Search results

1 – 8 of 8
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 4 January 2013

Dean T. Williams, David Hoare, Guy Shingler, Charlie Fairweather and Christopher Whitaker

Clinical data capture and transfer are becoming more important as hospital practices change. Medical record pro‐formas are widely used but their efficacy in acute settings is…

478

Abstract

Purpose

Clinical data capture and transfer are becoming more important as hospital practices change. Medical record pro‐formas are widely used but their efficacy in acute settings is unclear. This paper aims to assess whether pro‐forma and aide‐memoire recording aids influence data collection in acute medical and surgical admission records completed by junior doctors.

Design/methodology/approach

During October 2007 to January 2008, 150 medical and 150 surgical admission records were randomly selected. Each was analysed using Royal College of Physicians guidelines. Surgical record deficiencies were highlighted in an aide‐memoire printed on all A4 admission sheets. One year later, the exercise was repeated for 199 admissions.

Findings

Initial assessment demonstrated similar data capture rates, 77.4 per cent and 75.9 per cent for medicine and surgery respectively (Z=‐0.74, p=0.458). Following the aide‐memoire's introduction, surgical information recording improved relatively, 70.5 per cent and 73.9 per cent respectively (Z=2.01, p=0.045). One from 11 aide‐memoire categories was associated with improvement following clinical training. There was an overall fall in admission record quality during 2008‐9 vs 2007‐8.

Research limitations/implications

The study compared performance among two groups of doctors working simultaneously in separate wards, representing four months' activity.

Practical implications

Hospital managers and clinicians should be mindful that innovations successful in elective clinical practice might not be transferable to an acute setting.

Originality/value

This audit shows that in an acute setting, over one‐quarter of clinical admission data were not captured and devices aimed at improving data capture had no demonstrable effect. The authors suggest that in current hospital practice, focussed clinical training is more likely to improve patient admission records than employing recording aids.

Details

International Journal of Health Care Quality Assurance, vol. 26 no. 1
Type: Research Article
ISSN: 0952-6862

Keywords

Access Restricted. View access options
Book part
Publication date: 9 October 2019

Linda Chisholm

Abstract

Details

Teacher Preparation in South Africa
Type: Book
ISBN: 978-1-78743-694-7

Access Restricted. View access options
Book part
Publication date: 9 October 2019

Linda Chisholm

Abstract

Details

Teacher Preparation in South Africa
Type: Book
ISBN: 978-1-78743-694-7

Access Restricted. View access options
Article
Publication date: 7 March 2018

Thomas Stafford, George Deitz and Yaojie Li

The purpose of the study is to investigate the role of information security policy compliance and the role of information systems auditing in identifying non-compliance in the…

3399

Abstract

Purpose

The purpose of the study is to investigate the role of information security policy compliance and the role of information systems auditing in identifying non-compliance in the workplace, with specific focus on the role of non-malicious insiders who unknowingly or innocuously thwart corporate information security (IS) directives by engaging in unsafe computing practices. The ameliorative effects of auditor-identified training and motivational programs to emphasize pro-security behaviors are explored.

Design/methodology/approach

This study applies qualitative case analysis of technology user security perceptions combined with interpretive analysis of depth interviews with auditors to examine and explain the rubrics of non-malicious technology user behaviors in violation of cybersecurity directives, to determine the ways in which auditors can best assist management in overcoming the problems associated with security complacency among users.

Findings

Enterprise risk management benefits from audits that identify technology users who either feel invulnerable to cyber threats and exploits or feel that workplace exigencies augur for expedient workarounds of formal cybersecurity policies.

Research limitations/implications

Implications for consideration of CyberComplacency and Cybersecurity Loafing expand the insider threat perspective beyond the traditional malicious insider perspective.

Practical implications

Implications for consideration of CyberComplacency and Cybersecurity Loafing include broadened perspectives for the consultative role of IS audit in the firm.

Social implications

CyberComplacency is a practice that has great potential for harm in all walks of life. A better understanding of these potential harms is beneficial.

Originality/value

This study is the first to characterize CyberComplacency as computer users who feel they operate invulnerable platforms and are subsequently motivated to engage in less cybersecurity diligence than the company would desire. This study is also the first to characterize the notion of Cybersecurity Loafing to describe technically competent workers who take unauthorized but expedient steps around certain security polices in the name of workgroup efficiency.

