Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 15 March 2023

David Orr

Local Safeguarding Adults Board (SAB) policies, procedures, guidance and related documents on self-neglect were gathered and analysed, to map what approaches are being taken…

1371

Abstract

Purpose

Local Safeguarding Adults Board (SAB) policies, procedures, guidance and related documents on self-neglect were gathered and analysed, to map what approaches are being taken across England. This paper aims to identify areas of divergence to highlight innovations or challenges faced by SABs.

Design/methodology/approach

Self-neglect documents were identified by searching SAB websites. Data were extracted into a framework enabling synthesis and comparison between documents.

Findings

This paper reports on how English SAB documentation defines self-neglect, treats executive capacity, lays out pathways for self-neglect cases, advises on refusal of service input and multi-agency coordination and draws on theories or tools. Greater coherence in understanding self-neglect has developed since it was brought within safeguarding in 2014; however, variation remains regarding scope, referral pathways and threshold criteria.

Research limitations/implications

This review was limited to published SAB documentation at one point in time and could not consider either the wider context of safeguarding guidance and training or implementation in practice.

Practical implications

This review provides an overview of how SABs are interpreting national guidance and guiding practitioners. The trends and areas of uncertainty identified offer a resource for informed research and policy-making.

Originality/value

To the best of the author’s knowledge, this is the first systematic survey of SAB self-neglect policies, procedures and guidance since self-neglect was included under safeguarding.

Details

The Journal of Adult Protection, vol. 25 no. 2
Type: Research Article
ISSN: 1466-8203

Keywords

Open Access
Article
Publication date: 27 December 2021

Gabrielle Samuel and Federica Lucivero

In April 2020, it was announced that NHSX, a unit of the UK National Health Service (NHS) responsible for digital innovation, was developing a contact tracing app that would offer…

1199

Abstract

Purpose

In April 2020, it was announced that NHSX, a unit of the UK National Health Service (NHS) responsible for digital innovation, was developing a contact tracing app that would offer a digital solution to managing the COVID-19 pandemic. Despite the urgency with which the app was developed, a clear commitment was made to designing the technology in a way that enshrined key ethical principles, and an ethics advisory board (EAB) was established to provide timely advice, guidance and recommendations on associated ethical issues. Alongside this, there were extensive criticisms of how NHSX adhered to ethical principles in the handling of the app development-criticisms that require empirical exploration. This paper explores how ethics was incorporated into decision-making during governance processes associated with the development of app.

Design/methodology/approach

Interviews were conducted with those involved in the app's development/governance, those with a consulting role associated with the app, or those who sat on the EAB.

Findings

The EAB fulfilled an important role by introducing ethical considerations to app developers. Though at times, it was difficult to accommodate key ethics principles into governance processes, which sometimes suffered from little accountability.

Originality/value

While several articles have provided overviews of ethical issues, or explored public perceptions towards contact tracing apps, to the best the authors, knowledge this is the first empirical piece analysing ethics governance issues via stakeholder interviews.

Details

International Journal of Health Governance, vol. 27 no. 2
Type: Research Article
ISSN: 2059-4631

Keywords

Open Access

Abstract

Details

How Gay Men Prepare for Death
Type: Book
ISBN: 978-1-83909-587-0

Open Access
Book part
Publication date: 4 June 2021

Edgar Pacheco and Neil Melhuish

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization…

Abstract

The nature and extent of adults' engagement in diverse manifestations of technology-facilitated aggression is not yet well understood. Most research has focused on victimization. When explored, engagement in online aggression and abuse has centered on children and young people, particularly in school and higher education settings. Drawing on nationally representative data from New Zealand adults aged 18 and over, this chapter explores the overall prevalence of online aggression with a focus on gender and age. Our findings support the need to also understand adult aggressors' behaviors to better address the distress and harm caused to targets through digital communications. The chapter discusses the implications of the results for policy and practice and proposes some directions for future research.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 17 April 2024

Elham Rostami and Fredrik Karlsson

This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for…

Abstract

Purpose

This paper aims to investigate how congruent keywords are used in information security policies (ISPs) to pinpoint and guide clear actionable advice and suggest a metric for measuring the quality of keyword use in ISPs.

