Search results

1 – 10 of 49
Open Access
Article
Publication date: 3 June 2022

Rebecca Jane Quew-Jones and Lisa Rowe

Educational policy instruments such as apprenticeship levy and forthcoming lifetime skills guarantee are creating unprecedented opportunities for rapid growth in a range of…

2298

Abstract

Purpose

Educational policy instruments such as apprenticeship levy and forthcoming lifetime skills guarantee are creating unprecedented opportunities for rapid growth in a range of work-based learning (WBL) programmes, requiring increasingly complex levels of collaboration between providers and employers. Apprenticeships require providers to assume responsibility in ensuring apprentices’ work-based managers and mentors (WBMMs) are equipped to provide effective support to individuals as they learn ‘on the job’. After six years of higher education institution (HEI) apprenticeship curriculum delivery, there is opportunity to examine existing WBMM practice to inform the design, content and delivery of a shared knowledge base via a practical interactive toolkit. By developing clearer understanding of WBMMs’ experiences, expectations and challenges, the study aims to reduce potential gaps in knowledge and skills and encourage more effective collaboration between employers and providers to better support apprentices as they progress through WBL programmes.

Design/methodology/approach

This paper discusses evolution of higher level and degree apprenticeships, explores guidance for WBMMs and investigates the influence of expectations and motivations of WBMMS. Theoretical and conceptual foundations relating to WBL programme delivery and WBMM role are analysed and discussed. Qualitative data drawn from semi-structured surveys are analysed thematically to investigate common patterns, clarify understanding and identify development areas to inform future university provider and employer practice.

Findings

The findings suggest a number of themes to improve apprentice management; further clarity of WBMMs role, greater involvement of WBMM’s for negotiated learning, unplanned experiences do add value and scope for richer mentoring dialogues. WBL value for WBMMs is broader than expected, incorporating apprentice performance and output improvements, and solving complex problems.

Research limitations/implications

The research is drawn from an established university with five years of experience. However, the context in which programmes are delivered significantly varies according to providers and employers. This means factors other than those highlighted in this paper may continue to emerge as the research in this field develops.

Practical implications

The practical implications from findings can be used to cultivate stronger collaboration, providing a foundation of knowledge intended to provoke further dialogue regarding content for an interactive toolkit. The findings signal the need for further resources, a review of the restrictions associated with levy funding for co-creation of a more effective national apprenticeship framework.

Originality/value

This paper builds on a limited body of research examining employers’ perspectives of apprenticeship management. Degree apprenticeships have attracted limited scholarly attention over six years since their inception (Bowman, 2022) resulting in a significant paucity of research that focuses upon employer role. This study addresses this void by exploring WBMMs experiences, requirements and expectations, revealing new insights for providers of WBL, employers and individuals employed as WBMMs.

Details

Journal of Work-Applied Management, vol. 14 no. 2
Type: Research Article
ISSN: 2205-2062

Keywords

Open Access
Article
Publication date: 2 January 2018

Michele S.Y. Kok, Mat Jones, Emma Solomon-Moore and Jane R. Smith

The quality of voluntary sector-led community health programmes is an important concern for service users, providers and commissioners. Research on the fidelity of programme…

1570

Abstract

Purpose

The quality of voluntary sector-led community health programmes is an important concern for service users, providers and commissioners. Research on the fidelity of programme implementation offers a basis for assessing and further enhancing practice. The purpose of this paper is to report on the fidelity assessment of Living Well Taking Control (LWTC) – a voluntary sector-led, community-based education programme in England focussing on the prevention and management of type 2 diabetes.

Design/methodology/approach

This fidelity of implementation (FoI) study was conducted with the Devon-based LWTC programme. A fidelity checklist was developed to analyse audio records of group-based lifestyle education sessions – implementation was rated in terms of adherence to protocol and competence in delivery; the influence of wider contextual factors was also assessed. Kappa statistics (κ) were used to test for inter-rater agreement. Course satisfaction data were used as a supplementary indicator of facilitator competence.

Findings

Analysis of 28 sessions, from five diabetes prevention and two diabetes management groups (total participants, n=49), yielded an overall implementation fidelity score of 77.3 per cent for adherence (moderate inter-rater agreement, κ=0.60) and 95.1 per cent for competence (good inter-rater agreement, κ=0.71). The diabetes prevention groups consistently achieved higher adherence scores than the diabetes management groups. Facilitator competence was supported by high participant satisfaction ratings.

Originality/value

An appropriate level of implementation fidelity was delivered for the LWTC group-based education programme, which provides some confidence that outcomes from the programme reflected intervention effectiveness. This study demonstrates the viability of assessing the FoI in a voluntary sector-led public health initiative and the potential of this method for assuring quality and informing service development.