Details

Managerial Auditing Journal, vol. 33 no. 4
Type: Research Article
ISSN: 0268-6902

Keywords

Access Restricted. View access options
Article
Publication date: 16 February 2021

Jeffrey D. Wall and Prashant Palvia

The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors…

874

Abstract

Purpose

The authors seek to understand the formation of control- and security-related identities among organizational employees through and interpretive narrative analysis. The authors also seek to identify how the identities form over time and across contexts. Several identities are identified as well as the changes that may occur in the identities.

Design/methodology/approach

Few interpretive or critical studies exist in behavioral information security research to represent employee perspectives of power and control. Using qualitative interviews and narrative analysis of the interview transcripts, this paper analyzes the security- and control-related identities and values that employees adopt in organizational settings.

Findings

Two major categories of behavioral security compliance identities were identified: compliant and noncompliant. Specific identities within the compliant category included: faithful follower vs the reasoned follower, and other-preserving versus the self-preserving identities. The noncompliant category included: anti-authority identity, utilitarian identity, trusting identity and unaware identity. Furthermore, three patterns of identity changes were observed.

Research limitations/implications

The authors’ narrative stories suggest that employee identities are complex and multi-faceted, and that they may be fluid and adaptive to situational factors. Future research should avoid assumptions that all employees are the same or that employee beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Thus, security control is far broader than is studied in behavioral studies. The authors find that history matters and should be examined carefully.

Practical implications

The authors’ study provides insights that managers can use to enhance security initiatives. It is clear that different employees build different control-related identities. Managers must understand that their employees are unique and will not all respond to policies, punishments, and other forms of control in the same way. The narratives also suggest that many organizations lack appropriate programs to enhance employees' awareness of security issues.

Originality/value

The authors’ narrative analysis suggests that employee security identities are complex and multi-faceted, and that they are fluid and adaptive to situational factors. Research should avoid assumptions that all employees are the same or that their beliefs remain constant over time or in different contexts. Identities are also strongly rooted in individuals' rearing and other life experiences. Their history matters and should be examined carefully.

Details

Information Technology & People, vol. 35 no. 1
Type: Research Article
ISSN: 0959-3845

Keywords

Available. Open Access. Open Access
Article
Publication date: 31 May 2024

José Baptista, Dália Costa and Sónia P. Gonçalves

This study aims to analyze the relationship between attitudes towards organizational diversity and towards trans people, correlating them with the levels of transphobia among HR…

814

Abstract

Purpose

This study aims to analyze the relationship between attitudes towards organizational diversity and towards trans people, correlating them with the levels of transphobia among HR professionals. Drawing upon the Intergroup Contact Theory, we also seek to understand whether the results may be influenced by the contact variable.

Design/methodology/approach

Data were collected through the administration of a questionnaire to a sample of 184 HR professionals. The questionnaire was comprised of self-constructed questions and previously validated scales, including: Attitudes Toward Diversity Scale (ATDS) (Montei et al., 1996), Attitudes Toward Transgendered Individuals (ATTI) Scale (Walch et al., 2012) and Genderism and Transphobia Scale (GTS) (Hill and Willoughby, 2005).

Findings

The results do not show high levels of negative attitudes towards organizational diversity or intolerance towards trans people, being these variables correlated, with higher levels of intolerance in the portion of the sample without contact with trans people.

Originality/value

This article contributes to the increase of knowledge in the field of HR Development Policies focusing on the thematic of Diversity and Inclusion, which is a very current and important topic in organizations today. Also, the relevance and contribution of the study point to the need for Human Resources Management Practices that take on positive discrimination and/or encourage the adoption of affirmative actions by organizations.

Propósito

Este estudio tiene como objetivo analizar la relación entre las actitudes hacia la diversidad organizacional y hacia las personas trans, correlacionándolas con los niveles de transfobia entre los profesionales de recursos humanos. Basándonos en la Teoría del Contacto Intergrupal, también buscamos comprender si los resultados pueden estar influenciados por la variable de contacto.

Diseño/metodología/enfoque

Se recopilaron datos a través de la administración de un cuestionario a una muestra de 184 profesionales de recursos humanos. El cuestionario estaba compuesto por preguntas autoconstruidas y escalas previamente validadas, que incluían: Attitudes Toward Diversity Scale - ATDS (Montei et al., 1996), Attitudes Toward Transgendered Individuals (ATTI) Scale (Walch et al., 2012) y Genderism and Transphobia Scale - GTS (Hill and Willoughby, 2005).

