplace model, dealing with tedious governmental requirements, finding well-trained employees, and handling fraudulent product returns. The study results may contribute to positive social change in western India by generating greater employment opportunities and increasing e-commerce literacy among online shoppers. Wider e-commerce adoption by SME leaders can generate a large number of employment opportunities for people living in western India resulting in a better quality of life. Increased use of e-commerce activities among online shoppers can result in higher awareness about online frauds, identity theft, malware threats, and overall online security.
169

Health Care Leaders' Experiences of Electronic Medical Record Adoption and Use

Weagraff, Joseph B. 01 January 2016 (has links)
Adoption of electronic medical record (EMR) technology systems of meaningful use has been slow despite the mandate by the U.S. government. The purpose of this single case study was to explore strategies used by health care leaders to implement EMR technology systems of meaningful use to take advantage of federal incentive payments. Diffusion of innovation theory provided the conceptual framework for the study. Semistructured interviews were conducted with 6 health care leaders from a military installation in the Southeast United States. Data were analyzed using software, coding, and inductive analyses. The 3 prominent themes were patient, provider, and champion. Alerts from an EMR technology system can increase providers' awareness and improve patient safety. Providers' involvement in every phase of an EMR system's implementation can improve the adoption rate. Champions play a critical role in successful adoption and implementation of EMR systems. Results of this study may assist health care leaders in implementing EMR systems to take advantage of federal incentive payments. Implications for positive social change include enhanced delivery of safe, high-quality health care.
170

Aligning Social Media, Mobile, Analytics, and Cloud Computing Technologies and Disaster Response

Worthy, William Tuley 01 January 2018 (has links)
After nearly 2 decades of advances in information and communications technologies (ICT) including social media, mobile, analytics, and cloud computing, disaster response agencies in the United States have not been able to improve alignment between ICT-based information and disaster response actions. This grounded theory study explored emergency response ICT managers' understanding of how social media, mobile, analytics, and cloud computing technologies (SMAC) are related to and can inform disaster response strategies. Sociotechnical theory served as the conceptual framework to ground the study. Data were collected from document reviews and semistructured interviews with 9 ICT managers from emergency management agencies in the state of Hawaii who had experience in responding to major disasters. The data were analyzed using open, axial coding, and selective coding. Three elements of a theory emerged from the findings: (a) the ICT managers were hesitant about SMAC technologies replacing first responder's radios to interoperate between emergency response agencies during major disasters, (b) the ICT managers were receptive to converging conventional ICT with SMAC technologies, and (c) the ICT managers were receptive to joining legacy information sharing strategies with new information sharing strategies based on SMAC technologies. The emergent theory offers a framework for aligning SMAC technologies and disaster response strategies. The implications for positive social change include reduced interoperability failures between disaster agencies during major catastrophes, which may lower the risk of casualties and deaths to emergency responders and disaster victims, thus benefiting them and their communities.

Page generated in 0.1175 seconds