Details

Health Education, vol. 118 no. 1
Type: Research Article
ISSN: 0965-4283

Keywords

Open Access
Book part
Publication date: 4 June 2021

Suzie Dunn

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United…

Abstract

When discussing the term “technology-facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United Nations' Convention on the Elimination of All Forms of Discrimination against Women (United Nations General Assembly, 1979), have long recognized emotional and psychological abuse as forms of violence, including many forms of technology-facilitated abuse (United Nations, 2018), law makers and the general public continue to grapple with the question of whether certain harmful technology-facilitated behaviors are actually forms of violence. This chapter explores this question in two parts. First, it reviews three theoretical concepts of violence and examines how these concepts apply to technology-facilitated behaviors. In doing so, this chapter aims to demonstrate how some harmful technology-facilitated behaviors fit under the greater conceptual umbrella of violence. Second, it examines two recent cases, one from the British Columbia Court of Appeal (BCCA) in Canada and a Romanian case from the European Court of Human Rights (ECtHR), that received attention for their legal determinations on whether to define harmful technology-facilitated behaviors as forms of violence or not. This chapter concludes with observations on why we should conceptualize certain technology-facilitated behaviors as forms of violence.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 31 May 2021

Anna-Maija Multas and Noora Hirvonen

This study examines the information literacy practices of young video bloggers, focusing on the ways in which they construct their cognitive authority through a health-related…

2572

Abstract

Purpose

This study examines the information literacy practices of young video bloggers, focusing on the ways in which they construct their cognitive authority through a health-related information creation process.

Design/methodology/approach

This study draws upon socially oriented information literacy research and nexus analysis as its methodological framework. Data, including YouTube videos, theme interviews and video diaries, were collected with three Finnish video bloggers and qualitatively analysed using nexus analytical concepts to describe the central elements of social action.

Findings

The study shows that video bloggers employ several information practices during the information creation process, including planning, information-seeking, organization, editing and presentation of information. They construct their cognitive authority in relation to their anticipated audience by grounding it on different types of information: experience-based, embodied and scientific. Trustworthiness, emphasized with authenticity and genuineness, and competence, based on experience, expertise and second-hand information, were recognized as key components of credibility in this context.

Originality/value

This study increases the understanding of the complex ways in which young people create information on social media and influence their audiences. The study contributes to information literacy research by offering insights into the under-researched area of information creation. It is among the few studies to examine cognitive authority construction in the information creation process. The notion of authority as constructed through trustworthiness and competence and grounded on different types of information, can be taken into account in practice by information professionals and educators when planning information literacy instruction.

Details

Journal of Documentation, vol. 78 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 11 January 2022

Peter Tiernan and Jane O’Kelly

The purpose of this paper is to examine the attitudes and impressions of pre-service Further Education teachers towards enterprise education. It also looks at the potential impact…

1612

Abstract

Purpose

The purpose of this paper is to examine the attitudes and impressions of pre-service Further Education teachers towards enterprise education. It also looks at the potential impact on their future teaching practices and aspirations. This study builds on the literature in this area by bringing a teacher education focus and by providing views from the underserved further education sector.

Design/methodology/approach

A qualitative research approach was used to evaluate pre-service further education teachers' understanding of and attitudes towards, enterprise education. Data were collected through semi-structured interviews with 15 students in their final year of an initial teacher education degree.

Findings

Findings emerged through constant comparative analysis of interview transcripts. These findings indicate that exposure to enterprise education greatly increased understanding of its importance and relevance, while also encouraging pre-service further education teachers to recognise the benefits of incorporating enterprise education into their classrooms of the future.

Originality/value

While there is an array of literature on entrepreneurship and enterprise education outside of business contents, very few studies exist, which examine enterprise education in an initial teacher education context. Fewer still examine enterprise education from the perspective of further education. This study provides a unique qualitative view of pre-service further education teachers' impressions of enterprise education and their aspirations for the future.

Details

Education + Training, vol. 64 no. 1
Type: Research Article
ISSN: 0040-0912

Keywords

Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 27 November 2023

Mohammad Azizi, Hamid Hosseinloo, Jane F. Maley and Marina Dabić

Coaching is a widespread form of human development that has grown considerably in recent years. However, it is not well understood in entrepreneurship and small and medium-sized…

Abstract

Purpose

Coaching is a widespread form of human development that has grown considerably in recent years. However, it is not well understood in entrepreneurship and small and medium-sized enterprises (SMEs) and little is known about the success factors for coaching in SMEs. Thus, this article presents a theoretical framework for coaching SMEs. The paper reports on a study carried out to develop and validate a coaching model for entrepreneurship in SMEs.

Design/methodology/approach

A mixed methods approach was undertaken in SMEs in the Iranian pharmaceutical industry. Confirmatory factor analysis (CFA) was used to confirm the samples and the model's dimensions.