Design/methodology/approach

A qualitative content analysis of 15 ISPs from public agencies in Sweden was conducted with the aid of Orange Data Mining Software. The authors extracted 890 sentences from these ISPs that included one or more of the analyzed keywords. These sentences were analyzed using the new metric – keyword loss of specificity – to assess to what extent the selected keywords were used for pinpointing and guiding actionable advice. Thus, the authors classified the extracted sentences as either actionable advice or other information, depending on the type of information conveyed.

Findings

The results show a significant keyword loss of specificity in relation to pieces of actionable advice in ISPs provided by Swedish public agencies. About two-thirds of the sentences in which the analyzed keywords were used focused on information other than actionable advice. Such dual use of keywords reduces the possibility of pinpointing and communicating clear, actionable advice.

Research limitations/implications

The suggested metric provides a means to assess the quality of how keywords are used in ISPs for different purposes. The results show that more research is needed on how keywords are used in ISPs.

Practical implications

The authors recommended that ISP designers exercise caution when using keywords in ISPs and maintain coherency in their use of keywords. ISP designers can use the suggested metrics to assess the quality of actionable advice in their ISPs.

Originality/value

The keyword loss of specificity metric adds to the few quantitative metrics available to assess ISP quality. To the best of the authors’ knowledge, applying this metric is a first attempt to measure the quality of actionable advice in ISPs.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 29 April 2021

Adalberto Polenghi, Irene Roda, Marco Macchi and Alessandro Pozzetti

The purpose of this work is to investigate industrial asset management (AM) in manufacturing. After depicting gaps for AM in this sector, the role of information as a key…

2281

Abstract

Purpose

The purpose of this work is to investigate industrial asset management (AM) in manufacturing. After depicting gaps for AM in this sector, the role of information as a key dimension is considered to realise a summary of challenges and advices for future development.

Design/methodology/approach

The work is grounded on an extensive systematic literature review. Considering the eligible documents, descriptive statistics are provided and a content analysis is performed, both based on a sector-independent normative-based framework of analysis.

Findings

AM principles, organisation and information are the dimensions defined to group ten areas of interest for AM in manufacturing. Information is the major concern for an effective AM implementation. Moreover, Internet of Things and big data management and analytics, as well as data modelling and ontology engineering, are the major technologies envisioned to advance the implementation of AM in manufacturing.

Research limitations/implications

The identified challenges and advices for future development may serve to stimulate further research on AM in manufacturing, with special focus on information and data management. The sector-independent normative-based framework may also enable to analyse AM in different contexts of application, thus favouring cross-sectorial comparisons.

Originality/value

Industries with higher operational risk, like Oil&Gas and infrastructure, are advanced in AM, while others, like some in manufacturing, are laggard in this respect. This literature review is the first of a kind addressing AM in manufacturing and depicts the state-of-the-art to pave the way for future research and development.

Details

Journal of Quality in Maintenance Engineering, vol. 28 no. 3
Type: Research Article
ISSN: 1355-2511

Keywords

Open Access
Article
Publication date: 14 February 2023

Andreas Flanschger, Rafael Heinzelmann and Martin Messner

This paper examines the governance function that incubators perform for entrepreneurial firms. The authors demonstrate that this governance function has both a consultative and a…

1651

Abstract

Purpose

This paper examines the governance function that incubators perform for entrepreneurial firms. The authors demonstrate that this governance function has both a consultative and a control dimension and illustrate how these are enacted in the interactions between incubators and entrepreneurs. The authors also show how these interactions come into being and how entrepreneurs assess the value of the governance role played by incubators.

Design/methodology/approach

The paper is based on a cross-sectional interview study with entrepreneurs of 21 start-ups that were hosted by three different incubators. The start-ups are all early-stage technology firms. The analysis in the paper follows an inductive approach.

Findings

The authors find that the governance role of incubators is about both consultation and control. Consultative forms of governance include providing input and advice as well as questioning ideas and assumptions. Controlling forms of governance comprise setting targets and tracking progress as well as enforcing structures and documentation. The authors furthermore show that governance episodes are triggered either by the entrepreneurs themselves or by the incubator. In the former case, such episodes are mainly about consultation, while in the latter one, they often have a pronounced control element, which materializes particularly through regularly enforced meetings. Most entrepreneurs seem to appreciate this control element, acknowledging that, in its absence, they would lack the self-discipline of doing some things that need to be done.

