Search results
1 – 10 of 21Sina Furnes Øyri, David W. Bates and Siri Wiig
The authors compare perspectives on external evaluation of health service provision between Norway and the USA. External inspection and accreditation are examples of…
Abstract
Purpose
The authors compare perspectives on external evaluation of health service provision between Norway and the USA. External inspection and accreditation are examples of internationally wide-spread external evaluation methods used to assess the quality of care given to patients. Different countries have different national policy strategies and arrangements set up to do these evaluations. Although there is growing attention to the impact and effects on quality and safety from external evaluation, there is still a gap in knowledge to how structures and processes influence these outcomes. Accordingly, the purpose of this article is to describe the structures and processes in external evaluation designed to promote quality improvement in Norway and the USA with attention to comparison of enablers and barriers in external evaluation systems.
Design/methodology/approach
Data collection consisted of documentary evidence retrieved from governmental policies, and reviews of the Joint Commission (the US), international guidelines, recommendations and reports from the International Society for Quality in Health Care, and the World Health Organization, and policies and regulations related to Norwegian governmental bodies such as the Ministry of Health and Care Services, the Norwegian Directorate of Health, and the Norwegian Board of Health Supervision . Data were analyzed inspired by a deductive, direct content analytical framework.
Findings
The authors found that both accreditation and inspection are strategies put in place to ensure that healthcare providers have adequate quality systems as well as contributing to the wider risk and safety enhancing management and implementation processes in the organizations subjected to evaluation. The US and the Norwegian external regulatory landscapes are complex and include several policymaking and governing institutions. The Norwegian regulatory framework for inspection has replaced an individual blame logic with a model which “blames” the system for inadequate quality and patient harm. This contrasts with the US accreditation system, which focuses on accreditation visits. Although findings indicate an ongoing turning point in accreditation, findings also demonstrate that involving patients and next of kin directly in adverse event inspections is a bigger part of a change in external inspection culture and methods than in processes of accreditation.
Research limitations/implications
The message of this paper is important for policymakers, and bodies of inspection and accreditation because knowledge retrieved from the comparative document study may contribute to better understanding of the implications from the different system designs and in turn contribute to improving external evaluations.
Originality/value
Although there is a growing attention to the impact and effects on quality and safety from external evaluation, the implications of different regulatory strategies and arrangements for evaluation on quality and safety remain unclear.
Details
Keywords
Gihani S. Rajapakse and K. Kiran
The purpose of this paper is to explore succession planning in academic libraries, specifically to understand how succession planning is carried out and how the decisions-making…
Abstract
Purpose
The purpose of this paper is to explore succession planning in academic libraries, specifically to understand how succession planning is carried out and how the decisions-making styles of library managers influence each stage of the succession planning.
Design/methodology/approach
A qualitative approach was used to gather data through a document analysis and interviews with library managers at four Sri Lankan university libraries. Data analysis was done applying the framework analysis (FA) tool.
Findings
The study revealed that succession planning has been practiced in Sri Lankan university libraries to develop a bench strength, skilled backup for key positions at all levels, while inculcating leadership competencies in their respective positions. The dominant decision style is the identifiable decision-making style within the succession planning process.
Research limitations/implications
The volume of the data obtained depends largely on the participants’ responses, and the interpretation of the data is subjected to minimum personal biasness of the researcher.
Practical implications
An understanding of how decision-making styles influence practices of succession planning contributes to assist library managers to carry out succession planning within the limitations of their autonomy to do so. The findings of this study benefit library managers in recognizing their own decision-making styles and the level of succession planning they have achieved.
Social implications
Library managers’ decision-making style can have an influence on how succession planning is carried out successfully at an academic library to ensure continuity of the library’s mission and vision.
Originality/value
This is the first known study to investigate how decision-making style of the manager influences each level of the succession planning at an academic library. The use of a systematic FA method for the qualitative data analysis reveals trustworthy results.
Details
Keywords
The purpose of this paper is to provide a framework to thinking and creating scenarios about future crimes and terror attacks relying on the Internet of Things (IoT), and to…
Abstract
Purpose
The purpose of this paper is to provide a framework to thinking and creating scenarios about future crimes and terror attacks relying on the Internet of Things (IoT), and to present a crowdsourcing research based on this thinking, which resulted in both high- and low-probability scenarios with dramatic impact.
Design/methodology/approach
The research relies on general morphological analysis for deconstructing wicked problems into core components, and on crowdsourcing 50 experts on Wikistrat’s commercial platform, allowing them to suggest core components, rank them by importance and develop scenarios together. This methodology allowed a wider view than usual, and allowed the experts to examine unorthodox combination of components, leading to the creation of wild-card scenarios.
Findings
Analysis of both the core components and the resulting scenarios indicates that the IoT is set to have a dramatic role in crime and terror attacks in the near future. High-impact high-probability scenarios include attacks on power plants, cyber wallets and personal assistants. High-impact low-probability scenarios include terrorist attacks by environmentalist groups, accidental attacks conducted by immature pranksters and having a computer worm propagating in a low-security but critical facility like a hospital.
Originality/value
This paper brings a standardized method which can be used to examine complex events like crime and terror attacks using a disruptive and emerging technology. The results can be used by practitioners to further study the issue and develop many other scenarios more tailored to their needs. The scenarios presented in this paper can also be of value to security bodies who wish to be better prepared for the future.
