Search results

1 – 10 of 16
Article
Publication date: 15 June 2012

Allen S. Daniels, Susan Bergeson, Larry Fricks, Peter Ashenden and Ike Powell

This paper aims to focus on The Pillars of Peer Support initiative, an ongoing project to examine and develop the principles of peer support services. These services are…

916

Abstract

Purpose

This paper aims to focus on The Pillars of Peer Support initiative, an ongoing project to examine and develop the principles of peer support services. These services are differentiated from peer support and define the parameters of a certified workforce that promotes recovery and fosters wellbeing. This process is based upon the lived experience of the peer support specialist.

Design/methodology/approach

A review of the literature indicates that a range of models and activities for peer support services have been developed, and established outcomes for these services are emerging. Since Medicaid has defined peer support services as reimbursable, the workforce has continued to expand. The Pillars of Peer Support initiative is designed to provide a standard set of principles to guide states in their work with Medicaid, and others in the development of this workforce.

Findings

The results of three Pillars of Peer Support summits are presented. This includes the 25 Pillars that have been developed and their role and use in state funded and other services. Additional findings support the process through which states and others can build these resources. A statement of how Peer Support Services fit within an essential health benefits package is also included.

Originality/value

The workforce of certified peer specialists is rapidly expanding. Their role in providing peer support services is identified, and principles to guide their professional roles are presented. This will help guide the field in the development and deployment of this important component of the healthcare delivery system.

Details

The Journal of Mental Health Training, Education and Practice, vol. 7 no. 2
Type: Research Article
ISSN: 1755-6228

Keywords

Article
Publication date: 4 June 2020

Moufida Sadok, Steven Alter and Peter Bednar

This paper aims to present empirical results exemplifying challenges related to information security faced by small and medium enterprises (SMEs). It uses guidelines based on work…

2002

Abstract

Purpose

This paper aims to present empirical results exemplifying challenges related to information security faced by small and medium enterprises (SMEs). It uses guidelines based on work system theory (WST) to frame the results, thereby illustrating why the mere existence of corporate security policies or general security training often is insufficient for establishing and maintaining information security.

Design/methodology/approach

This research was designed to produce a better appreciation and understanding of potential issues or gaps in security practices in SMEs. The research team interviewed 187 employees of 39 SMEs in the UK. All of those employees had access to sensitive information. Gathering information through interviews (instead of formal security documentation) made it possible to assess security practices from employees’ point of view.

Findings

Corporate policies that highlight information security are often disconnected from actual work practices and routines and often do not receive high priority in everyday work practices. A vast majority of the interviewed employees are not involved in risk assessment or in the development of security practices. Security practices remain an illusory activity in their real-world contexts.

Research limitations/implications

This paper focuses only on closed-ended questions related to the following topics: awareness of existing security policy; information security practices and management and information security involvement.

Practical implications

The empirical findings show that corporate information security policies in SMEs often are insufficient for maintaining security unless those policies are integrated with visible and recognized work practices in work systems that use or produce sensitive information. The interpretation based on WST provides guidelines for enhancing information system security.

Originality/value

Beyond merely reporting empirical results, this research uses WST to interpret the results in a way that has direct implications for practitioners and for researchers.

Details

Information & Computer Security, vol. 28 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 14 December 2016

Adem Hiko and Gelgelo Malicha

This chapter reviews factors responsible for climate change, impacts of the change on animal health, zoonotic diseases, and their linkage with One-Health program.

Abstract

Purpose

This chapter reviews factors responsible for climate change, impacts of the change on animal health, zoonotic diseases, and their linkage with One-Health program.

Design/methodology/approach

This chapter is based on the available literature related to climate change and its effect on animal health and production from different points. The causes and change forcers of climate change, direct and indirect effects of the change on animal health management, host–pathogen–vector interaction, and zoonotic diseases are included. Inter-linkage between climate change and One-Health program are also assessed.

Findings

Beside natural causes of climatic change, greenhouse gases are increasing due to human activities, causing global climate changes which have direct and indirect animal health and production performance impacts. The direct impacts are increased ambient temperature, floods, and droughts, while the indirect are reduced availability of water and food. The change and effect also promote diseases spread, increase survival and availability of the pathogen and its intermediate vector host, responsible for distribution and prevalence of tremendous zoonotic, infectious, and vector-borne diseases. The adverse effect on the biodiversity, distribution of animals and micro flora, genetic makeup of microbials which may lead to emerging and re-emerging disease and their outbreaks make the strong linkage between climate change and One-Health.

Practical implications

Global climate change is receiving increasing international attention where international organizations are increasing their focus on tackling the health impacts. Thus, there is a need for parallel mitigation of climate change and animal diseases in a global form.

Originality/value

Most research on climate change is limited to environmental protection, however this chapter provides a nexus between climate change, animal health, livestock production, and the One-Health program for better livelihood.

Details

Climate Change and the 2030 Corporate Agenda for Sustainable Development
Type: Book
ISBN: 978-1-78635-819-6

Keywords

Article
Publication date: 12 October 2012

Mary O'Dowd

The purpose of the paper is to analyse non‐indigenous student resistance to indigenous history and to improve non‐indigenous students’ engagement with indigenous history.

5561

Abstract

Purpose

The purpose of the paper is to analyse non‐indigenous student resistance to indigenous history and to improve non‐indigenous students’ engagement with indigenous history.

Design/methodology

The paper, based on praxis, is a theoretical discussion of the reasons for non‐indigenous student resistance to indigenous history.

