Search results

1 – 10 of 12
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 3 October 2019

Samantha Flynn, Richard P. Hastings, Rachel McNamara, David Gillespie, Elizabeth Randell, Leisa Richards and Zac Taylor

The purpose of this paper is to outline the development, piloting and evaluation of the Who’s Challenging Who? (WCW) training intervention for social care staff to improve their…

804

Abstract

Purpose

The purpose of this paper is to outline the development, piloting and evaluation of the Who’s Challenging Who? (WCW) training intervention for social care staff to improve their empathy and attitudes towards people with learning disabilities (LD) and challenging behaviour (CB).

Design/methodology/approach

A phased approach was taken to the development and testing of the intervention. Initially, the existing literature was reviewed, the theoretical background of the intervention was developed, and then the intervention was designed. A pilot study was undertaken, followed by further development, and a large-scale randomised controlled trial (RCT).

Findings

WCW had a small positive effect on staff empathy 20 weeks after the intervention, and small to moderate effects for other staff reported outcomes (e.g. positive empowerment attitudes and positive work motivation). Being trained by people with LD and CB encouraged staff to reflect on the impact they have on the people they support. The trainers with LD valued their role, and saw benefits beyond this (e.g. friendships).

Research limitations/implications

It is possible to carry out high-quality RCT evaluations of social care practice, and research should continue to generate evidence in this way, as in healthcare settings. However, there were difficulties in retaining participants.

Practical implications

People with LD can be actively involved in the co-production and delivery of social care training.

Social implications

Employment and a fair wage can increase the confidence and empowerment of people with LD.

Originality/value

This is the first large-scale RCT of an intervention that aimed to improve empathy/change attitudes in social care staff who work with people with LD and CB.

Details

Tizard Learning Disability Review, vol. 24 no. 4
Type: Research Article
ISSN: 1359-5474

Keywords

Access Restricted. View access options
Book part
Publication date: 8 March 2017

Margaret Ann Hagerman

How can researchers develop methods that are both child-centered and grounded in the “epistemology of racial emancipation” given the unique challenges associated with conducting…

Abstract

How can researchers develop methods that are both child-centered and grounded in the “epistemology of racial emancipation” given the unique challenges associated with conducting research with young people and white people? The purpose of this chapter is to examine the use of an innovative child-centered visual research method within the context of a larger ethnography focused on how white children come to form ideas about race in America. As part of a broader ethnographic study, white children between the ages of 10 and 13 were presented with photographs of celebrities. Children were asked questions about how to racially classify these popular culture icons, an activity that led to further discussion about race and racism in America. Drawing upon photographs of popular cultural icons and celebrities is one strategy for approaching uncomfortable topics with children in way that is less intimidating and that also brings new data to the study. Children made this aspect of the interview their own, bringing their unique perspectives to bear. This chapter discusses at length unique methodological issues, strategies, and innovations involved in research with white children about race. This chapter makes original contributions to the field of developing innovative, child-centered methods for conducting research with children and youth as well as existing scholarship on whiteness, privilege, and the social reproduction of racial ideology/racism.

Details

Researching Children and Youth: Methodological Issues, Strategies, and Innovations
Type: Book
ISBN: 978-1-78714-098-1

Keywords

Access Restricted. View access options
Article
Publication date: 12 August 2022

Neha Chhabra Roy and Sreeleakha Prabhakaran

The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian…

1494

Abstract

Purpose

The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian banks. The authors attempted to identify and classify cyber frauds and its drivers and correlate them for optimal mitigation planning.

Design/methodology/approach

The methodology opted for the identification and classification is through a detailed literature review and focus group discussion with risk and vigilance officers and cyber cell experts. The authors assessed the future of cyber fraud in the Indian banking business through the machine learning–based k-nearest neighbor (K-NN) approach and prioritized and predicted the future of cyber fraud. The predicted future revealing dominance of a few specific cyber frauds will help to get an appropriate fraud prevention model, using an associated parties centric (victim and offender) root-cause approach. The study uses correlation analysis and maps frauds with their respective drivers to determine the resource specific effective mitigation plan.

Findings

Finally, the paper concludes with a conceptual framework for preventing internal-led cyber fraud within the scope of the study. A cyber fraud mitigation ecosystem will be helpful for policymakers and fraud investigation officers to create a more robust environment for banks through timely and quick detection of cyber frauds and prevention of them.

Research limitations/implications

Additionally, the study supports the Reserve Bank of India and the Government of India's launched cyber security initiates and schemes which ensure protection for the banking ecosystem i.e. RBI direct scheme, integrated ombudsman scheme, cyber swachhta kendra (botnet cleaning and malware analysis centre), National Cyber Coordination Centre (NCCC) and Security Monitoring Centre (SMC).

