Search results

1 – 10 of 29
Open Access
Article
Publication date: 14 March 2023

Jennifer Martin, Zuneera Khurshid, Gemma Moore, Michael Carton, John J. Fitzsimons, Colm Henry and Maureen A. Flynn

This paper describes a quality improvement project to improve oversight of quality at national board level using statistical process control (SPC) methods, complimented by a…

1654

Abstract

Purpose

This paper describes a quality improvement project to improve oversight of quality at national board level using statistical process control (SPC) methods, complimented by a qualitative experience of patients and frontline staff. It demonstrates the application of the “Picture-Understanding-Action” approach and shares the lessons learnt.

Design/methodology/approach

Using co-design and applying the “Picture-Understanding-Action” approach, the project team supported the directors of the Irish health system to identify and test a qualitative and quantitative picture of the quality of care across the health system. A “Quality Profile” consisting of quantitative indicators, analysed using SPC methods was used to provide an overview of the “critical few” indicators across health and social care. Patient and front-line staff experiences added depth and context to the data. These methods were tested and evolved over the course of six meetings, leading to quality of care being prioritised and interrogated at board level.

Findings

This project resulted in the integration of quality as a substantive and prioritised agenda item. Using best practice SPC methods with associated training produced better understanding of performance of the system. In addition, bringing patient and staff experiences of quality to the forefront “people-ised” the data.

Originality/value

The application of the “Picture-Understanding-Action” approach facilitated the development of a co-designed quality agenda item. This is a novel process that shifted the focus from “providing” information to co-designing fit-for-purpose information at board level.

Details

International Journal of Health Governance, vol. 28 no. 1
Type: Research Article
ISSN: 2059-4631

Keywords

Open Access
Article
Publication date: 24 August 2021

Maureen Alice Flynn and Niamh M. Brennan

The paper examines interviewee insights into accountability for clinical governance in high-consequence, life-and-death hospital settings. The analysis draws on the distinction…

1758

Abstract

Purpose

The paper examines interviewee insights into accountability for clinical governance in high-consequence, life-and-death hospital settings. The analysis draws on the distinction between formal “imposed accountability” and front-line “felt accountability”. From these insights, the paper introduces an emergent concept, “grounded accountability”.

Design/methodology/approach

Interviews are conducted with 41 clinicians, managers and governors in two large academic hospitals. The authors ask interviewees to recall a critical clinical incident as a focus for elucidating their experiences of and observation on the practice of accountability.

Findings

Accountability emerges from the front-line, on-the-ground. Together, clinicians, managers and governors co-construct accountability. Less attention is paid to cost, blame, legal processes or personal reputation. Money and other accountability assumptions in business do not always apply in a hospital setting.

Originality/value

The authors propose the concept of co-constructed “grounded accountability” comprising interrelationships between the concept’s three constituent themes of front-line staff’s felt accountability, along with grounded engagement by managers/governors, supported by a culture of openness.

Details

Journal of Health Organization and Management, vol. 35 no. 9
Type: Research Article
ISSN: 1477-7266

Keywords

Open Access
Book part
Publication date: 4 June 2021

Jane Bailey, Nicola Henry and Asher Flynn

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as…

Abstract

While digital technologies have led to many important social and cultural advances worldwide, they also facilitate the perpetration of violence, abuse and harassment, known as technology-facilitated violence and abuse (TFVA). TFVA includes a spectrum of behaviors perpetrated online, offline, and through a range of technologies, including artificial intelligence, livestreaming, GPS tracking, and social media. This chapter provides an overview of TFVA, including a brief snapshot of existing quantitative and qualitative research relating to various forms of TFVA. It then discusses the aims and contributions of this book as a whole, before outlining five overarching themes arising from the contributions. The chapter concludes by mapping out the structure of the book.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Christopher Dietzel

Rape culture, described as when “violence is seen as sexy and sexuality as violent” (Buchwald, Fletcher, & Roth, 1993, p. vii), exists online and offline (Henry & Powell, 2014)…

