Search results

1 – 10 of over 8000
Content available
Article
Publication date: 6 December 2023

Lisa Maria Beethoven Steene, Lisa Gaylor and Jane L. Ireland

The current review aims to focus on how risk and protective factors for self-harm in secure mental health hospitals are captured in the literature.

Abstract

Purpose

The current review aims to focus on how risk and protective factors for self-harm in secure mental health hospitals are captured in the literature.

Design/methodology/approach

Fifty-seven articles were included in a systematic review, drawn from an initial 1,119 articles, post duplicate removal. Databases included Psycinfo, Psycarticles, Psycnet, Web of Science and EBSCO host. A thematic analysis was used, which included a meta-ethnographic approach for considering qualitative papers.

Findings

There was a clear focus on risk factors, with eight identified (in order of occurrence): raised emotional reactivity and poor emotion regulation; poor mental health; traumatic experiences; personality disorder diagnosis and associated traits; increased use of outward aggression – dual harm; constraints of a secure environment and lack of control; previous self-harm and suicide attempts; and hopelessness. Protective factors featured less, resulting in only three themes emerging (in order of occurrence): positive social support and communication; positive coping skills; and hope/positive outlook.

Research limitations/implications

This includes a proposal to move focus away from “risk” factors, to incorporate “needs”, in terms of individual and environmental factors. There is also a need for more attention to focus on developing high quality research in this area.

Originality/value

The research captures an area where a synthesis of research has not been comprehensively undertaken, particularly with regards to capturing protective as well as risk factors.

Details

Journal of Aggression, Conflict and Peace Research, vol. 16 no. 2
Type: Research Article
ISSN: 1759-6599

Keywords

Open Access
Article
Publication date: 12 September 2023

Santosh Kumar Das

This paper aims to analyse trends and determinants of NPAs in India's banks. It has empirically examined the bank-specific determinants of NPAs.

4648

Abstract

Purpose

This paper aims to analyse trends and determinants of NPAs in India's banks. It has empirically examined the bank-specific determinants of NPAs.

Design/methodology/approach

An FE panel estimation of a sample of 44 banks was carried out for the post-crisis time period, from 2010 to 2020 to identify the bank-specific determinants of NPAs. The sample of 44 banks includes 20 PSBs, 19 private banks and 5 foreign banks. Separate FE estimation was also carried out to identify the drivers of NPAs in PSBs.

Findings

The determinant of NPAs during the post-crisis period suggests that faulty earning management and deterioration in loan quality have resulted in high NPAs in India's banks. The result is similar for PSBs as well.

Research limitations/implications

The findings of the study suggest that the banks, especially the Public Sector Banks (PSBs) need to revisit their earning management strategies to maximise income and improve their loan quality in order to reduce the incidence of loan failure.

Originality/value

The paper contributes by empirically analysing the determinants of NPAs during the recent decade, between 2010 and 2020. Separate estimations have been carried out to understand whether the drivers of NPAs differ in the case of PSBs.

Details

Journal of Money and Business, vol. 3 no. 2
Type: Research Article
ISSN: 2634-2596

Keywords

Article
Publication date: 22 July 2024

Sunaina Kanojia and Shasta Gupta

This study aims to analyse the outcomes of Indian insolvency proceedings for their ex-post economic efficiency. Ideally, insolvent yet viable companies should witness resolution…

Abstract

Purpose

This study aims to analyse the outcomes of Indian insolvency proceedings for their ex-post economic efficiency. Ideally, insolvent yet viable companies should witness resolution, whereas insolvent-unviable companies should be liquidated. This study aims to ascertain the key forces that ensure or prevent the application of the first part of this maxim in practice.

Design/methodology/approach

The study uses logistic regression on a sample of 320 corporate insolvencies (out of 942 insolvencies) reported under the Insolvency and Bankruptcy Code (IBC), 2016. Two-stage least squares regression is used to check endogeneity issues.

Findings

The results claim high levels of rationality from the financial creditors and acceptable levels of viability from the plan proposers for precluding liquidation of insolvent yet viable companies. The findings reveal that an excess of value from resolution over that from liquidation, controls the outcomes of insolvency proceedings. Further examinations indicate that financial creditors’ focus on upfront recovery prevents them from judging the plans on other viability-related factors. Based on the findings, this study recommends that IBC must focus on the importance of both long-term recovery rates and resolution.

Originality/value

To the best of the authors’ knowledge, this is one of the first studies to empirically analyse Type 2 efficiency-related errors prevalent in the Indian insolvency proceedings since the enactment of its new code. The empirical explorations offered in this research can prove to be unique for policy-making.

Details

International Journal of Law and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1754-243X

Keywords

Article
Publication date: 20 January 2022

Etienne Harb, Rim El Khoury, Nadia Mansour and Rima Daou

The credit crunch of 2008 and recent COVID-19 influences underscored the importance of liquidity and credit risk management in businesses and financial institutions. The purpose…

1811

Abstract

Purpose

The credit crunch of 2008 and recent COVID-19 influences underscored the importance of liquidity and credit risk management in businesses and financial institutions. The purpose of this study is to investigate the impact of liquidity risk and credit risk management on accounting and market performances of banks operating in the Middle East and North Africa (MENA) region.