Practical implications

Structured and effective internal-led plans for cyber fraud mitigation proposed in this study will conserve banks, employees, regulatory authorities, customers and economic resources, save bank authorities’ and policymakers’ time and money, and conserve resources. Additionally, this will enhance the reputation of the Indian banking industry and extend its lifespan.

Originality/value

The innovative insider-led cyber fraud mitigation approach quickly identifies cyber fraud, prioritizes it, identifies its prominent root causes, map frauds with respective root causes and then suggests strategies to ensure a cost-effective and time-saving bank ecosystem.

Details

Aslib Journal of Information Management, vol. 75 no. 2
Type: Research Article
ISSN: 2050-3806

Keywords

Access Restricted. View access options
Book part
Publication date: 26 July 2016

Ana Campos-Holland, Grace Hall and Gina Pol

The No Child Left Behind Act (2002) and Race to the Top (2009) led to the highest rate of standardized-state testing in the history of the United States of America. As a result…

Abstract

Purpose

The No Child Left Behind Act (2002) and Race to the Top (2009) led to the highest rate of standardized-state testing in the history of the United States of America. As a result, the Every Student Succeeds Act (2015) aims to reevaluate standardized-state testing. Previous research has assessed its impact on schools, educators, and students; yet, youth’s voices are almost absent. Therefore, this qualitative analysis examines how youth of color perceive and experience standardized-state testing.

Design/methodology/approach

Seventy-three youth participated in a semistructured interview during the summer of 2015. The sample consists of 34 girls and 39 boys, 13–18 years of age, of African American, Latino/a, Jamaican American, multiracial/ethnic, and other descent. It includes 6–12th graders who attended 61 inter-district and intra-district schools during the 2014–2015 academic year in a Northeastern metropolitan area in the United States that is undergoing a racial/ethnic integration reform.

Findings

Youth experienced testing overload under conflicting adult authorities and within an academically stratified peer culture on an ever-shifting policy terrain. While the parent-adult authority remained in the periphery, the state-adult authority intrusively interrupted the teacher-student power dynamics and the disempowered teacher-adult authority held youth accountable through the “attentiveness” rhetoric. However, youth’s perspectives and lived experiences varied across grade levels, school modalities, and school-geographical locations.

Originality/value

In this adult-dominated society, the market approach to education reform ultimately placed the burden of teacher and school evaluation on youth. Most importantly, youth received variegated messages from their conflicting adult authorities that threatened their academic journeys.

Details

Education and Youth Today
Type: Book
ISBN: 978-1-78635-046-6

Keywords

Access Restricted. View access options
Book part
Publication date: 30 June 2020

Racheal Harris

Abstract

Details

Photography and Death: Framing Death throughout History
Type: Book
ISBN: 978-1-83909-045-5

Available. Content available
Book part
Publication date: 19 April 2022

Free Access. Free Access

Abstract

Details

Circular Economy Supply Chains: From Chains to Systems
Type: Book
ISBN: 978-1-83982-545-3

Access Restricted. View access options
Book part
Publication date: 16 September 2024

Tess Watterson

Tabletop ‘pen and paper’ role-play games (TTRPGs) can function as spaces of creative experimentation with gender identity through shared storytelling. The last decade has seen an…

Abstract

Tabletop ‘pen and paper’ role-play games (TTRPGs) can function as spaces of creative experimentation with gender identity through shared storytelling. The last decade has seen an explosion of Actual Play (AP) shows that broadcast recorded gameplay of TTRPGs to online audiences. Neverafter is the 15th season of well-known AP show Dimension 20 and is a horror-themed re-imagining of classic fairy tales through the rules of Dungeons and Dragons. Four of the six player characters are male, based individually on the fairy tales of Pinocchio, Puss in Boots, the Frog Prince, and a (gender-swapped) Mother Goose, adventuring together in a story-world called ‘The Neverafter’. Not only are these versions of the fairy tale characters shaped by the players' own explorations of identity, but as an AP show, this is also layered with the expectations produced by the show's wide fan base. Their diverse gender explorations and their subversion of fairy tale conventions are enabled by the fluency of the players and audience in freely flowing between the framing perspectives of player and character. This chapter will focus on non-binary player Ally Beardsley's creation and performance of Mother Timothy Goose as a gay, elderly, human man as a particularly meaningful case study. This analysis considers how heroic masculinity is reconceptualised in Neverafter through the horror-themed embodiment of fairy tale men in the context of contemporary gender issues.

Details

Gender and the Male Character in 21st Century Fairy Tale Narratives
Type: Book
ISBN: 978-1-83753-789-1

Keywords

Access Restricted. View access options
Article
Publication date: 5 October 2023

Bradley Maguire and Lisa Ogilvie

The purpose of this paper is to examine recovery through lived experience. It is part of a series that explores candid accounts of addiction and recovery to identify important…

37

Abstract

Purpose

The purpose of this paper is to examine recovery through lived experience. It is part of a series that explores candid accounts of addiction and recovery to identify important components in the recovery process.

