Search results

1 – 10 of 12
Article
Publication date: 15 June 2012

Allen S. Daniels, Susan Bergeson, Larry Fricks, Peter Ashenden and Ike Powell

This paper aims to focus on The Pillars of Peer Support initiative, an ongoing project to examine and develop the principles of peer support services. These services are…

946

Abstract

Purpose

This paper aims to focus on The Pillars of Peer Support initiative, an ongoing project to examine and develop the principles of peer support services. These services are differentiated from peer support and define the parameters of a certified workforce that promotes recovery and fosters wellbeing. This process is based upon the lived experience of the peer support specialist.

Design/methodology/approach

A review of the literature indicates that a range of models and activities for peer support services have been developed, and established outcomes for these services are emerging. Since Medicaid has defined peer support services as reimbursable, the workforce has continued to expand. The Pillars of Peer Support initiative is designed to provide a standard set of principles to guide states in their work with Medicaid, and others in the development of this workforce.

Findings

The results of three Pillars of Peer Support summits are presented. This includes the 25 Pillars that have been developed and their role and use in state funded and other services. Additional findings support the process through which states and others can build these resources. A statement of how Peer Support Services fit within an essential health benefits package is also included.

Originality/value

The workforce of certified peer specialists is rapidly expanding. Their role in providing peer support services is identified, and principles to guide their professional roles are presented. This will help guide the field in the development and deployment of this important component of the healthcare delivery system.

Details

The Journal of Mental Health Training, Education and Practice, vol. 7 no. 2
Type: Research Article
ISSN: 1755-6228

Keywords

Article
Publication date: 4 June 2020

Moufida Sadok, Steven Alter and Peter Bednar

This paper aims to present empirical results exemplifying challenges related to information security faced by small and medium enterprises (SMEs). It uses guidelines based on work…

2878

Abstract

Purpose

This paper aims to present empirical results exemplifying challenges related to information security faced by small and medium enterprises (SMEs). It uses guidelines based on work system theory (WST) to frame the results, thereby illustrating why the mere existence of corporate security policies or general security training often is insufficient for establishing and maintaining information security.

Design/methodology/approach

This research was designed to produce a better appreciation and understanding of potential issues or gaps in security practices in SMEs. The research team interviewed 187 employees of 39 SMEs in the UK. All of those employees had access to sensitive information. Gathering information through interviews (instead of formal security documentation) made it possible to assess security practices from employees’ point of view.

Findings

Corporate policies that highlight information security are often disconnected from actual work practices and routines and often do not receive high priority in everyday work practices. A vast majority of the interviewed employees are not involved in risk assessment or in the development of security practices. Security practices remain an illusory activity in their real-world contexts.

Research limitations/implications

This paper focuses only on closed-ended questions related to the following topics: awareness of existing security policy; information security practices and management and information security involvement.

Practical implications

The empirical findings show that corporate information security policies in SMEs often are insufficient for maintaining security unless those policies are integrated with visible and recognized work practices in work systems that use or produce sensitive information. The interpretation based on WST provides guidelines for enhancing information system security.

Originality/value

Beyond merely reporting empirical results, this research uses WST to interpret the results in a way that has direct implications for practitioners and for researchers.

Details

Information & Computer Security, vol. 28 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 October 2012

Mary O'Dowd

The purpose of the paper is to analyse non‐indigenous student resistance to indigenous history and to improve non‐indigenous students’ engagement with indigenous history.

5761

Abstract

Purpose

The purpose of the paper is to analyse non‐indigenous student resistance to indigenous history and to improve non‐indigenous students’ engagement with indigenous history.

Design/methodology

The paper, based on praxis, is a theoretical discussion of the reasons for non‐indigenous student resistance to indigenous history.

Findings

The paper argues that non‐indigenous imaginings of national self creates indigenous history into a “un‐history” (a history that could not be). The paper suggests non‐indigenous teachers of indigenous history may undertake a broader perspective to prepare students for indigenous history, including fostering a critical appreciation of histiography, Australian colonial art, literature and popular culture, to enable a critical understanding of the national imagining of Australians (as non‐indigenous) in order to enable engagement with indigenous history.

Research limitations/implications

The paper's focus and findings do not presume relevance to indigenous educators of indigenous history, as previous research has shown non‐indigenous students’ reactions to an indigenous educator may differ from an to a non‐indigenous educator.

Originality/value

The paper moves beyond discussions about content of indigenous history to issues of resistance and engagement found amongst non‐indigenous students with regard to indigenous history. The paper suggests a twenty‐first century political approach where there is non‐indigenous ownership of the shared history in (indigenous) Australia history, enabling indigenous history to move from the periphery to the centre of Australian colonial history.

