Search results
1 – 10 of 16Allen S. Daniels, Susan Bergeson, Larry Fricks, Peter Ashenden and Ike Powell
This paper aims to focus on The Pillars of Peer Support initiative, an ongoing project to examine and develop the principles of peer support services. These services are…
Abstract
Purpose
This paper aims to focus on The Pillars of Peer Support initiative, an ongoing project to examine and develop the principles of peer support services. These services are differentiated from peer support and define the parameters of a certified workforce that promotes recovery and fosters wellbeing. This process is based upon the lived experience of the peer support specialist.
Design/methodology/approach
A review of the literature indicates that a range of models and activities for peer support services have been developed, and established outcomes for these services are emerging. Since Medicaid has defined peer support services as reimbursable, the workforce has continued to expand. The Pillars of Peer Support initiative is designed to provide a standard set of principles to guide states in their work with Medicaid, and others in the development of this workforce.
Findings
The results of three Pillars of Peer Support summits are presented. This includes the 25 Pillars that have been developed and their role and use in state funded and other services. Additional findings support the process through which states and others can build these resources. A statement of how Peer Support Services fit within an essential health benefits package is also included.
Originality/value
The workforce of certified peer specialists is rapidly expanding. Their role in providing peer support services is identified, and principles to guide their professional roles are presented. This will help guide the field in the development and deployment of this important component of the healthcare delivery system.
Details
Keywords
Moufida Sadok, Steven Alter and Peter Bednar
This paper aims to present empirical results exemplifying challenges related to information security faced by small and medium enterprises (SMEs). It uses guidelines based on work…
Abstract
Purpose
This paper aims to present empirical results exemplifying challenges related to information security faced by small and medium enterprises (SMEs). It uses guidelines based on work system theory (WST) to frame the results, thereby illustrating why the mere existence of corporate security policies or general security training often is insufficient for establishing and maintaining information security.
Design/methodology/approach
This research was designed to produce a better appreciation and understanding of potential issues or gaps in security practices in SMEs. The research team interviewed 187 employees of 39 SMEs in the UK. All of those employees had access to sensitive information. Gathering information through interviews (instead of formal security documentation) made it possible to assess security practices from employees’ point of view.
Findings
Corporate policies that highlight information security are often disconnected from actual work practices and routines and often do not receive high priority in everyday work practices. A vast majority of the interviewed employees are not involved in risk assessment or in the development of security practices. Security practices remain an illusory activity in their real-world contexts.
Research limitations/implications
This paper focuses only on closed-ended questions related to the following topics: awareness of existing security policy; information security practices and management and information security involvement.
Practical implications
The empirical findings show that corporate information security policies in SMEs often are insufficient for maintaining security unless those policies are integrated with visible and recognized work practices in work systems that use or produce sensitive information. The interpretation based on WST provides guidelines for enhancing information system security.
Originality/value
Beyond merely reporting empirical results, this research uses WST to interpret the results in a way that has direct implications for practitioners and for researchers.
Details
Keywords
This chapter reviews factors responsible for climate change, impacts of the change on animal health, zoonotic diseases, and their linkage with One-Health program.
Abstract
Purpose
This chapter reviews factors responsible for climate change, impacts of the change on animal health, zoonotic diseases, and their linkage with One-Health program.
Design/methodology/approach
This chapter is based on the available literature related to climate change and its effect on animal health and production from different points. The causes and change forcers of climate change, direct and indirect effects of the change on animal health management, host–pathogen–vector interaction, and zoonotic diseases are included. Inter-linkage between climate change and One-Health program are also assessed.
Findings
Beside natural causes of climatic change, greenhouse gases are increasing due to human activities, causing global climate changes which have direct and indirect animal health and production performance impacts. The direct impacts are increased ambient temperature, floods, and droughts, while the indirect are reduced availability of water and food. The change and effect also promote diseases spread, increase survival and availability of the pathogen and its intermediate vector host, responsible for distribution and prevalence of tremendous zoonotic, infectious, and vector-borne diseases. The adverse effect on the biodiversity, distribution of animals and micro flora, genetic makeup of microbials which may lead to emerging and re-emerging disease and their outbreaks make the strong linkage between climate change and One-Health.
Practical implications
Global climate change is receiving increasing international attention where international organizations are increasing their focus on tackling the health impacts. Thus, there is a need for parallel mitigation of climate change and animal diseases in a global form.
Originality/value
Most research on climate change is limited to environmental protection, however this chapter provides a nexus between climate change, animal health, livestock production, and the One-Health program for better livelihood.
Details
Keywords
The purpose of the paper is to analyse non‐indigenous student resistance to indigenous history and to improve non‐indigenous students’ engagement with indigenous history.
