Search results

1 – 10 of over 60000
Content available
Book part
Publication date: 19 November 2020

Daria Matyushina-Ocheret

Eastern Europe and Central Asia (EECA) is home to 21% of the world’s population of people who inject drugs and it is the region with the fastest-growing HIV epidemic. HIV…

Abstract

Eastern Europe and Central Asia (EECA) is home to 21% of the world’s population of people who inject drugs and it is the region with the fastest-growing HIV epidemic. HIV prevalence among women who inject drugs is significantly higher than among men in EECA. Even in places with high coverage of needle syringe programmes and HIV testing and treatment, women’s access to opioid substitution treatment is lower than men, and women’s sexual and reproductive health needs remain unaddressed. EECA has a unique system of drug registries that store the personal data of people who use drugs. Registration lowers the chances of employment and access to education and for women and increases the risk of losing custody of their children. The system of drug registries contributes to drug-related stigma. Breaches of confidentiality of drug registry data lead to the further marginalisation of women who use drugs. Criminalisation, past experience of police violence and poverty contribute to healthcare access barriers for women. There is a need for legislative changes to improve personal data protection, decriminalise drug use and reduce police violence. The positive effects of these changes would only be seen in the long term. In the interim, women need special access programmes that are designed specifically to address their needs, that provide free-of-charge services and that ensure the safety and confidentiality of personal data.

Details

The Impact of Global Drug Policy on Women: Shifting the Needle
Type: Book
ISBN: 978-1-83982-885-0

To view the access options for this content please click here
Article
Publication date: 16 June 2021

Jessica Pace, Narcyz Ghinea, Sallie-Anne Pearson, Ian Kerridge and Wendy Lipworth

In this study, the authors aimed to explore consumer perspectives on accelerated access to medicines. The authors were particularly interested in how they balance…

Abstract

Purpose

In this study, the authors aimed to explore consumer perspectives on accelerated access to medicines. The authors were particularly interested in how they balance competing considerations of safety, efficacy, equity and access; whether and how their views change when there are different levels of uncertainty surrounding the safety and efficacy of new medicines; and the procedures that they think should be used to make decisions about accelerated access to new medicines.

Design/methodology/approach

This was an exploratory qualitative study. Thirteen semi-structured interviews with patient advocates and two focus groups with patients were conducted and analysed thematically. Interviews and focus groups were audio recorded and transcribed verbatim. Data were analysed through inductive thematic analysis.

Findings

Participants outlined a range of justifications for accelerated access, including addressing unmet medical needs and encouraging further research and development. However, they were also cognisant of the potential risks and viewed ongoing data collection, disinvestment and market withdrawal as ways to address these. They also emphasised the importance of transparent decisions being made by people with relevant expertise, based on a thorough consideration of scientific evidence and stakeholder perspectives.

Originality/value

This is the first study to comprehensively explore Australian consumers' views of accelerated access to medicines. The results suggest that consumers want timely access to new medicines, but not at the expense of safety, efficacy, equity and sustainability. While accelerated access programs are likely to be welcomed by consumers, they must be fully informed of their conditions and limitations, and robust post-market data surveillance must be implemented and enforced to protect the interests of both individual patients and the broader community.

Details

Journal of Health Organization and Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1477-7266

Keywords

To view the access options for this content please click here
Article
Publication date: 5 August 2014

Shreesh Deshpande and Vijay Jog

This study aims to examine a large, non-disclosed production contract awarded to Lockheed Corp. in the context of a trade-off between a contractually required…

Abstract

Purpose

This study aims to examine a large, non-disclosed production contract awarded to Lockheed Corp. in the context of a trade-off between a contractually required non-disclosure clause and the need (as a publicly traded firm) to disclose material information to its shareholders. This production contract generated significant cash flows to the firm as evidenced by growth in its earnings. However, the existence of the production contract and its contribution to Lockheed’s earnings, was not disclosed by the firm to shareholders and potential investors while the production contract was being executed.

Design/methodology/approach

The authors examine the market reaction to several key contract events which were not disclosed at the time they occurred, in compliance with the contractually required non-disclosure clause.

Findings

A statistically significant stock price reaction around the time of the award of this non-public contract, indicative of trading by some capital market participants using non-public information was documented.

Originality/value

Because similar large non-public contracts funded by the government are common in the industrial economy, we conclude by discussing implications for organizational structure, firm’s cost of capital, equity-based compensation and market efficiency.

Details

Review of Accounting and Finance, vol. 13 no. 3
Type: Research Article
ISSN: 1475-7702

Keywords

To view the access options for this content please click here
Article
Publication date: 12 January 2015

Bharat Mehra and Rebecca Davis

The purpose of this research-based philosophical piece is to present a progressive manifesto for public libraries in the 21st century to address gaps in embracing…

Abstract

Purpose

The purpose of this research-based philosophical piece is to present a progressive manifesto for public libraries in the 21st century to address gaps in embracing diversity in its holistic dimensions and representing such information in their strategic planning and web documentations.

Design/methodology/approach

Content analysis of public library websites in the USA informed the development of a Strategic Diversity Manifesto that includes the “who”, the “what” and the “how” components to describe and discuss diversity-related matters in their strategic planning and web representations.