Research limitations/implications

This study’s findings extend prior research on inter-organizational relationships and the types of governance mechanisms observed therein. The authors show that a strict separation between actors who offer consultation and those who exercise control is too simplistic. Incubators influence entrepreneurial firms both through consultative and controlling forms of governance. In terms of limitations, this study’s analysis focuses on the perspectives of entrepreneurs, and the authors did not include the perspectives of incubators nor did the authors directly observe meetings between these two parties.

Practical implications

This paper provides examples for how entrepreneurial firms can benefit from being part of an incubator.

Originality/value

This study contributes to the discussion of the governance of inter-organizational relationships by focusing on incubators. In so doing, the authors also complement extant literature on management control in entrepreneurial settings by showing how the incubator fulfills a control function for entrepreneurs before these implement control mechanisms themselves.

Details

Accounting, Auditing & Accountability Journal, vol. 36 no. 9
Type: Research Article
ISSN: 0951-3574

Keywords

Open Access
Article
Publication date: 13 February 2023

Elham Rostami, Fredrik Karlsson and Shang Gao

This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).

1205

Abstract

Purpose

This paper aims to propose a conceptual model of policy components for software that supports modularizing and tailoring of information security policies (ISPs).

Design/methodology/approach

This study used a design science research approach, drawing on design knowledge from the field of situational method engineering. The conceptual model was developed as a unified modeling language class diagram using existing ISPs from public agencies in Sweden.

Findings

This study’s demonstration as proof of concept indicates that the conceptual model can be used to create free-standing modules that provide guidance about information security in relation to a specific work task and that these modules can be used across multiple tailored ISPs. Thus, the model can be considered as a step toward developing software to tailor ISPs.

Research limitations/implications

The proposed conceptual model bears several short- and long-term implications for research. In the short term, the model can act as a foundation for developing software to design tailored ISPs. In the long term, having software that enables tailorable ISPs will allow researchers to do new types of studies, such as evaluating the software's effectiveness in the ISP development process.

Practical implications

Practitioners can use the model to develop software that assist information security managers in designing tailored ISPs. Such a tool can offer the opportunity for information security managers to design more purposeful ISPs.

Originality/value

The proposed model offers a detailed and well-elaborated starting point for developing software that supports modularizing and tailoring of ISPs.

Details

Information & Computer Security, vol. 31 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 26 March 2019

Renu Isidore R. and Christie P.

The purpose of this paper is to test the relationship between the annual income earned by the investors and eight behavioural biases exhibited by the investors such as mental…

10035

Abstract

Purpose

The purpose of this paper is to test the relationship between the annual income earned by the investors and eight behavioural biases exhibited by the investors such as mental accounting, anchoring, gambler’s fallacy, availability, loss aversion, regret aversion, representativeness and overconfidence.

Design/methodology/approach

The relationship is derived based on a questionnaire survey conducted on 436 secondary equity investors residing in Chennai, India.

Findings

Analysis of variance test was performed on the normalised and non-normalised version of the biases divided in terms of the annual income earned by the investor. The test found that for the significant biases except the overconfidence bias, the investors with higher annual income were less prone to the biases when compared to investors with lower annual income. On the other hand, with respect to the overconfidence bias, the investors with higher annual income were prone to exhibit overconfidence bias when compared to the investors with lower annual income. Correlation analysis showed that the investors with high annual income were more likely to exhibit higher overconfidence bias but lower representativeness, loss aversion, availability and mental accounting biases.

Originality/value

A contribution in the financial and economic front which would benefit the financial advisors to now consider the income earned by the clients as an important factor while giving financial advice to the clients and while guiding them about the biases they are prone to exhibit.

Details

Journal of Economics, Finance and Administrative Science, vol. 24 no. 47
Type: Research Article
ISSN: 2077-1886

Keywords

Open Access
Book part
Publication date: 1 October 2018

Harald Hornmoen and Colin McInnes

The chapter provides recommendations for key communicators’ social media use during pandemic threats. Recommendations are based on findings from two sets of case studies during…

Abstract

The chapter provides recommendations for key communicators’ social media use during pandemic threats. Recommendations are based on findings from two sets of case studies during the 2014–2015 outbreak of Ebola in West Africa: the use by authorities in UK and Norway during the 2014–2015 West African Ebola outbreak; and the use by established media in the UK.

Details

Social Media Use in Crisis and Risk Communication
Type: Book
ISBN: 978-1-78756-269-1

Keywords

1 – 10 of over 1000