Search results
1 – 10 of over 1000Local Safeguarding Adults Board (SAB) policies, procedures, guidance and related documents on self-neglect were gathered and analysed, to map what approaches are being taken…
Abstract
Purpose
Local Safeguarding Adults Board (SAB) policies, procedures, guidance and related documents on self-neglect were gathered and analysed, to map what approaches are being taken across England. This paper aims to identify areas of divergence to highlight innovations or challenges faced by SABs.
Design/methodology/approach
Self-neglect documents were identified by searching SAB websites. Data were extracted into a framework enabling synthesis and comparison between documents.
Findings
This paper reports on how English SAB documentation defines self-neglect, treats executive capacity, lays out pathways for self-neglect cases, advises on refusal of service input and multi-agency coordination and draws on theories or tools. Greater coherence in understanding self-neglect has developed since it was brought within safeguarding in 2014; however, variation remains regarding scope, referral pathways and threshold criteria.
Research limitations/implications
This review was limited to published SAB documentation at one point in time and could not consider either the wider context of safeguarding guidance and training or implementation in practice.
Practical implications
This review provides an overview of how SABs are interpreting national guidance and guiding practitioners. The trends and areas of uncertainty identified offer a resource for informed research and policy-making.
Originality/value
To the best of the author’s knowledge, this is the first systematic survey of SAB self-neglect policies, procedures and guidance since self-neglect was included under safeguarding.
Details
Keywords
Gabrielle Samuel and Federica Lucivero
In April 2020, it was announced that NHSX, a unit of the UK National Health Service (NHS) responsible for digital innovation, was developing a contact tracing app that would offer…
Abstract
Purpose
In April 2020, it was announced that NHSX, a unit of the UK National Health Service (NHS) responsible for digital innovation, was developing a contact tracing app that would offer a digital solution to managing the COVID-19 pandemic. Despite the urgency with which the app was developed, a clear commitment was made to designing the technology in a way that enshrined key ethical principles, and an ethics advisory board (EAB) was established to provide timely advice, guidance and recommendations on associated ethical issues. Alongside this, there were extensive criticisms of how NHSX adhered to ethical principles in the handling of the app development-criticisms that require empirical exploration. This paper explores how ethics was incorporated into decision-making during governance processes associated with the development of app.
Design/methodology/approach
Interviews were conducted with those involved in the app's development/governance, those with a consulting role associated with the app, or those who sat on the EAB.
Findings
The EAB fulfilled an important role by introducing ethical considerations to app developers. Though at times, it was difficult to accommodate key ethics principles into governance processes, which sometimes suffered from little accountability.
Originality/value
While several articles have provided overviews of ethical issues, or explored public perceptions towards contact tracing apps, to the best the authors, knowledge this is the first empirical piece analysing ethics governance issues via stakeholder interviews.
Details
Keywords
Edgar Pacheco and Neil Melhuish
The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization…
Abstract
The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support the need to also understand adult aggressors' behaviors to better address the distress and harm caused to targets through digital communications. The chapter discusses the implications of the results for policy and practice and proposes some directions for future research.
Details
Keywords
Elham Rostami and Fredrik Karlsson
This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for…
Abstract
Purpose
This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for measuring the quality of keyword use in ISPs.
Design/methodology/approach
A qualitative content analysis of 15 ISPs from public agencies in Sweden was conducted with the aid of Orange Data Mining Software. The authors extracted 890 sentences from these ISPs that included one or more of the analyzed keywords. These sentences were analyzed using the new metric – keyword loss of specificity – to assess to what extent the selected keywords were used for pinpointing and guiding actionable advice. Thus, the authors classified the extracted sentences as either actionable advice or other information, depending on the type of information conveyed.
Findings
The results show a significant keyword loss of specificity in relation to pieces of actionable advice in ISPs provided by Swedish public agencies. About two-thirds of the sentences in which the analyzed keywords were used focused on information other than actionable advice. Such dual use of keywords reduces the possibility of pinpointing and communicating clear, actionable advice.
Research limitations/implications
The suggested metric provides a means to assess the quality of how keywords are used in ISPs for different purposes. The results show that more research is needed on how keywords are used in ISPs.
Practical implications
The authors recommended that ISP designers exercise caution when using keywords in ISPs and maintain coherency in their use of keywords. ISP designers can use the suggested metrics to assess the quality of actionable advice in their ISPs.
Originality/value
The keyword loss of specificity metric adds to the few quantitative metrics available to assess ISP quality. To the best of the authors’ knowledge, applying this metric is a first attempt to measure the quality of actionable advice in ISPs.
Details
Keywords
Adalberto Polenghi, Irene Roda, Marco Macchi and Alessandro Pozzetti
The purpose of this work is to investigate industrial asset management (AM) in manufacturing. After depicting gaps for AM in this sector, the role of information as a key…
Abstract
Purpose
The purpose of this work is to investigate industrial asset management (AM) in manufacturing. After depicting gaps for AM in this sector, the role of information as a key dimension is considered to realise a summary of challenges and advices for future development.
Design/methodology/approach
The work is grounded on an extensive systematic literature review. Considering the eligible documents, descriptive statistics are provided and a content analysis is performed, both based on a sector-independent normative-based framework of analysis.
Findings
AM principles, organisation and information are the dimensions defined to group ten areas of interest for AM in manufacturing. Information is the major concern for an effective AM implementation. Moreover, Internet of Things and big data management and analytics, as well as data modelling and ontology engineering, are the major technologies envisioned to advance the implementation of AM in manufacturing.