Abstract

Rape culture, described as when “violence is seen as sexy and sexuality as violent” (Buchwald, Fletcher, & Roth, 1993, p. vii), exists online and offline (Henry & Powell, 2014). Much of the research on rape culture focuses on the experiences of heterosexual women, and few studies have explored rape culture in the context of dating apps. This chapter explores how men who have sex with men (MSM) understand and experience rape culture through their use of Grindr and similar dating apps. A thematic analysis of interviews with 25 MSM dating app users revealed problematic user behavior as well as unwanted sexual messages and images as common manifestations of rape culture on dating apps. Participants explained that rape culture extends beyond in-app interactions to in-person encounters, as evident by incidents of sexual violence that several participants had experienced and one participant had committed. Participants were unsure about the extent to which MSM dating apps facilitate rape culture but asserted that some apps enable rape culture more than others. This chapter demonstrates the importance of investigating sexual violence against people of diverse gender and sexual identities to ensure their experiences are not minimized, ignored, or rendered invisible.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Olusesan Ayodeji Makinde, Emmanuel Olamijuwon, Nchelem Kokomma Ichegbo, Cheluchi Onyemelukwe and Michael Gboyega Ilesanmi

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly…

Abstract

Incidents of violence perpetrated through digital technology platforms or facilitated by these means have been reported, often in high-income countries. Very little scholarly attention has been given to the nature of technology-facilitated violence and abuse (TFVA) across sub-Saharan Africa (SSA) despite an explosion in the use of various technologies. We conducted a literature review to identify and harmonize available data relating to the types of TFVA taking place in SSA. This was followed by an online survey of young adults through the SHYad.NET forum to understand the nature of TFVA among young adults in SSA. Our literature review revealed various types of TFVA to be happening across SSA, including cyberbullying, cyberstalking, trolling, dating abuse, image-based sexual violence, sextortion, and revenge porn. The results of our online survey revealed that both young men and women experience TFVA, with the most commonly reported TFVA being receiving unwanted sexually explicit images, comments, emails, or text messages. Female respondents more often reported repeated and/or unwanted sexual requests online via email or text message while male respondents more often reported experiencing violent threats. Respondents used various means to cope with TFVA including blocking the abuser or deleting the abused profile on social media.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Article
Publication date: 11 June 2018

Signe Bruskin

The purpose of this paper is to explore the fluidity of the fieldwork roles “insider” and “outsider.” The paper aims to move the discussion of insiders from an a priori…

10194

Abstract

Purpose

The purpose of this paper is to explore the fluidity of the fieldwork roles “insider” and “outsider.” The paper aims to move the discussion of insiders from an a priori categorized status and contribute to the literary insider–outsider debate by unfolding the micro process of how the role of an insider is shaped in situ. Grounded in empirical examples, the paper illustrates how the researcher’s role is shaped through interactions with organizational members and by context.

Design/methodology/approach

The paper is based on an ethnographic study in an IT department of a Nordic bank and draws on empirical material generated through a combination of data: shadowing, interviews, observations and documents. Excerpts from fieldnotes are included to invite the reader into “the scenes” played out in the field and are analyzed in order to illustrate the shaping of roles in situ.

Findings

The study finds that, independent of the researcher’s role as sponsored by the organization, the interactions with organizational members and context determine whether the researcher is assigned a role as insider or outsider, or even both within the same context.

Originality/value

The paper contributes with a new discussion of how the roles of insiders and outsiders are fluid by discussing the shaping of the roles in situ. By drawing on relational identity theories, the paper illustrates how interactions and context influence the researcher’s role, grounded in empirical examples. In addition, the paper discusses what the assigned roles enable and constrain for the ethnographer in that particular situation.

Details

Journal of Organizational Ethnography, vol. 8 no. 2
Type: Research Article
ISSN: 2046-6749

Keywords

Open Access
Article
Publication date: 9 May 2024

Michael Wang, Paul Childerhouse and Ahmad Abareshi

To delve into the integration of global logistics and supply chain networks amidst the digital transformation era. This study aims to investigate the potential role of China’s…

Abstract

Purpose

To delve into the integration of global logistics and supply chain networks amidst the digital transformation era. This study aims to investigate the potential role of China’s Belt and Road Initiative (BRI) in facilitating the integration of global flows encompassing both tangible goods and intangibles. Additionally, the study seeks to incorporate third-party logistics activities into a comprehensive global logistics and supply chain integration framework.