Details
Keywords
With the upgrade of natural language interaction technology, the simulation extension of intelligent voice assistants (IVAs) and the uncertainty of products and services have…
Abstract
Purpose
With the upgrade of natural language interaction technology, the simulation extension of intelligent voice assistants (IVAs) and the uncertainty of products and services have received more and more attention. However, most of the existing research focuses on investigating the application of theories to explain consumer behavior related to intention to use and adopt IVAs, while ignoring the impact of its privacy issues on consumer resistance. This article especially examines the negative impact of artificial intelligence-based IVAs’ privacy concerns on consumer resistance, and studies the mediating effect of perceived creepiness in the context of privacy cynicism and privacy paradox and the moderating effect of anthropomorphized roles of IVAs and perceived corporate social responsibility (CSR) of IVAs’ companies. The demographic variables are also included.
Design/methodology/approach
Based on the theory of human–computer interaction (HCI), this study addresses the consumer privacy concerns of IVAs, builds a model of the influence mechanism on consumer resistance, and then verifies the mediating effect of perceived creepiness and the moderating effect of anthropomorphized roles of IVAs and perceived CSR of IVAs companies. This research explores underlying mechanism with three experiments.
Findings
It turns out that consumers’ privacy concerns are related to their resistance to IVAs through perceived creepiness. The servant (vs. partner) anthropomorphized role of IVAs is likely to induce more privacy concerns and in turn higher resistance. At the same time, when the company’s CSR is perceived high, the impact of the concerns of IVAs’ privacy issues on consumer resistance will be weakened, and the intermediary mechanism of perceiving creepiness in HCI and anthropomorphism of new technology are further explained and verified. The differences between different age and gender are also revealed in the study.
Originality/value
The research conclusions have strategic reference significance for enterprises to build the design framework of IVAs and formulate the response strategy of IVAs’ privacy concerns. And it offers implications for researchers and closes the research gap of IVAs from the perspective of innovation resistance.
Details
Keywords
Muhammad Ali, Chin-Hong Puah, Norazirah Ayob and Syed Ali Raza
Local foods from the perspective of tourism play a significant role to attract tourists. Surprisingly, empirical evidence on food tourism is quite scarce. The purpose of this…
Abstract
Purpose
Local foods from the perspective of tourism play a significant role to attract tourists. Surprisingly, empirical evidence on food tourism is quite scarce. The purpose of this paper is to develop and investigate a conceptual framework on tourist satisfaction, loyalty and word of mouth (WOM) to select local foods in Pakistan.
Design/methodology/approach
The study uses a quantitative approach while convenience (non-probability) sampling is used to collect a sample of 286 final responses using a survey-based questionnaire. The study employed exploratory factor analysis and confirmatory factor analysis to stabilize the factor structure. The conceptual model is then tested under the assumptions of structural equation modeling.
Findings
The findings indicate that food quality, perceived environmental quality, perceived value and service quality has a significant impact on the tourist’s satisfaction. However, interpersonal interaction quality shows an insignificant influence on satisfaction. Moreover, satisfaction has a significant impact on loyalty while loyalty further shows a significant effect on tourist WOM. Overall, the authors found satisfaction and loyalty are the major contributors to the hypothesized model.
Practical implications
The conceptual framework and study findings will support practitioners and researchers to understand the factors that influence a tourist’s selection of local foods. Additionally, the study provides a useful policy to gain long-term economic benefits for the tourism sector in Pakistan.
Originality/value
To the authors’ best knowledge, this study is the first attempt to explore WOM behavior in tourism research focusing on the critical role of satisfaction and loyalty. The authors are certain that the findings will contribute significantly to the existing body of knowledge.
Details
Keywords
As mobile malware and virus are rapidly increasing in frequency and sophistication, mobile social media has recently become a very popular attack vector. The purpose of this paper…
Abstract
Purpose
As mobile malware and virus are rapidly increasing in frequency and sophistication, mobile social media has recently become a very popular attack vector. The purpose of this paper is to survey the state-of-the-art of security aspect of mobile social media, identify recent trends, and provide recommendations for researchers and practitioners in this fast moving field.
Design/methodology/approach
This paper reviews disparate discussions in literature on security aspect of mobile social media though blog mining and an extensive literature search. Based on the detailed review, the author summarizes some key insights to help enterprises understand security risks associated with mobile social media.
Findings
Risks related to mobile social media are identified based on the results of the review. Best practices and useful tips are offered to help enterprises mitigate risks of mobile social media. This paper also provides insights and guidance for enterprises to mitigate the security risks of mobile social media.
Originality/value
The paper consolidates the fragmented discussion in literature and provides an in-depth review to help researchers understand the latest development of security risks associated with mobile social media.
Details
Keywords
Karolin Köhler and Ansgar Zerfass
The purpose of this paper is to address an important but seldom explored field of study: the communication of corporate strategies to external and internal stakeholders. The…
Abstract
Purpose
The purpose of this paper is to address an important but seldom explored field of study: the communication of corporate strategies to external and internal stakeholders. The relevance of the topic can be tracked both in communication studies and in management research, but empirical insights are rare. The paper addresses this research gap by asking: How do listed companies in key industrial markets communicate publicly about their corporate strategy?
Design/methodology/approach
A comprehensive content analysis of corporate websites was conducted for a sample of the 20 largest listed companies in the UK, the USA and Germany (n=60). The subsequent benchmark analysis has identified best practices and highlighted them in detail.
Findings
The study revealed significant differences between companies and countries in the sample for most of the dimensions. Cross-country comparisons confirm these differences statistically: German companies score significantly higher in the benchmark than British or US companies.
Practical implications
This paper outlines quality criteria for professional strategy communication, helping practitioners to improve their activities and contribute to organizational goals.
Originality/value
The study offers a holistic approach to strategy communication by providing an interdisciplinary theoretical foundation as well as insights into corporate practice, with the aim of laying the ground for further research and discussion in both academia and practice.
Details