Search results

1 – 5 of 5
Article
Publication date: 8 May 2018

Beth Sundstrom, Heather M. Brandt, Lisa Gray and Jennifer Young Pierce

Cervical cancer (CxCa) incidence and mortality remain unacceptably high in South Carolina, USA, presenting an ideal opportunity for intervention. To address this need, Cervical…

Abstract

Purpose

Cervical cancer (CxCa) incidence and mortality remain unacceptably high in South Carolina, USA, presenting an ideal opportunity for intervention. To address this need, Cervical Cancer-Free South Carolina developed an academic-community partnership with researchers and students at a public university to design, implement, and evaluate a theory-based CxCa communication campaign, It’s My Time. The paper aims to discuss this issue.

Design/methodology/approach

The goal of this campaign was to decrease CxCa by increasing human papillomavirus (HPV) vaccination and appropriate screening. This paper describes the development, implementation, and evaluation of a successful theory-based CxCa prevention communication campaign for college women based on formative audience research and targeted messages delivered to audience segments through new and traditional communication channels. The health belief model (HBM) served as a theoretical framework for the campaign throughout development, implementation, and evaluation.

Findings

This campaign demonstrated the effectiveness of the HBM to address CxCa prevention, including HPV vaccine acceptability. The campaign aimed to increase perceptions of susceptibility, which were low, by emphasizing that HPV is a sexually transmitted infection. A community-based grassroots approach to addressing disparities in CxCa prevention increased benefits and decreased barriers. Social media emerged as a particularly appropriate platform to disseminate cues to action. In total, 60 percent of participants who responded to an anonymous web-based survey evaluation indicated that they received the HPV vaccine as a result of campaign messages.

Originality/value

This paper offers practical suggestions to campaign planners about building academic-community partnerships to develop theory-based communication campaigns that include conducting formative research, segmenting target audiences, engaging with young people, and incorporating social media.

Details

Journal of Communication Management, vol. 22 no. 2
Type: Research Article
ISSN: 1363-254X

Keywords

Article
Publication date: 19 October 2018

Brendan Lloyd, Alexandra Blazely and Lisa Phillips

Non-suicidal self-injury (NSSI) is reasonably common, particularly among young people with prevalence rates of up to 25 per cent reported. Many factors contribute towards NSSI…

1175

Abstract

Purpose

Non-suicidal self-injury (NSSI) is reasonably common, particularly among young people with prevalence rates of up to 25 per cent reported. Many factors contribute towards NSSI, including depression, anxiety and history of abuse and NSSI is a risk factor for suicide. Many people who engage in NSSI do not seek help, potentially due to concern about sigmatising attitudes. The purpose of this paper is to investigate the impact of gender and disclosure on stigmatising attitudes towards individuals who engage in NSSI.

Design/methodology/approach

Participants were 384 first-year university students (77.4 per cent female; mean age 19.50 years (SD=3.53)) who completed measures of stigmatising attitudes in response to vignettes featuring individuals who engaged in self-harming behaviour. Vignettes varied in the gender of the individual as well as whether the NSSI was disclosed or not.

Findings

The results support the attribution model of public discrimination in relation to NSSI stigma. Perceptions of higher personal responsibility for NSSI behaviour and higher levels of danger and manipulation were positively associated with stigmatizing attitudes and behaviours. Male research participants reported significantly higher levels of stigmatizing attitudes and behaviours than females.

Social implications

The level of stigmatising attitudes towards individuals who engage in NSSI is significant and may impact on help-seeking behaviour.

Originality/value

Between 10 and 25 per cent of adolescents engage in some form of NSSI, but only a minority seek help to address this behaviour. This study suggests that attitudes by peers may influence help-seeking. Further research is required outside of tertiary education settings.