Design/methodology/approach

The G-CHIME model comprises six elements important to addiction recovery (growth, connectedness, hope, identity, meaning in life and empowerment). It provides a standard against which to consider addiction recovery, having been used in this series, as well as in the design of interventions that improve well-being and strengthen recovery. In this paper, a first-hand account is presented, followed by a semi-structured e-interview with the author of the account. Narrative analysis is used to explore the account and interview through the G-CHIME model.

Findings

This paper shows that addiction recovery is a remarkable process that can be effectively explained using the G-CHIME model. The significance of each component in the model is apparent from the account and e-interview presented.

Originality/value

Each account of recovery in this series is unique and, as yet, untold.

Details

Advances in Dual Diagnosis, vol. 17 no. 2
Type: Research Article
ISSN: 1757-0972

Keywords

Access Restricted. View access options
Article
Publication date: 7 August 2009

Zachary Williams, Jason E. Lueg, Ronald D. Taylor and Robert L. Cook

The events of September 11, 2001 heightened the awareness of supply chain professionals to the threat of man‐made disasters on the security of supply chains. According to…

3511

Abstract

Purpose

The events of September 11, 2001 heightened the awareness of supply chain professionals to the threat of man‐made disasters on the security of supply chains. According to institutional theory, the environment in which an organization operates creates pressures (normative, coercive, and mimetic) to adopt “institutionalized” norms and practices in order to be perceived as “legitimate.” Using an institutional theory perspective, this paper identifies and explores the environmental drivers that motivate firms to engage in supply chain security (SCS) practices to thwart man‐made supply chain disasters.

Design/methodology/approach

Qualitative research in the form of 19 depth interviews with mid‐to‐high level supply chain management professionals is conducted.

Findings

The findings of the qualitative research indicate that four primary drivers of SCS exist: government, customers, competitors, and society. Implications and suggestions for future research are provided.

Research limitations/implications

The qualitative findings call for future empirical testing.

Practical implications

Practitioners will benefit from the research presented here by better understanding what environmental factors are causing improved security measures in the supply chain.

Originality/value

This paper investigates drivers of SCS, an issue that is currently having an impact on supply chain operations worldwide. This is the first SCS study to investigate the reason behind why supply chains are implementing security strategies.

Details

International Journal of Physical Distribution & Logistics Management, vol. 39 no. 7
Type: Research Article
ISSN: 0960-0035

Keywords

Access Restricted. View access options
Article
Publication date: 9 March 2012

Michael S. Garver, Zachary Williams, G. Stephen Taylor and William R. Wynne

Much of the research conducted in logistics/SCM has focused on satisfaction/retention of customers. This has left a critical gap for managers: before customers can be satisfied…

2333

Abstract

Purpose

Much of the research conducted in logistics/SCM has focused on satisfaction/retention of customers. This has left a critical gap for managers: before customers can be satisfied and ultimately retained, a purchase choice of logistics services has to occur. To date, very little research has addressed how logistics customers make purchase choice decisions about logistics services. The purpose of this paper, using logistics research methods, is to introduce adaptive choice modelling (ACM) to address this gap and put forth a research method that is useful for academic researchers and logistics/SCM managers.

Design/methodology/approach

This paper provides an overview of ACM, along with a discussion of its important research advantages, limitations, and practical applications. Additionally, an empirical demonstration of this research technique is provided to illustrate how academic researchers and logistics managers can use ACM to better understand the decision‐making process of customers when selecting logistics services.

Findings

In order to demonstrate this research technique, a research project was designed and implemented that analyzed the choice process of consumers selecting parcel carriers to ship a textbook. The results show that price, speed of delivery, and tracking are the three most important variables in the selection decision. The results also show that consumers are not homogeneous, but can be divided into five distinct need‐based segments. Recognizing and understanding the nature of these segments should help managers better meet the needs of parcel shippers.

Research limitations/implications

The main research limitation with this study is that it is based on a convenience sample; thus future research will need to replicate this study to confirm the research findings. However, the ultimate purpose of the study is to present a new research method and discuss how to apply this method, so that logistics/SCM practitioners and academic researchers can better understand customers of logistics/SCM services. Thus, while the nature of the sample is a limitation, it should be viewed in this context.

Originality/value

While conjoint analysis has existed for decades, this technique has rarely been implemented by logistics/SCM researchers and practitioners. Instead, logistics/SCM researchers and practitioners have focused more on retention methods and have virtually ignored modelling the actual purchase choice of logistics/SCM services. New advancements in conjoint analysis, specifically the ACM approach, have many important and unique advantages and applications for logistics/SCM researchers and practitioners. ACM has not been used in a logistics/SCM context.

1 – 10 of 12
Per page
102050