Findings

The paper argues that non‐indigenous imaginings of national self creates indigenous history into a “un‐history” (a history that could not be). The paper suggests non‐indigenous teachers of indigenous history may undertake a broader perspective to prepare students for indigenous history, including fostering a critical appreciation of histiography, Australian colonial art, literature and popular culture, to enable a critical understanding of the national imagining of Australians (as non‐indigenous) in order to enable engagement with indigenous history.

Research limitations/implications

The paper's focus and findings do not presume relevance to indigenous educators of indigenous history, as previous research has shown non‐indigenous students’ reactions to an indigenous educator may differ from an to a non‐indigenous educator.

Originality/value

The paper moves beyond discussions about content of indigenous history to issues of resistance and engagement found amongst non‐indigenous students with regard to indigenous history. The paper suggests a twenty‐first century political approach where there is non‐indigenous ownership of the shared history in (indigenous) Australia history, enabling indigenous history to move from the periphery to the centre of Australian colonial history.

Article
Publication date: 21 March 2016

Ulf Melin, Karin Axelsson and Fredrik Söderström

The purpose of this paper is to analyse and understand the contemporary management of electronic identification (e-ID) development to: identify and formulate challenges and…

Abstract

Purpose

The purpose of this paper is to analyse and understand the contemporary management of electronic identification (e-ID) development to: identify and formulate challenges and reflect upon the use of a combination of perspectives. To generate knowledge on this issue, we investigate e-ID development in Sweden from: an e-government systems development lifecycle perspective and a project challenge and critical success factor (CSF) perspective.

Design/methodology/approach

This is a qualitative case study covering an analysis of the three years in a larger project focusing e-ID in a public e-service setting. Empirical sources have been face-to-face interviews; official documents and different kind of forums for presentations and discussions in, for example, hearings arranged by authorities; meetings with the coordinating agency, and practitioners’ networks events.

Findings

This study concludes that there are significant challenges involved in managing e-ID development because of its contextual and integrated character. Challenges involve the organization and management of the program and can be traced back to e-government, general project management literature and theory on path dependency. Based on this study, we can question, e.g. governance models, centralization and a narrow focus on the technical artefact. Our study is also an illustration of a possible way to analyse e-ID within an e-government initiative.

Research limitations/implications

The present study shows that an e-ID can be considered as a back office-enabler for launching e-services, but also highlights the need for management of the artefact as an integral part of e-service development because it is intertwined with the use of e-services from a user perspective. This aspect together with the insights related to challenges and success factors including path dependency provides implications for future practice of e-ID management and development in particular and information systems artefact development in general.

Originality/value

This paper addresses challenges related to the development of e-ID in a public e-service setting. Few studies have theoretically combined a lifecycle perspective on challenges and success factors related to e-ID development while also focusing different dimensions of path dependency as an example of a challenging area within a program frame. Studying e-ID as a contemporary phenomenon from a contextual perspective in line with sociomaterial thinking – with a focus on the interplay between technology and people –can also help us to understand and discuss artefact development in general.

Details

Transforming Government: People, Process and Policy, vol. 10 no. 1
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 1 January 1901

IN order to be able to discriminate with certainty between butter and such margarine as is sold in England, it is necessary to carry out two or three elaborate and delicate…

Abstract

IN order to be able to discriminate with certainty between butter and such margarine as is sold in England, it is necessary to carry out two or three elaborate and delicate chemical processes. But there has always been a craving by the public for some simple method of determining the genuineness of butter by means of which the necessary trouble could be dispensed with. It has been suggested that such easy detection would be possible if all margarine bought and sold in England were to be manufactured with some distinctive colouring added—light‐blue, for instance—or were to contain a small amount of phenolphthalein, so that the addition of a drop of a solution of caustic potash to a suspected sample would cause it to become pink if it were margarine, while nothing would occur if it were genuine butter. These methods, which have been put forward seriously, will be found on consideration to be unnecessary, and, indeed, absurd.

Details

British Food Journal, vol. 3 no. 1
Type: Research Article
ISSN: 0007-070X

Book part
Publication date: 30 October 2019

Thomas O'Donoghue and Keith Moore

Abstract

Details

Teacher Preparation in Australia: History, Policy and Future Directions
Type: Book
ISBN: 978-1-78743-772-2

Abstract

Details

Leading Educational Systems and Schools in Times of Disruption and Exponential Change: A Call for Courage, Commitment and Collaboration
Type: Book
ISBN: 978-1-83909-851-2

Article
Publication date: 1 February 1984

Kathleen Heim

The dismissal of the ordinary and the embrace of chaos are characteristics of the thriller which has, over the last decade, accounted for nearly 25 percent of the best‐seller…

Abstract

The dismissal of the ordinary and the embrace of chaos are characteristics of the thriller which has, over the last decade, accounted for nearly 25 percent of the best‐seller market. In spite of its existential overtones, the thriller, with rare exceptions, is seldom viewed as quality fiction, yet is not generally classified as genre fiction with attendant categorization by libraries and bookstores. Readers of thrillers in pursuit of authors must either search through the general fiction or “mystery” shelves where thrillers are sometimes placed. However, the latter solution offends both mystery and thriller readers.

Details

Collection Building, vol. 6 no. 1
Type: Research Article
ISSN: 0160-4953

Content available
Book part
Publication date: 5 October 2017

Abstract

Details

Custard, Culverts and Cake
Type: Book
ISBN: 978-1-78743-285-7

1 – 10 of 16