Details

Journal of Public Mental Health, vol. 17 no. 4
Type: Research Article
ISSN: 1746-5729

Keywords

Article
Publication date: 1 April 1992

Gary L. Welton, Dean G. Pruitt, Neil B. McGillicuddy, Carol A. Ippolito and Jo M. Zubek

This observational and interview study investigated the role of caucusing (private meetings between the mediator and a disputant) in community mediation. The results from 73 cases…

Abstract

This observational and interview study investigated the role of caucusing (private meetings between the mediator and a disputant) in community mediation. The results from 73 cases at two mediation centers indicate that mediators are more likely to caucus when disputants have a history of escalation, are hostile toward each other during the hearing, and fail to engage in joint problem solving. Caucus sessions were found to discourage direct hostility between the disputants but to encourage indirect hostility. There was also evidence that caucus sessions foster disputant flexibility and problem solving between the disputant and the mediator. However, no relationship was found between the occurrence or nature of caucusing and the likelihood of agreement or the quality of the mediated outcome.

Details

International Journal of Conflict Management, vol. 3 no. 4
Type: Research Article
ISSN: 1044-4068

Article
Publication date: 5 March 2018

Baidyanath Biswas and Arunabha Mukhopadhyay

Malicious attackers frequently breach information systems by exploiting disclosed software vulnerabilities. Knowledge of these vulnerabilities over time is essential to decide the…

Abstract

Purpose

Malicious attackers frequently breach information systems by exploiting disclosed software vulnerabilities. Knowledge of these vulnerabilities over time is essential to decide the use of software products by organisations. The purpose of this paper is to propose a novel G-RAM framework for business organisations to assess and mitigate risks arising out of software vulnerabilities.

Design/methodology/approach

The G-RAM risk assessment module uses GARCH to model vulnerability growth. Using 16-year data across 1999-2016 from the National Vulnerability Database, the authors estimate the model parameters and validate the prediction accuracy. Next, the G-RAM risk mitigation module designs optimal software portfolio using Markowitz’s mean-variance optimisation for a given IT budget and preference.

Findings

Based on an empirical analysis, this study establishes that vulnerability follows a non-linear, time-dependent, heteroskedastic growth pattern. Further, efficient software combinations are proposed that optimise correlated risk. The study also reports the empirical evidence of a shift in efficient frontier of software configurations with time.

Research limitations/implications

Existing assumption of independent and identically distributed residuals after vulnerability function fitting is incorrect. This study applies GARCH technique to measure volatility clustering and mean reversal. The risk (or volatility) represented by the instantaneous variance is dependent on the immediately previous one, as well as on the unconditional variance of the entire vulnerability growth process.

Practical implications

The volatility-based estimation of vulnerability growth is a risk assessment mechanism. Next, the portfolio analysis acts as a risk mitigation activity. Results from this study can decide patch management cycle needed for each software – individual or group patching. G-RAM also ranks them into a 2×2 risk-return matrix to ensure that the correlated risk is diversified. Finally the paper helps the business firms to decide what to purchase and what to avoid.

Originality/value

Contrary to the existing techniques which either analyse with statistical distributions or linear econometric methods, this study establishes that vulnerability growth follows a non-linear, time-dependent, heteroskedastic pattern. The paper also links software risk assessment to IT governance and strategic business objectives. To the authors’ knowledge, this is the first study in IT security to examine and forecast volatility, and further design risk-optimal software portfolios.

Details

Journal of Enterprise Information Management, vol. 31 no. 2
Type: Research Article
ISSN: 1741-0398

Keywords

Article
Publication date: 1 May 1983

In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of…

16287

Abstract

In the last four years, since Volume I of this Bibliography first appeared, there has been an explosion of literature in all the main functional areas of business. This wealth of material poses problems for the researcher in management studies — and, of course, for the librarian: uncovering what has been written in any one area is not an easy task. This volume aims to help the librarian and the researcher overcome some of the immediate problems of identification of material. It is an annotated bibliography of management, drawing on the wide variety of literature produced by MCB University Press. Over the last four years, MCB University Press has produced an extensive range of books and serial publications covering most of the established and many of the developing areas of management. This volume, in conjunction with Volume I, provides a guide to all the material published so far.

Details

Management Decision, vol. 21 no. 5
Type: Research Article
ISSN: 0025-1747

Keywords

Access

Year

Content type

Article (5)
1 – 5 of 5