Design/methodology/approach

Prior research is synthesised into a global logistics and supply chain integration framework. A case study was undertaken on Yuan Tong (YTO) express group to investigate the framework, employing qualitative data analysis techniques. The study specifically examined the context of the BRI to enhance comprehension of its impact on global supply chains. Information was collected in particular to two types of supply chain flows, the physical flow of goods, and intangible information and cash flows.

Findings

The proposed framework aligns well with the case study, leading to the identification of global logistics and supply chain integration enablers. The results demonstrate a range of ways BRI promotes global logistics and supply chain integration.

Research limitations/implications

The case study, with multiple examples, focuses on how third-party logistics firms can embrace global logistics and supply chain integration in line with BRI. The case study approach limits generalisation, further applications in different contexts are required to validate the findings.

Originality/value

The framework holds promise for aiding practitioners and researchers in gaining deeper insights into the role of the BRI in global logistics and supply chain integration within the digital era. The identified enablers underscore the importance of emphasising key factors necessary for success in navigating digital transformation within global supply chains.

Details

Journal of International Logistics and Trade, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1738-2122

Keywords

Open Access
Book part
Publication date: 4 June 2021

Asher Flynn

Abstract

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Open Access
Article
Publication date: 1 November 2021

Harri Lorentz, Sini Laari, Joanne Meehan, Michael Eßig and Michael Henke

In the context of the COVID-19 pandemic, this study investigates a variety of approaches to supply disruption risk management for achieving effective responses for resilience at…

2558

Abstract

Purpose

In the context of the COVID-19 pandemic, this study investigates a variety of approaches to supply disruption risk management for achieving effective responses for resilience at the supply management subunit level (e.g. category of items). Drawing on the attention-based view of the firm, the authors model the attentional antecedents of supply resilience as (1) attentional perspectives and (2) attentional selection. Attentional perspectives focus on either supply risk sources or supply network recoverability, and both are hypothesised to have a direct positive association with supply resilience. Attentional selection is top down or bottom up when it comes to disruption detection, and these are hypothesised to moderate the association between disruption risk management perspectives and resilience.

Design/methodology/approach

Conducted at the early phases of the COVID-19 pandemic, this study employs a hierarchical regression analysis on a multicountry survey of 190 procurement professionals, each responding from the perspective of their own subunit area of supply responsibility.

Findings

Both attentional disruption risk management perspectives are needed to achieve supply resilience, and neither is superior in terms of achieving supply resilience. Both the efficiency of the top down and exposure to the unexpected with the bottom up are needed – to a balanced degree – for improved supply resilience.

Practical implications

The results encourage firms to purposefully develop their supply risk management practices, first, to include both perspectives and, second, to avoid biases in attentional selection for disruption detection. Ensuring a more balanced approach may allow firms to improve their supply resilience.

Originality/value

The results contribute to the understanding of the microfoundations that underpin firms' operational capabilities for supply risk and disruption management and possible attentional biases.

Details

International Journal of Operations & Production Management, vol. 41 no. 13
Type: Research Article
ISSN: 0144-3577

Keywords

Open Access
Book part
Publication date: 4 June 2021

Michael Salter and Elly Hanson

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the…

Abstract

This chapter examines the phenomenon of internet users attempting to report and prevent online child sexual exploitation (CSE) and child sexual abuse material (CSAM) in the absence of adequate intervention by internet service providers, social media platforms, and government. The chapter discusses the history of online CSE, focusing on regulatory stances over time in which online risks to children have been cast as natural and inevitable by the hegemony of a “cyberlibertarian” ideology. We illustrate the success of this ideology, as well as its profound contradictions and ethical failures, by presenting key examples in which internet users have taken decisive action to prevent online CSE and promote the removal of CSAM. Rejecting simplistic characterizations of “vigilante justice,” we argue instead that the fact that often young internet users report feeling forced to act against online CSE and CSAM undercuts libertarian claims that internet regulation is impossible, unworkable, and unwanted. Recent shifts toward a more progressive ethos of online harm minimization are promising; however, this ethos risks offering a new legitimizing ideology for online business models that will continue to put children at risk of abuse and exploitation. In conclusion, we suggest ways forward toward an internet built in the interests of children, rather than profit.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

1 – 10 of 29