Findings

The Strategic Diversity Manifesto provides a mechanism for individual public library agencies, in their localized context and environment, to strategically inquire, describe, discuss, reflect, analyze and translate into concretized actions their picture of diversity as grounded in the reality of their representative communities.

Originality/value

The Strategic Diversity Manifesto presents a more a comprehensive and consolidated picture of diversity beyond isolated strategies seen in past efforts. It is a broader level of analysis and “picture painting” of the agency’s context, which may not be as detailed as compared to other modes of description, though as a result, it is more holistic instead of fragmentary. The aim is first and foremost to provide a basis for reflective thought and discussion.

Details

New Library World, vol. 116 no. 1/2
Type: Research Article
ISSN: 0307-4803

Keywords

To view the access options for this content please click here

Abstract

Details

Navigating the Investment Minefield
Type: Book
ISBN: 978-1-78769-053-0

To view the access options for this content please click here
Article
Publication date: 1 February 1998

Jennivine Kwok and Richard Jones

The aim of this paper is to demonstrate how an imaginative sourcing policy can be used to provide a competitive advantage for clothing manufacturers based in high‐cost…

Abstract

The aim of this paper is to demonstrate how an imaginative sourcing policy can be used to provide a competitive advantage for clothing manufacturers based in high‐cost countries. The paper shows how Chorus Line Corporation implemented their sourcing mix, through a combination of production in different regions, to maintain and develop their competitive position in the womenswear market in the USA. The company's basic data and decisions are outlined as an example of how one privately owned company views the sourcing and production decision. In this way the paper will help firms to develop their own global production strategies with balanced sources to meet their business and market strategies.

Details

Journal of Fashion Marketing and Management: An International Journal, vol. 2 no. 2
Type: Research Article
ISSN: 1361-2026

Keywords

To view the access options for this content please click here
Article
Publication date: 1 December 2004

Robert J. Starratt

This paper summarizes and compares the perspectives of the prior essays in this issue. Goes on to argue that education for democracy requires dialogical, authentic…

Abstract

This paper summarizes and compares the perspectives of the prior essays in this issue. Goes on to argue that education for democracy requires dialogical, authentic learning rather than the commodification of uniform, standardized knowledge and its acquisition touted by those marketizing education primarily for economic purposes. The paper calls upon educators and university scholars to resist the identification of learning with text scores, and to defend the traditional role of learning in the human emancipation of citizens whose knowledge and life lessons learned in school contribute to their wise governance of themselves.

Details

Journal of Educational Administration, vol. 42 no. 6
Type: Research Article
ISSN: 0957-8234

Keywords

To view the access options for this content please click here
Article
Publication date: 1 February 2005

Sangkyun Kim and Choon Seong Leem

To identify controls that can harness the power and capabilities of instant messengers (IM) while minimizing potential security risks.

Abstract

Purpose

To identify controls that can harness the power and capabilities of instant messengers (IM) while minimizing potential security risks.

Design/methodology/approach

A risk analysis method and (CIS)2 model are used.

Findings

IM is a great tool for enterprise productivity. However, it has so many risks, but one could identify and control these risks with technical and managerial countermeasures.

Research limitations/implications

This paper fails to provide detailed and specific risks of commercial IMs, and the case study provided in this paper focuses on the technical rather than managerial issues.

Practical implications

A very helpful case study which provides general risks and controls of recent IMs for the security officers of various organizations.

Originality/value

This paper outlined the risks of IM and potential controls for securing public IM in the workplace.

Details

Internet Research, vol. 15 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

To view the access options for this content please click here

Abstract

Details

Investment Traps Exposed
Type: Book
ISBN: 978-1-78714-253-4

To view the access options for this content please click here
Article
Publication date: 1 September 2005

Sangkyun Kim and Choon Seong Leem

To provide the strategic model of approach which helps enterprise executives to solve the managerial problems of planning, implementation and operation about information…

Abstract

Purpose

To provide the strategic model of approach which helps enterprise executives to solve the managerial problems of planning, implementation and operation about information security in business convergence environments.

Design/methodology/approach

A risk analysis method and baseline controls of BS7799 were used to generate security patterns of business convergence. With the analysis of existing enterprise architecture (EA) methods, the framework of the enterprise security architecture was designed.

Findings

The adaptive framework, including the security patterns with quantitative factors, enterprise security architecture with 18 dimensions, and reference models in business convergence environments, is provided.

Research limitations/implications

Information assets and baseline controls should be subdivided to provide more detailed risk factors and weight factors of each business convergence strategy. Case studies should be performed continuously to consolidate contents of best practices.

Practical implications

With the enterprise security architecture provided in this paper, an enterprise that tries to create a value‐added business model using convergence model can adapt itself to mitigate security risks and reduce potential losses.

Originality/value

This paper outlined the business risks in convergence environments with risk analysis and baseline controls. It is aguably the first attempt to adapt the EA approach for enterprise executives to solve the security problems of business convergence.

Details

Industrial Management & Data Systems, vol. 105 no. 7
Type: Research Article
ISSN: 0263-5577

Keywords

1 – 10 of over 60000