Article
Publication date: 21 March 2016

Ulf Melin, Karin Axelsson and Fredrik Söderström

The purpose of this paper is to analyse and understand the contemporary management of electronic identification (e-ID) development to: identify and formulate challenges and…

Abstract

Purpose

The purpose of this paper is to analyse and understand the contemporary management of electronic identification (e-ID) development to: identify and formulate challenges and reflect upon the use of a combination of perspectives. To generate knowledge on this issue, we investigate e-ID development in Sweden from: an e-government systems development lifecycle perspective and a project challenge and critical success factor (CSF) perspective.

Design/methodology/approach

This is a qualitative case study covering an analysis of the three years in a larger project focusing e-ID in a public e-service setting. Empirical sources have been face-to-face interviews; official documents and different kind of forums for presentations and discussions in, for example, hearings arranged by authorities; meetings with the coordinating agency, and practitioners’ networks events.

Findings

This study concludes that there are significant challenges involved in managing e-ID development because of its contextual and integrated character. Challenges involve the organization and management of the program and can be traced back to e-government, general project management literature and theory on path dependency. Based on this study, we can question, e.g. governance models, centralization and a narrow focus on the technical artefact. Our study is also an illustration of a possible way to analyse e-ID within an e-government initiative.

Research limitations/implications

The present study shows that an e-ID can be considered as a back office-enabler for launching e-services, but also highlights the need for management of the artefact as an integral part of e-service development because it is intertwined with the use of e-services from a user perspective. This aspect together with the insights related to challenges and success factors including path dependency provides implications for future practice of e-ID management and development in particular and information systems artefact development in general.

Originality/value

This paper addresses challenges related to the development of e-ID in a public e-service setting. Few studies have theoretically combined a lifecycle perspective on challenges and success factors related to e-ID development while also focusing different dimensions of path dependency as an example of a challenging area within a program frame. Studying e-ID as a contemporary phenomenon from a contextual perspective in line with sociomaterial thinking – with a focus on the interplay between technology and people –can also help us to understand and discuss artefact development in general.

Details

Transforming Government: People, Process and Policy, vol. 10 no. 1
Type: Research Article
ISSN: 1750-6166

Keywords

Article
Publication date: 1 January 1901

IN order to be able to discriminate with certainty between butter and such margarine as is sold in England, it is necessary to carry out two or three elaborate and delicate…

Abstract

IN order to be able to discriminate with certainty between butter and such margarine as is sold in England, it is necessary to carry out two or three elaborate and delicate chemical processes. But there has always been a craving by the public for some simple method of determining the genuineness of butter by means of which the necessary trouble could be dispensed with. It has been suggested that such easy detection would be possible if all margarine bought and sold in England were to be manufactured with some distinctive colouring added—light‐blue, for instance—or were to contain a small amount of phenolphthalein, so that the addition of a drop of a solution of caustic potash to a suspected sample would cause it to become pink if it were margarine, while nothing would occur if it were genuine butter. These methods, which have been put forward seriously, will be found on consideration to be unnecessary, and, indeed, absurd.

Details

British Food Journal, vol. 3 no. 1
Type: Research Article
ISSN: 0007-070X

Article
Publication date: 1 February 1984

Kathleen Heim

The dismissal of the ordinary and the embrace of chaos are characteristics of the thriller which has, over the last decade, accounted for nearly 25 percent of the best‐seller…

Abstract

The dismissal of the ordinary and the embrace of chaos are characteristics of the thriller which has, over the last decade, accounted for nearly 25 percent of the best‐seller market. In spite of its existential overtones, the thriller, with rare exceptions, is seldom viewed as quality fiction, yet is not generally classified as genre fiction with attendant categorization by libraries and bookstores. Readers of thrillers in pursuit of authors must either search through the general fiction or “mystery” shelves where thrillers are sometimes placed. However, the latter solution offends both mystery and thriller readers.

Details

Collection Building, vol. 6 no. 1
Type: Research Article
ISSN: 0160-4953

Article
Publication date: 1 September 2003

Hilarie Bateman, Jon Emery, Ruth Bastable and Peter Bailey

A systematic and evidence informed approach to new service developments (the “spotlight” approach) was developed with members of a new primary health care team. The approach aimed…

735

Abstract

A systematic and evidence informed approach to new service developments (the “spotlight” approach) was developed with members of a new primary health care team. The approach aimed to ensure that service developments were relevant, grounded in evidence, documented and clearly owned by the practice team. A total of 13 spotlight developments were defined and documented during the first nine months. All considered relevance to local policy, all used research evidence and/or other accepted sources of appropriate expertise and all were discussed at team meetings. The spotlight approach quickly became accessible and familiar to new team members. It provides a common structure and language for discussion and documentation and is applicable to a wide range of service‐linked developments. It provides a vehicle for translating research into practice and the documentation to facilitate transfer of what has been learnt to others in the community for whom the development and its evidence base is relevant.