Research limitations/implications
The identified challenges and advices for future development may serve to stimulate further research on AM in manufacturing, with special focus on information and data management. The sector-independent normative-based framework may also enable to analyse AM in different contexts of application, thus favouring cross-sectorial comparisons.
Originality/value
Industries with higher operational risk, like Oil&Gas and infrastructure, are advanced in AM, while others, like some in manufacturing, are laggard in this respect. This literature review is the first of a kind addressing AM in manufacturing and depicts the state-of-the-art to pave the way for future research and development.
Details
Keywords
Andreas Flanschger, Rafael Heinzelmann and Martin Messner
This paper examines the governance function that incubators perform for entrepreneurial firms. The authors demonstrate that this governance function has both a consultative and a…
Abstract
Purpose
This paper examines the governance function that incubators perform for entrepreneurial firms. The authors demonstrate that this governance function has both a consultative and a control dimension and illustrate how these are enacted in the interactions between incubators and entrepreneurs. The authors also show how these interactions come into being and how entrepreneurs assess the value of the governance role played by incubators.
Design/methodology/approach
The paper is based on a cross-sectional interview study with entrepreneurs of 21 start-ups that were hosted by three different incubators. The start-ups are all early-stage technology firms. The analysis in the paper follows an inductive approach.
Findings
The authors find that the governance role of incubators is about both consultation and control. Consultative forms of governance include providing input and advice as well as questioning ideas and assumptions. Controlling forms of governance comprise setting targets and tracking progress as well as enforcing structures and documentation. The authors furthermore show that governance episodes are triggered either by the entrepreneurs themselves or by the incubator. In the former case, such episodes are mainly about consultation, while in the latter one, they often have a pronounced control element, which materializes particularly through regularly enforced meetings. Most entrepreneurs seem to appreciate this control element, acknowledging that, in its absence, they would lack the self-discipline of doing some things that need to be done.
Research limitations/implications
This study’s findings extend prior research on inter-organizational relationships and the types of governance mechanisms observed therein. The authors show that a strict separation between actors who offer consultation and those who exercise control is too simplistic. Incubators influence entrepreneurial firms both through consultative and controlling forms of governance. In terms of limitations, this study’s analysis focuses on the perspectives of entrepreneurs, and the authors did not include the perspectives of incubators nor did the authors directly observe meetings between these two parties.
Practical implications
This paper provides examples for how entrepreneurial firms can benefit from being part of an incubator.
Originality/value
This study contributes to the discussion of the governance of inter-organizational relationships by focusing on incubators. In so doing, the authors also complement extant literature on management control in entrepreneurial settings by showing how the incubator fulfills a control function for entrepreneurs before these implement control mechanisms themselves.
Details
Keywords
Elham Rostami, Fredrik Karlsson and Shang Gao
This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).
Abstract
Purpose
This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).
Design/methodology/approach
This study used a design science research approach, drawing on design knowledge from the field of situational method engineering. The conceptual model was developed as a unified modeling language class diagram using existing ISPs from public agencies in Sweden.
Findings
This study’s demonstration as proof of concept indicates that the conceptual model can be used to create free-standing modules that provide guidance about information security in relation to a specific work task and that these modules can be used across multiple tailored ISPs. Thus, the model can be considered as a step toward developing software to tailor ISPs.
Research limitations/implications
The proposed conceptual model bears several short- and long-term implications for research. In the short term, the model can act as a foundation for developing software to design tailored ISPs. In the long term, having software that enables tailorable ISPs will allow researchers to do new types of studies, such as evaluating the software's effectiveness in the ISP development process.
Practical implications
Practitioners can use the model to develop software that assist information security managers in designing tailored ISPs. Such a tool can offer the opportunity for information security managers to design more purposeful ISPs.
Originality/value
The proposed model offers a detailed and well-elaborated starting point for developing software that supports modularizing and tailoring of ISPs.
Details
Keywords
Renu Isidore R. and Christie P.
The purpose of this paper is to test the relationship between the annual income earned by the investors and eight behavioural biases exhibited by the investors such as mental…
Abstract
Purpose
The purpose of this paper is to test the relationship between the annual income earned by the investors and eight behavioural biases exhibited by the investors such as mental accounting, anchoring, gambler’s fallacy, availability, loss aversion, regret aversion, representativeness and overconfidence.
Design/methodology/approach
The relationship is derived based on a questionnaire survey conducted on 436 secondary equity investors residing in Chennai, India.
Findings
Analysis of variance test was performed on the normalised and non-normalised version of the biases divided in terms of the annual income earned by the investor. The test found that for the significant biases except the overconfidence bias, the investors with higher annual income were less prone to the biases when compared to investors with lower annual income. On the other hand, with respect to the overconfidence bias, the investors with higher annual income were prone to exhibit overconfidence bias when compared to the investors with lower annual income. Correlation analysis showed that the investors with high annual income were more likely to exhibit higher overconfidence bias but lower representativeness, loss aversion, availability and mental accounting biases.
Originality/value
A contribution in the financial and economic front which would benefit the financial advisors to now consider the income earned by the clients as an important factor while giving financial advice to the clients and while guiding them about the biases they are prone to exhibit.
Details
Keywords
Harald Hornmoen and Colin McInnes
The chapter provides recommendations for key communicators’ social media use during pandemic threats. Recommendations are based on findings from two sets of case studies during…
Abstract
The chapter provides recommendations for key communicators’ social media use during pandemic threats. Recommendations are based on findings from two sets of case studies during the 2014–2015 outbreak of Ebola in West Africa: the use by authorities in UK and Norway during the 2014–2015 West African Ebola outbreak; and the use by established media in the UK.
Details