Search results

1 – 10 of over 107000
Article
Publication date: 21 March 2019

Patrick Mapulanga, Jaya Raju and Thomas Matingwina

The purpose of this study is to examine levels of health research evidence in health policies in Malawi.

370

Abstract

Purpose

The purpose of this study is to examine levels of health research evidence in health policies in Malawi.

Design/methodology/approach

The study selected a typology of health policies in Malawi from 2002 to 2017. The study adopted the SPIRIT conceptual framework and assessed the levels of research evidence in health policy, systems and services research using the revised SAGE policy assessment tool. Documentary analysis was used to assess levels of health research evidence in health policies in Malawi.

Findings

In 29 (96.7 per cent) of the health policies, policy formulators including healthcare directors and managers used generic search engines such as Google or Google Scholar to look for heath research evidence. In 28 (93.3 per cent) of the health policies, they searched for grey literature and other government documents. In only 6 (20 per cent) of the heath policy documents, they used academic literature in a form of journal articles and randomised controlled trials. No systematic reviews or policy briefs were consulted. Overall, in 23 (76.7 per cent) of the health policy documents, health research evidence played a minimal role and had very little influence on the policy documents or decision-making.

Research limitations/implications

The empirical evidence in the health policy documents are limited because of insufficient research citation, low retrievability of health research evidence in the policy documents and biased selectivity of what constitutes health research evidence.

Practical implications

The study indicates that unfiltered information (data from policy evaluations and registries) constitutes majority of the research evidence in health policies both in health policy, systems and services research. The study seeks to advocate for the use of filtered information (peer reviewed, clinical trials and data from systematic reviews) in formulating health policies.

Originality/value

There is dearth of literature on the levels of health research evidence in health policy-making both in health policy, systems and services research. This study seeks to bridge the gap with empirical evidence from a developing country perspective.

Details

Leadership in Health Services, vol. 32 no. 2
Type: Research Article
ISSN: 1751-1879

Keywords

Book part
Publication date: 3 July 2018

Tariq Elyas and Abdullah Ahmed Al-Ghamdi

This chapter briefly explores selected English and general education policy documents, curricula, and textbooks within the context of Kingdom of Saudi Arabia (KSA) from a Critical…

Abstract

This chapter briefly explores selected English and general education policy documents, curricula, and textbooks within the context of Kingdom of Saudi Arabia (KSA) from a Critical Discourse Analysis perspective and examines how they have changed pre- and post-21st century. First, a policy document related to education in KSA in general (pre-21st century) is analyzed along with an English language teaching (ELT) policy document of the same period. Next, two general policy documents post-21st century are explored, followed by one related to ELT policy. Finally, one post-21st century document related to higher education is discussed. The “network of practices” within which these documents are situated are first detailed, as well as the structural order of the discourse, and some linguistic analysis of the choice of vocabulary and grammatical structures (Meyer, 2001). Issues which might be problematic to the learning and teaching identities of the students and teachers interpreting these documents are also highlighted. Finally, we consider whether the network of practices at this institution and KSA in general “needs” the problems identified in the analysis and critically reflect on the analysis.

Details

Cross-nationally Comparative, Evidence-based Educational Policymaking and Reform
Type: Book
ISBN: 978-1-78743-767-8

Keywords

Article
Publication date: 11 September 2017

Colette Henry, Barbara Orser, Susan Coleman and Lene Foss

Government attention to women’s entrepreneurship has increased in the past two decades; however, there are few cross-cultural studies to inform policy development. This paper aims…

1446

Abstract

Purpose

Government attention to women’s entrepreneurship has increased in the past two decades; however, there are few cross-cultural studies to inform policy development. This paper aims to draw on gender and institutional theory to report on the status of female-focused small and medium-sized enterprises/entrepreneurship policies and to ask how – and to what extent – do women’s entrepreneurship policies differ among countries?

Design/methodology/approach

A common methodological approach is used to identify gaps in the policy-practice nexus.

Findings

The study highlights countries where policy is weak but practice is strong, and vice versa.

Research limitations/implications

The study’s data were restricted to policy documents and observations of practices and initiatives on the ground.

Practical implications

The findings have implications for policy makers in respect of support for women’s entrepreneurship. Recommendations for future research are advanced.

Originality/value

The paper contributes to extant knowledge and understanding about entrepreneurship policy, specifically in relation to women’s entrepreneurship. It is also one of the few studies to use a common methodological approach to explore and compare women’s entrepreneurship policies in 13 countries.