Design/methodology/approach

This study uses a panel data regression analysis on a sample of 51 listed commercial banks operating in 10 MENA countries during the period 2010–2018.

Findings

The results show that credit risk management does not affect the accounting performance of banks, while it has a non-linear, convex relationship with market performance. Surprisingly, liquidity risk management is not a significant driver for either performance measure in studied banks. However, when a bank combines credit risk management with liquidity risk management efforts, liquidity risk management actions return significant results on both performances, illustrated by an inverted U-shaped relationship. In addition, this study examines the joint impact of both risks on bank performance. This study reveals that accounting and market performances are differently affected by joint risk management efforts. Their impact depends on the combination of risk management ratios upon which banks choose to focus their efforts.

Practical implications

The findings help bankers and regulators further consider non-linearities and offer them new tools for managing the impact of credit and liquidity risk interactions towards achieving more financial stability.

Originality/value

These results contribute to traditional banking in offering bankers and regulators new tools for managing the impact of credit and liquidity risk interactions on bank performance.

Details

Journal of Financial Reporting and Accounting, vol. 21 no. 5
Type: Research Article
ISSN: 1985-2517

Keywords

Article
Publication date: 8 February 2024

Yara Levtova, Irma Melunovic, Caroline Louise Mead and Jane L. Ireland

This preliminary investigation aims to examine the psychological impact of the COVID-19 pandemic on patients and staff within a high secure service.

Abstract

Purpose

This preliminary investigation aims to examine the psychological impact of the COVID-19 pandemic on patients and staff within a high secure service.

Design/methodology/approach

To discern the connection between COVID-19-related distress and multiple factors, the study involved 31 patients and 34 staff who completed assessments evaluating coping strategies, resilience, emotional reactivity, ward atmosphere and work-related aspects.

Findings

Results demonstrated that around a third of staff (31.2%) experienced COVID-19-related distress levels that met the clinical cut-off for possible post-traumatic stress disorder. Emotional reactivity, staff shortages, secondary traumatic stress and coping strategies were all positively correlated with COVID-19-related-distress. Resilience was negatively associated with distress, thus acting as a potential mitigating factor. In comparison, the prevalence of distress among patients was low (3.2%).

Practical implications

The authors postulate that increased staff burdens during the pandemic may have led to long-term distress, while their efforts to maintain minimal service disruption potentially shielded patients from psychological impacts, possibly lead to staff “problem-focused coping burnout”. This highlights the need for in-depth research on the enduring impacts of pandemics, focusing on mechanisms that intensify or alleviate distress. Future studies should focus on identifying effective coping strategies for crisis situations, such as staff shortages, and strategies for post-crisis staff support.

Originality/value

The authors postulate that the added burdens on staff during the pandemic might have contributed to their distress. Nonetheless, staff might have inadvertently safeguarded patients from the pandemic’s psychological ramifications by providing a “service of little disruption”, potentially leading to “problem-focused coping burnout”. These findings underscore the imperative for further research capturing the enduring impacts of pandemics, particularly scrutinising factors that illuminate the mechanisms through which distress is either intensified or alleviated across different groups. An avenue worth exploring is identifying effective coping styles for pandemics.

Details

The Journal of Forensic Practice, vol. 26 no. 1
Type: Research Article
ISSN: 2050-8794

Keywords

Article
Publication date: 2 May 2024

Sophie Wood, Annie Williams, Nell Warner, Helen Ruth Hodges, Aimee Cummings and Donald Forrester

Secure children’s homes (SCHs) restrict the liberty of young people considered to be a danger to themselves or others. However, not all young people referred to SCHs find a…

Abstract

Purpose

Secure children’s homes (SCHs) restrict the liberty of young people considered to be a danger to themselves or others. However, not all young people referred to SCHs find a placement, and little is known about the outcomes of the young person after an SCH or alternative placement. The purpose of this paper is to understand which characteristics most likely predict allocation to an SCH placement, and to explore the outcomes of the young people in the year after referral.

Design/methodology/approach

A retrospective electronic cohort study was conducted using linked social care data sets in England. The study population was all young people from England referred to SCHs for welfare reasons between 1st October 2016 to 31st March 2018 (n = 527). Logistic regression tested for differences in characteristics of SCH placement allocation and outcomes in the year after referral.

Findings

In total, 60% of young people referred to an SCH were allocated a place. Factors predicting successful or unsuccessful SCH allocation were previous placement in an SCH (OR = 2.12, p = 0.01); being female (OR = 2.26, p = 0.001); older age (OR = 0.75, p = 0.001); and a history of challenging behaviour (OR = 0.34, p = 0.01). In the year after referral, there were little differences in outcomes between young people placed in a SCH versus alternative accommodation.

Originality/value

The study raised concerns about the capacity of current services to recognise and meet the needs of this complex and vulnerable group of young people and highlights the necessity to explore and evaluate alternatives to SCHs.