Findings

The results show five chief constructs of the entrepreneurial coaching model. In particular, the authors determine the importance of early goal setting and identify the essential characteristics of an effective entrepreneurial coach.

Research limitations/implications

Firstly, the data relied solely on the pharmacy industry in Iran, indicating a need for future studies to explore coaching programs across various industries and countries. Additionally, a quantitative aspect of the research involved participants answering questionnaires based on their perceptions. This subjective nature introduces a potential for inaccuracies in participants' perceptions and expectations. Furthermore, the inherent bias of program stakeholders may have led to exaggerated responses. To mitigate these issues, it would be beneficial to conduct experimental and longitudinal research, which could address these concerns more effectively.

Practical implications

By utilizing a theoretical framework, the authors goal is to define the essential features of coaching in SMEs and compare it to other developmental interventions to highlight both commonalities and distinctions. This approach addresses the recent suggestions in coaching literature to distinguish coaching practices tailored for particular groups, specifically entrepreneurs involved in SMEs.

Originality/value

This study contributes to understanding the essential features for successful entrepreneurial coaching in SMEs.

Details

European Journal of Innovation Management, vol. 26 no. 7
Type: Research Article
ISSN: 1460-1060

Keywords

Open Access
Book part
Publication date: 17 August 2020

Rachel Loney-Howes

Abstract

Details

Online Anti-Rape Activism: Exploring the Politics of the Personal in the Age of Digital Media
Type: Book
ISBN: 978-1-83867-442-7

Open Access
Book part
Publication date: 4 October 2023

Maria Roth

From an ethical point of view, the inclusion of children and young people in research is problematic due to their inability to give informed consent and meaningfully express their…

Abstract

From an ethical point of view, the inclusion of children and young people in research is problematic due to their inability to give informed consent and meaningfully express their views. The ethical aspects of research are multiplied if the research participant might have experienced child abuse, neglect, exploitation, or other forms of violence or assisted in such acts. Talking about victimization might be difficult and generate a sense of betrayal of attachment figures. On the other hand, the usual ethical procedure of asking parents or other caretakers to give consent for their children to discuss issues of maltreatment gives them the power to act as gatekeepers to stop children from participating in research. Therefore, researchers should contemplate if parental consent should be waived and how research can be developed to mobilise children's agency and ensure their meaningful cooperation in researching different aspects of violence that affect them. This chapter presents and critically analyses different research examples and discusses their ethical dimensions from a children's rights perspective. The research questions start with discussing the utility of consulting children in research on maltreatment; the gatekeeping role of caregivers; the distress and harm eventually caused to children and young people by participation in research and the benefits of participation for children. The survey examples discussed lead to the conclusions that research on maltreatment might sometimes cause distress; caregivers' power to refuse consent for their children's participation in research on maltreatment can alter epidemiologic data and impede children's right to express their opinion on issues that are central to their lives and therefore, it should be waived; consulting children is essential for collecting data on and improving responses to child maltreatment; and children's contribution to research on maltreatment depends on the adopted methodologies of the research, more advanced forms of participation, and training children to express their opinions, thus enriching scientific knowledge and promoting change.

Details

Participatory Research on Child Maltreatment with Children and Adult Survivors
Type: Book
ISBN: 978-1-80455-529-3

Keywords

Open Access
Article
Publication date: 3 November 2022

Godwin Thomas and Mary-Jane Sule

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and…

1758

Abstract

Purpose

This paper proposes a holistic, proactive and adaptive approach to cybersecurity from a service lens, given the continuously evolving cyber-attack techniques, threat and vulnerability landscape that often overshadow existing cybersecurity approaches.

Design/methodology/approach

Through an extensive literature review of relevant concepts and analysis of existing cybersecurity frameworks, standards and best practices, a logical argument is made to produce a dynamic end-to-end cybersecurity service system model.

Findings

Cyberspace has provided great value for businesses and individuals. The COVID-19 pandemic has significantly motivated the move to cyberspace by organizations. However, the extension to cyberspace comes with additional risks as traditional protection techniques are insufficient and isolated, generally focused on an organization's perimeter with little attention to what is out there. More so, cyberattacks continue to grow in complexity creating overwhelming consequences. Existing cybersecurity approaches and best practices are limited in scope, and implementation strategies, differing in strength and focus, at different levels of granularity. Nevertheless, the need for a proactive, adaptive and responsive cybersecurity solution is recognized.

Originality/value

This paper presents a model that promises proactive, adaptive and responsive end-to-end cybersecurity. The proposed cybersecurity continuity and management model premised on a service system, leveraging on lessons learned from existing solutions, takes a holistic analytical view of service activities from source (service provider) to destination (Customer) to ensure end-to-end security, whether internally (within an organization) or externally.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 3 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

1 – 10 of 49