Search results

1 – 4 of 4
Content available
1013

Abstract

Details

Clinical Governance: An International Journal, vol. 12 no. 4
Type: Research Article
ISSN: 1477-7274

Open Access
Article
Publication date: 12 February 2018

Kerry Wilbur, Arwa Sahal and Dina Elgaily

Patient safety is gaining prominence in health professional curricula. Patient safety must be complemented by teaching and skill development in practice settings. The purpose of…

Abstract

Purpose

Patient safety is gaining prominence in health professional curricula. Patient safety must be complemented by teaching and skill development in practice settings. The purpose of this paper is to explore how experienced pharmacists identify, prioritize and communicate adverse drug effects to patients.

Design/methodology/approach

A focus group discussion was conducted with cardiology pharmacy specialists working in a Doha hospital, Qatar. The topic guide sought to explore participants’ views, experiences and approaches to educating patients regarding specific cardiovascular therapy safety and tolerability. Discussions were audio-recorded and transcribed verbatim. Data were coded and organized around identified themes and sub-themes. Working theories were developed by the three authors based on relevant topic characteristics associated with the means in which pharmacists prioritize and choose adverse effect information to communicate to patients.

Findings

Nine pharmacists participated in the discussion. The specific adverse effects prioritized were consistent with the reported highest prevalence. Concepts and connections to three main themes described how pharmacists further tailored patient counseling: potential adverse effects and their perceived importance; patient encounter; and cultural factors. Pharmacists relied on initial patient dialogue to judge an individual’s needs and capabilities to digest safety information, and drew heavily upon experience with other counseling encounters to further prioritize this information, processes dependent upon development and accessing exemplar cases.

Originality/value

The findings underscore practical experience as a critical instructional element of undergraduate health professional patient safety curricula and for developing associated clinical reasoning.

Details

International Journal of Health Care Quality Assurance, vol. 31 no. 1
Type: Research Article
ISSN: 0952-6862

Keywords

Content available
Article
Publication date: 1 February 2005

Ronald E. McGaughey

86

Abstract

Details

Benchmarking: An International Journal, vol. 12 no. 1
Type: Research Article
ISSN: 1463-5771

Open Access
Article
Publication date: 11 September 2017

Michel van Eeten

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global…

5195

Abstract

Purpose

The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed fight and the actual control over cybersecurity “on the ground”. This paper aims to reconnect discourse and control via a property rights approach, where control is located first and foremost in ownership.

Design/methodology/approach

This paper first conceptualizes current governance mechanisms through ownership and property rights. These concepts locate control over internet resources. They also help us understand ongoing shifts in control. Such shifts in governance are actually happening, security governance is being patched left and right, but these arrangements bear little resemblance to either the national security model of states or the global model of multi-stakeholder collaboration. With the conceptualization in hand, the paper then presents case studies of governance that have emerged around specific security externalities.

Findings

While not all mechanisms are equally effective, in each of the studied areas, the author found evidence of private actors partially internalizing the externalities, mostly on a voluntary basis and through network governance mechanisms. No one thinks that this is enough, but it is a starting point. Future research is needed to identify how these mechanisms can be extended or supplemented to further improve the governance of cybersecurity.

Originality/value

This paper bridges together the disconnected research communities on governance and (technical) cybersecurity.

Details

Digital Policy, Regulation and Governance, vol. 19 no. 6
Type: Research Article
ISSN: 2398-5038

Keywords

Access

Only content I have access to

Year

Content type

1 – 4 of 4