Details

International Journal of Gender and Entrepreneurship, vol. 9 no. 3
Type: Research Article
ISSN: 1756-6266

Keywords

Book part
Publication date: 19 July 2022

Ericka L. Galegher, Petrina M. Davidson, Joseph Elefante, Guadalupe Bright and Lisa Damaschke-Deitrick

The objective of this chapter is to analyze educational leadership policy in New Jersey, US, and Ontario, Canada, focusing on the inclusion of the unique needs of systematically

Abstract

The objective of this chapter is to analyze educational leadership policy in New Jersey, US, and Ontario, Canada, focusing on the inclusion of the unique needs of systematically marginalized students, specifically refugees and forced immigrant (RFI) youth. Modes of inquiry are qualitative document analysis of New Jersey and Ontario leadership policies, preparation requirements, and standards. The objective of this paper is to present an extensive literature review of policies related to educational leadership and supporting RFI youth and their teachers as well as to reveal gaps in policies and examine pre- and in-service training requirements. Within the field of comparative and international education, this chapter highlights the institutionalization of trends in educational leadership at state or provincial levels and how these macro-level policies influence educators’ abilities to meet the needs of students from marginalized communities, such as refugees and immigrants.

Details

Annual Review of Comparative and International Education 2021
Type: Book
ISBN: 978-1-80382-618-9

Keywords

Article
Publication date: 20 November 2009

Tomasz Müldner, Gregory Leighton and Jan Krzysztof Miziołek

The purpose of this paper is to consider the secure publishing of XML documents, where a single copy of an XML document is disseminated and a stated role‐based access control…

Abstract

Purpose

The purpose of this paper is to consider the secure publishing of XML documents, where a single copy of an XML document is disseminated and a stated role‐based access control policy (RBACP) is enforced via selective encryption. It describes a more efficient solution over previously proposed approaches, in which both policy specification and key generation are performed once, at the schema‐level. In lieu of the commonly used super‐encryption technique, in which nodes residing in the intersection of multiple roles are encrypted with multiple keys, it describes a new approach called multi‐encryption that guarantees each node is encrypted at most once.

Design/methodology/approach

This paper describes two alternative algorithms for key generation and single‐pass algorithms for multi‐encrypting and decrypting a document. The solution typically results in a smaller number of keys being distributed to each user.

Findings

The paper proves the correctness of the presented algorithms, and provides experimental results indicating the superiority of multi‐encryption over super‐encryption, in terms of encryption and decryption time requirements. It also demonstrates the scalability of the approach as the size of the input document and complexity of the schema‐level RBACP are increased.

Research limitations/implications

An extension of this work involves designing and implementing re‐usability of keyrings when a schema or ACP is modified. In addition, more flexible solutions for handling cycles in schema graphs are possible. The current solution encounters difficulty when schema graphs are particularly deep and broad.

Practical implications

The experimental results indicate that the proposed approach is scalable, and is applicable to scenarios in which XML documents conforming to a common schema are to be securely published.

Originality/value

This paper contributes to the efficient implementation of secure XML publication systems.

Details

International Journal of Web Information Systems, vol. 5 no. 4
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 1 July 2016

Stephanie van Hover, David Hicks, Elizabeth Washington and Melissa Lisanti

This study examined and traced the relationship between, and the influence of, the official standards documents of the Commonwealth of Virginia, and the related day-to-day lesson…

Abstract

This study examined and traced the relationship between, and the influence of, the official standards documents of the Commonwealth of Virginia, and the related day-to-day lesson planning and implementation of a pair of co-teachers. Using a case study methodology alongside a conventional content analysis we traced the processes of how these policy texts (the Standards of Learning [SOLs] for World History) were connected to and activated within the daily routines of these teachers who taught struggling students in a high-stakes testing context. The findings illustrated how the policy texts and discursive practices emerging from the State’s SOLs constituted a level of pedagogical governance that saw these teachers organize instruction clearly designed to support student recall on the end of year multiple choice test. Our work recognized the power of policy texts as they interact with teachers. The significance of unpacking policy documents in order to examine issues of power, symmetry and potential areas of negotiation in the planning and implementation of instruction for teacher educators is discussed.

Details

Social Studies Research and Practice, vol. 11 no. 2
Type: Research Article
ISSN: 1933-5415

Keywords

Article
Publication date: 1 July 2005

Patrick D. Robbins and Alicia G. Huffman

To provide guidance to investment companies on document retention policies based on Section 802 of the Sarbanes‐Oxley Act of 2002, codified as Section 1519 of the United States…

Abstract

Purpose

To provide guidance to investment companies on document retention policies based on Section 802 of the Sarbanes‐Oxley Act of 2002, codified as Section 1519 of the United States Code.

Design/methodology/approach

Reviews the conviction of Arthur Andersen for obstruction of justice based on the way the firm implemented its document retention/destruction policy as Enron was collapsing, and the Supreme Court reversal of that conviction. Explains why the Supreme Court decision should no longer guide an investment company's document retention/destruction policy in light of more recently enacted Section 1519, which imposes stiff penalties on anyone who knowingly alters, destroys, mutilates, conceals, or covers up any record or document with the intent to impede, obstruct, or influence any federal investigation, or in contemplation of such a proceeding.

Findings

Suggests a few straightforward rules for an investment company's document retention/destruction policy with a warning to err on the side of caution.

Originality/value

In light of Section 1519, every investment company needs to review its document retention/destruction policy. This article provides useful guidelines for doing so.