Hallazgos

Los resultados no muestran altos niveles de actitudes negativas hacia la diversidad organizacional o intolerancia hacia las personas trans, siendo estas variables correlacionadas, con niveles más altos de intolerancia en la porción de la muestra sin contacto con personas transgénero.

Originalidad/valor

Este artículo contribuye al aumento del conocimiento en el campo de las políticas de desarrollo de recursos humanos, centrándose en la temática de Diversidad e Inclusión, la cual es un tema muy actual e importante en las organizaciones hoy en día. Además, la relevancia y contribución del estudio señalan la necesidad de prácticas de gestión de recursos humanos que asuman la discriminación positiva y/o fomenten la adopción de acciones afirmativas por parte de las organizaciones.

Access Restricted. View access options
Article
Publication date: 2 December 2024

Kirsty M. Taunton, Hannah R. Cook and Stacey Eyers

Risk assessment and risk management planning are integral to reducing risk of future violence in forensic settings. Over the past decade, emphasis has been placed on involving…

27

Abstract

Purpose

Risk assessment and risk management planning are integral to reducing risk of future violence in forensic settings. Over the past decade, emphasis has been placed on involving service users in this process. Nonetheless, service user knowledge of violence risk assessments such as the Historical-Clinical-Risk Management-20, Version 3 (HCR-20v3) and collaborative risk assessment is often limited. This service evaluation aimed to assess the effectiveness of a pilot Understanding Risk programme, on increasing knowledge of the HCR-20v3 and insight into risk of violence.

Design/methodology/approach

The methodology used was a within-subjects design, collecting quantitative data before and after intervention. Participants’ beliefs and attitudes supportive of violence, and perceptions of their recovery, were assessed using a semi-structured HCR-20v3 questionnaire, the Maudsley Violence Questionnaire and the Recovery Assessment Scale – Domains and Stages. An HCR-20v3 historical factor checklist was also completed. The final sample (n = 11) consisted of low and medium secure forensic inpatients.

Findings

The results of this study indicated that after intervention, participants had significantly greater knowledge of the HCR-20v3 and more positive perceptions of their functional and personal recovery. Significant changes were not observed on the Maudsley Violence Questionnaire total score; however, further analysis indicated significantly lower scores on the “acceptance of violence” subscale after intervention.

Practical implications

The Understanding Risk programme was associated with positive changes across treatment domains in a small sample of forensic inpatients. Specifically, improvements were observed for increased knowledge of the HCR-20v3, attitudes towards recovery and non-acceptance of violence. It would be of clinical benefit to replicate this study across different levels of security to increase the generalisability of findings. This study shows promise for the efficacy of the Understanding Risk programme among forensic inpatients.

Originality/value

This service evaluation provides preliminary support for the benefits of educating and involving service users in violence risk assessment.

Details

Journal of Criminological Research, Policy and Practice, vol. 11 no. 1
Type: Research Article
ISSN: 2056-3841

Keywords

Available. Open Access. Open Access
Article
Publication date: 14 April 2020

Joel Rudin, Tejinder Billing, Andrea Farro and Yang Yang

This study aims to test bigenderism, a universalistic theory that purports to explain why trans men employees enjoy greater organizational acceptance and superior economic…

4057

Abstract

Purpose

This study aims to test bigenderism, a universalistic theory that purports to explain why trans men employees enjoy greater organizational acceptance and superior economic outcomes compared to trans women employees.

Design/methodology/approach

Respondents were presented with one of two case studies in which they had to choose whether or not to respect the right of a trans employee to use the restroom of their choice at work. The only difference between the two case studies was the gender of the trans employee. In one case, the employee was a trans man and in the other case, the employee was a trans woman.

Findings

The gender of the trans employee had no impact on the choices of the respondents.

Research limitations/implications

The chief research implication is that heightened discrimination against trans men may better be explained by situational theories of transphobia rather than the universalistic theory that was tested in this paper. The primary research limitation was the use of American undergraduate business students as respondents.

Practical implications

Organizations need to be especially vigilant in protecting the restroom rights of their transgender employees, which may entail eliminating gender-segregated restrooms.

Originality/value

This paper is original in that it uses an experimental design to test the theory of bigenderism. It adds value by encouraging experimental research that examines situational theories of transphobia.

Details

Organization Management Journal, vol. 17 no. 2
Type: Research Article
ISSN: 1541-6518

Keywords

1 – 8 of 8
Per page
102050