Details

Journal of Children's Services, vol. 19 no. 2
Type: Research Article
ISSN: 1746-6660

Keywords

Article
Publication date: 25 June 2024

Amruta Chandrakant Amune and Himangi Pande

Security is the major issue that motivates multiple scholars to discover security solutions apart from the advantages of wireless sensor networks (WSN) such as strong…

Abstract

Purpose

Security is the major issue that motivates multiple scholars to discover security solutions apart from the advantages of wireless sensor networks (WSN) such as strong compatibility, flexible communication and low cost. However, there exist a few challenges, such as the complexity of choosing the expected cluster, communication overhead, routing selection and the energy level that affects the entire communication. The ultimate aim of the research is to secure data communication in WSN using prairie indica optimization.

Design/methodology/approach

Initially, the network simulator sets up clusters of sensor nodes. The simulator then selects the Cluster Head and optimizes routing using an advanced Prairie Indica Optimization algorithm to find the most efficient communication paths. Sensor nodes collect data, which is securely transmitted to the base station. By applying prairie indica optimization to WSNs, optimize key aspects of data communication, including secure routing and encryption, to protect sensitive information from potential threats.

Findings

The Prairie Indica Optimization, as proposed, achieves impressive results for networks comprising 50 nodes, with delay, energy and throughput values of 77.39 ms, 21.68 J and 22.59 bps. In the case of 100-node networks, the achieved values are 80.95 ms, 27.74 J and 22.03 bps, significantly surpassing the performance of current techniques. These outcomes underscore the substantial improvements brought about by the Prairie Indica Optimization in enhancing WSN data communication.

Originality/value

In this research, the Prairie Indica Optimization is designed to enhance the security of data communication within WSN.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 12 July 2023

Karen Humphries, Caroline Clarke, Kate Willoughby and Jake Smithson

The purpose of this paper is to develop an understanding of the experience of secure care from the patients’ perspective.

Abstract

Purpose

The purpose of this paper is to develop an understanding of the experience of secure care from the patients’ perspective.

Design/methodology/approach

A systematic review of qualitative literature was conducted. The data was sourced from the electronic databases: PsychINFO, CINAHL, Medline and the Web of Science Core Collection using pre-defined search terms. A total of 17 studies, conducted in various countries worldwide and covering high, medium and low secure inpatient settings, were included for review. The analysis involved integrating findings from across the literature and was guided by thematic synthesis.

Findings

A total of eight themes were generated from the data, three of which provided an understanding of the experience of forensic secure care, and the remaining five themes provided an understanding of the factors which may influence the experience of secure care.

Practical implications

Developing understanding of patient experience can lead to service improvements, potentially impacting patients’ motivation and engagement and thus reducing admission times, potential recalls and recidivism.

Originality/value

To the best of the authors’ knowledge, this is the first systematic review to date to exclusively explore the broad topic of the patient experience of secure mental health care.

Details

The Journal of Forensic Practice, vol. 25 no. 4
Type: Research Article
ISSN: 2050-8794

Keywords

Article
Publication date: 7 May 2024

Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…

Abstract

Purpose

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.

Design/methodology/approach

Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.

Findings

The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.

Research limitations/implications

Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.

Social implications

The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.

Originality/value

The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.

Details

Aircraft Engineering and Aerospace Technology, vol. 96 no. 7
Type: Research Article
ISSN: 1748-8842

Keywords

Open Access
Book part
Publication date: 30 November 2023

Pedro Pineda

I historically compare changes in institutional frameworks creating academic positions linked to temporary employment by analyzing university employment statistics in Chile…

Abstract

I historically compare changes in institutional frameworks creating academic positions linked to temporary employment by analyzing university employment statistics in Chile, Colombia, Germany, and the USA. I find that temporary academic positions were institutionalized through the creation of previously inexistent academic categories called a contrata in Chile, de cátedra in Colombia, “junior professor” without tenure in Germany and “postdoc” in the USA; used in higher education and employment laws since 1989, 1992, 2002, and 1974, respectively. Under institutional frameworks demanding the maximization of students and research, universities have increasingly contracted academics through temporary contracts under rationales that differ between regions. In Colombia and Chile, public university leaders and owners of private universities contract such teaching positions to expand student numbers through lowering costs. In Germany and the USA, employment insecurity is mostly driven by temporary scientific positions under a main rationale of scientific expansion. The share of temporary positions has increased exponentially in Colombia and Germany in recent decades, whereas in the USA there has only been an increase since 2012. Moreover, in Chile, the share of permanent positions has decreased since 2012. The common trend is one of isomorphism of vertical academic structures sharing a pyramidal form, with a wide base of academics working under conditions of contractual insecurity. Such trends follow a rationale for maximization of student numbers as well as administration, and scientific production that is in tension with prioritizing wellbeing and improvement of academics’ working conditions. Yet, in these environments, the institution of tenure in the USA and recent Chilean regulations on accreditation represent mechanisms counteracting precarious employment.

Details

University Collegiality and the Erosion of Faculty Authority
Type: Book
ISBN: 978-1-80455-814-0

Keywords

1 – 10 of over 8000