Details

Journal of Investment Compliance, vol. 6 no. 3
Type: Research Article
ISSN: 1528-5812

Keywords

Book part
Publication date: 23 November 2022

Etienne Woo

Studying Chinese higher education internationalization policy-making requires paying attention to the political ontology of China's top-designed policy-making system before…

Abstract

Studying Chinese higher education internationalization policy-making requires paying attention to the political ontology of China's top-designed policy-making system before proceeding to methodological approaches. The ontology is two-fold: a fixed reality grounded in the structure and agency of the one-party state, and an emergent reality that derives from the pervasive practice of using policy documents to govern. A two-pronged epistemology is proposed to uncover these realities: interpretative and poststructural problematization. Interpretative problematization helps discern how policy-makers frame a problem–solution discourse in policy documents to achieve predetermined strategic objectives. Contrastingly, poststructural problematization views policy documents as prescriptive texts that offer rules on how to behave. The potential methodologies drawn from the tradition of critical policy sociology can be employed to study these two problematizations, thereby unpacking the fixed and emergent realities.

Details

Theory and Method in Higher Education Research
Type: Book
ISBN: 978-1-80455-385-5

Keywords

Article
Publication date: 11 April 2016

Christina Hadjisoteriou and Panayiotis Angelides

The overarching purpose of this paper is to explore the transformation of intercultural education in Cyprus in the context of European integration. More specifically, it indicates…

Abstract

Purpose

The overarching purpose of this paper is to explore the transformation of intercultural education in Cyprus in the context of European integration. More specifically, it indicates the ways in which intercultural policy has been formed by complex and often counteractive influences. The analysis draws upon policy documents collected from the Ministry of Education and Culture (MEC) and interviews carried out with Cypriot policy-makers. Europe has come to play an important role in the development of Cypriot intercultural policy by becoming a mechanism of pressure for educational change. Through monitoring processes, Europe has indicated problems deriving from the culturally pluralistic character of the Cypriot society that should be addressed by national policies. In this context, Cyprus has initiated an educational reform, including a reform of the national curriculum towards a more intercultural orientation. Nonetheless, the findings of this research assert that there is a gap between policy rhetoric and practice.

Design/methodology/approach

This study reports on an analysis of the policy dynamics influencing intercultural education in the Greek–Cypriot context. The authors aim to examine the context and content of educational policies and directives which have been initiated and/or developed at the Greek–Cypriot level. To this end, the authors drew upon policy documentary and data derived from interviews conducted with Greek–Cypriot policy-makers and education officers.

Findings

It appears that intercultural education became an important part of the state’s rhetoric. Cyprus has initiated an educational reform, including a reform of the national curriculum towards a more intercultural orientation. Therefore, since 2008, the state and particularly the MEC have replaced the previously used term of multicultural education with the rhetoric of intercultural education and inclusion as the preferable educational responses to immigration.

Research limitations/implications

The findings of this study suggest that the development of intercultural education requires the re-conceptualisation and re-structuring of the Cypriot educational system and schooling. The state should adopt a balanced governance model between school autonomy and centralised management.

Practical implications

This paper can help schools and teachers to improve their intercultural education approach.

Social implications

The findings could be helpful for improving the intercultural education policy in Cyprus.

Originality/value

These research finding are the first that deal with intercultural education policy in Cyprus.

Details

Journal for Multicultural Education, vol. 10 no. 1
Type: Research Article
ISSN: 2053-535X

Keywords

Article
Publication date: 11 December 2019

Jake Weidman and Jens Grossklags

Colleges and universities across the USA have seen data breaches and intellectual property theft rise at a heightened rate over the past several years. An integral step in the…

Abstract

Purpose

Colleges and universities across the USA have seen data breaches and intellectual property theft rise at a heightened rate over the past several years. An integral step in the first line of defense against various forms of attacks are (written) security policies designed to prescribe the construction and function of a technical system, while simultaneously guiding the actions of individuals operating within said system. Unfortunately, policy analysis is an insufficiently discussed topic in many academic communities with very little research being conducted in this space.

Design/methodology/approach

This work aims to assess the current state of information security policies by analyzing in-use policies from 200 universities and colleges in the USA with the goal of identifying important features and general attributes of these documents. The authors accomplish this through a series of analyzes designed to examine the language and construction of these policies.

Findings

To summarize high-level results, the authors found that only 54 per cent of the top 200 universities had publicly accessible information security policies, and the policies that were examined lacked consistency with little shared source material. The authors also found that the tonal makeup of these policies lacked a great deal of emotion, but contained a high amount of tentative or ambiguous language leading toward policies that could be viewed as “unclear.”

Originality/value

This work is an extension of a paper that was presented at ECIS 2018. The authors have added additional analyzes including a cross-policy content and tonal analysis to strengthen the findings and implications of this work for the wider research audience.

Details

Information & Computer Security, vol. 28 no. 3
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of over 107000