Details

Clinical Governance: An International Journal, vol. 8 no. 3
Type: Research Article
ISSN: 1477-7274

Keywords

Article
Publication date: 11 December 2019

Jake Weidman and Jens Grossklags

Colleges and universities across the USA have seen data breaches and intellectual property theft rise at a heightened rate over the past several years. An integral step in the…

Abstract

Purpose

Colleges and universities across the USA have seen data breaches and intellectual property theft rise at a heightened rate over the past several years. An integral step in the first line of defense against various forms of attacks are (written) security policies designed to prescribe the construction and function of a technical system, while simultaneously guiding the actions of individuals operating within said system. Unfortunately, policy analysis is an insufficiently discussed topic in many academic communities with very little research being conducted in this space.

Design/methodology/approach

This work aims to assess the current state of information security policies by analyzing in-use policies from 200 universities and colleges in the USA with the goal of identifying important features and general attributes of these documents. The authors accomplish this through a series of analyzes designed to examine the language and construction of these policies.

Findings

To summarize high-level results, the authors found that only 54 per cent of the top 200 universities had publicly accessible information security policies, and the policies that were examined lacked consistency with little shared source material. The authors also found that the tonal makeup of these policies lacked a great deal of emotion, but contained a high amount of tentative or ambiguous language leading toward policies that could be viewed as “unclear.”

Originality/value

This work is an extension of a paper that was presented at ECIS 2018. The authors have added additional analyzes including a cross-policy content and tonal analysis to strengthen the findings and implications of this work for the wider research audience.

Details

Information & Computer Security, vol. 28 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 9 December 2021

Patrick Sven Ulrich, Alice Timmermann and Vanessa Frank

The starting point for the considerations the authors make in this paper are the special features of family businesses in the area of management discussed in the literature. It…

1540

Abstract

Purpose

The starting point for the considerations the authors make in this paper are the special features of family businesses in the area of management discussed in the literature. It has been established here that family businesses sometimes choose different organizational setups than nonfamily businesses. This has not yet been investigated for cybersecurity. In the context of cybersecurity, there has been little theoretical or empirical work addressing the question of whether the qualitative characteristics of family businesses have an impact on the understanding of cybersecurity and the organization of cyber risk defense in the companies. Based on theoretically founded hypotheses, a quantitative empirical study was conducted in German companies.

Design/methodology/approach

The article is based on a quantitative-empirical survey of 184 companies, the results of which were analyzed using statistical-empirical methods.

Findings

The article asked – based on the subjective perception of cybersecurity and cyber risks – to what extent family businesses are sensitized to the topic and what conclusions they draw from it. An interesting tension emerges: family businesses see their employees more as a security risk, but do less than nonfamily businesses in terms of both training and organizational establishment. Whether this is due to a lack of technical or managerial expertise, or whether family businesses simply think they can prevent cybersecurity with less formal methods such as trust, is open to conjecture, but cannot be demonstrated with the research approach taken here. Qualitative follow-up studies are needed here.

Originality/value

This paper represents the first quantitative survey on cybersecurity with a specific focus on family businesses. It shows tension between awareness, especially of risks emanating from employees, and organizational routines that have not been implemented or established.

Details

Organizational Cybersecurity Journal: Practice, Process and People, vol. 2 no. 1
Type: Research Article
ISSN: 2635-0270

Keywords

Article
Publication date: 1 June 2015

Kay Whitehead

The purpose of this paper is to explore Australian educators’ work with “other people’s children” (OPCs) (Delpit, 2006) from the informal education market of the 1840s to the mass…

Abstract

Purpose

The purpose of this paper is to explore Australian educators’ work with “other people’s children” (OPCs) (Delpit, 2006) from the informal education market of the 1840s to the mass education market in contemporary times.

Design/methodology/approach

The paper is structured as a narrative about the expansion of the educational state and the concomitant development of technologies of inclusion and exclusion. Snapshots of various educators’ work with “OPCs” are woven into the narrative.

Findings

Notwithstanding contemporary efforts to “confront educational disadvantage” and an ever increasing array of technologies with which to differentiate students, OPCs remain on the margins of Australian education.

Originality/value

This paper is a unique look at Australian educators’ work with “OPCs” over the past 175 years.

Details

History of Education Review, vol. 44 no. 1
Type: Research Article
ISSN: 0819-8691

Keywords

Access

Year

Content type

Article (12)
1 – 10 of 12