Abstract
Purpose
The purpose of the paper is to analyse non‐indigenous student resistance to indigenous history and to improve non‐indigenous students’ engagement with indigenous history.
Design/methodology
The paper, based on praxis, is a theoretical discussion of the reasons for non‐indigenous student resistance to indigenous history.
Findings
The paper argues that non‐indigenous imaginings of national self creates indigenous history into a “un‐history” (a history that could not be). The paper suggests non‐indigenous teachers of indigenous history may undertake a broader perspective to prepare students for indigenous history, including fostering a critical appreciation of histiography, Australian colonial art, literature and popular culture, to enable a critical understanding of the national imagining of Australians (as non‐indigenous) in order to enable engagement with indigenous history.
Research limitations/implications
The paper's focus and findings do not presume relevance to indigenous educators of indigenous history, as previous research has shown non‐indigenous students’ reactions to an indigenous educator may differ from an to a non‐indigenous educator.
Originality/value
The paper moves beyond discussions about content of indigenous history to issues of resistance and engagement found amongst non‐indigenous students with regard to indigenous history. The paper suggests a twenty‐first century political approach where there is non‐indigenous ownership of the shared history in (indigenous) Australia history, enabling indigenous history to move from the periphery to the centre of Australian colonial history.
Details
Keywords
Ulf Melin, Karin Axelsson and Fredrik Söderström
The purpose of this paper is to analyse and understand the contemporary management of electronic identification (e-ID) development to: identify and formulate challenges and…
Abstract
Purpose
The purpose of this paper is to analyse and understand the contemporary management of electronic identification (e-ID) development to: identify and formulate challenges and reflect upon the use of a combination of perspectives. To generate knowledge on this issue, we investigate e-ID development in Sweden from: an e-government systems development lifecycle perspective and a project challenge and critical success factor (CSF) perspective.
Design/methodology/approach
This is a qualitative case study covering an analysis of the three years in a larger project focusing e-ID in a public e-service setting. Empirical sources have been face-to-face interviews; official documents and different kind of forums for presentations and discussions in, for example, hearings arranged by authorities; meetings with the coordinating agency, and practitioners’ networks events.
Findings
This study concludes that there are significant challenges involved in managing e-ID development because of its contextual and integrated character. Challenges involve the organization and management of the program and can be traced back to e-government, general project management literature and theory on path dependency. Based on this study, we can question, e.g. governance models, centralization and a narrow focus on the technical artefact. Our study is also an illustration of a possible way to analyse e-ID within an e-government initiative.
Research limitations/implications
The present study shows that an e-ID can be considered as a back office-enabler for launching e-services, but also highlights the need for management of the artefact as an integral part of e-service development because it is intertwined with the use of e-services from a user perspective. This aspect together with the insights related to challenges and success factors including path dependency provides implications for future practice of e-ID management and development in particular and information systems artefact development in general.
Originality/value
This paper addresses challenges related to the development of e-ID in a public e-service setting. Few studies have theoretically combined a lifecycle perspective on challenges and success factors related to e-ID development while also focusing different dimensions of path dependency as an example of a challenging area within a program frame. Studying e-ID as a contemporary phenomenon from a contextual perspective in line with sociomaterial thinking – with a focus on the interplay between technology and people –can also help us to understand and discuss artefact development in general.
Details
Keywords
IN order to be able to discriminate with certainty between butter and such margarine as is sold in England, it is necessary to carry out two or three elaborate and delicate…
Abstract
IN order to be able to discriminate with certainty between butter and such margarine as is sold in England, it is necessary to carry out two or three elaborate and delicate chemical processes. But there has always been a craving by the public for some simple method of determining the genuineness of butter by means of which the necessary trouble could be dispensed with. It has been suggested that such easy detection would be possible if all margarine bought and sold in England were to be manufactured with some distinctive colouring added—light‐blue, for instance—or were to contain a small amount of phenolphthalein, so that the addition of a drop of a solution of caustic potash to a suspected sample would cause it to become pink if it were margarine, while nothing would occur if it were genuine butter. These methods, which have been put forward seriously, will be found on consideration to be unnecessary, and, indeed, absurd.
The dismissal of the ordinary and the embrace of chaos are characteristics of the thriller which has, over the last decade, accounted for nearly 25 percent of the best‐seller…
Abstract
The dismissal of the ordinary and the embrace of chaos are characteristics of the thriller which has, over the last decade, accounted for nearly 25 percent of the best‐seller market. In spite of its existential overtones, the thriller, with rare exceptions, is seldom viewed as quality fiction, yet is not generally classified as genre fiction with attendant categorization by libraries and bookstores. Readers of thrillers in pursuit of authors must either search through the general fiction or “mystery” shelves where thrillers are sometimes placed. However, the latter solution offends both mystery and thriller readers.