Samantha Flynn, Richard P. Hastings, Rachel McNamara, David Gillespie, Elizabeth Randell, Leisa Richards and Zac Taylor
The purpose of this paper is to outline the development, piloting and evaluation of the Whoâs Challenging Who? (WCW) training intervention for social care staff to improve theirâŠ
Abstract
Purpose
The purpose of this paper is to outline the development, piloting and evaluation of the Whoâs Challenging Who? (WCW) training intervention for social care staff to improve their empathy and attitudes towards people with learning disabilities (LD) and challenging behaviour (CB).
Design/methodology/approach
A phased approach was taken to the development and testing of the intervention. Initially, the existing literature was reviewed, the theoretical background of the intervention was developed, and then the intervention was designed. A pilot study was undertaken, followed by further development, and a large-scale randomised controlled trial (RCT).
Findings
WCW had a small positive effect on staff empathy 20 weeks after the intervention, and small to moderate effects for other staff reported outcomes (e.g. positive empowerment attitudes and positive work motivation). Being trained by people with LD and CB encouraged staff to reflect on the impact they have on the people they support. The trainers with LD valued their role, and saw benefits beyond this (e.g. friendships).
Research limitations/implications
It is possible to carry out high-quality RCT evaluations of social care practice, and research should continue to generate evidence in this way, as in healthcare settings. However, there were difficulties in retaining participants.
Practical implications
People with LD can be actively involved in the co-production and delivery of social care training.
Social implications
Employment and a fair wage can increase the confidence and empowerment of people with LD.
Originality/value
This is the first large-scale RCT of an intervention that aimed to improve empathy/change attitudes in social care staff who work with people with LD and CB.
Details
Keywords
How can researchers develop methods that are both child-centered and grounded in the âepistemology of racial emancipationâ given the unique challenges associated with conductingâŠ
Abstract
How can researchers develop methods that are both child-centered and grounded in the âepistemology of racial emancipationâ given the unique challenges associated with conducting research with young people and white people? The purpose of this chapter is to examine the use of an innovative child-centered visual research method within the context of a larger ethnography focused on how white children come to form ideas about race in America. As part of a broader ethnographic study, white children between the ages of 10 and 13 were presented with photographs of celebrities. Children were asked questions about how to racially classify these popular culture icons, an activity that led to further discussion about race and racism in America. Drawing upon photographs of popular cultural icons and celebrities is one strategy for approaching uncomfortable topics with children in way that is less intimidating and that also brings new data to the study. Children made this aspect of the interview their own, bringing their unique perspectives to bear. This chapter discusses at length unique methodological issues, strategies, and innovations involved in research with white children about race. This chapter makes original contributions to the field of developing innovative, child-centered methods for conducting research with children and youth as well as existing scholarship on whiteness, privilege, and the social reproduction of racial ideology/racism.
Details
Keywords
Neha Chhabra Roy and Sreeleakha Prabhakaran
The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent IndianâŠ
Abstract
Purpose
The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian banks. The authors attempted to identify and classify cyber frauds and its drivers and correlate them for optimal mitigation planning.
Design/methodology/approach
The methodology opted for the identification and classification is through a detailed literature review and focus group discussion with risk and vigilance officers and cyber cell experts. The authors assessed the future of cyber fraud in the Indian banking business through the machine learningâbased k-nearest neighbor (K-NN) approach and prioritized and predicted the future of cyber fraud. The predicted future revealing dominance of a few specific cyber frauds will help to get an appropriate fraud prevention model, using an associated parties centric (victim and offender) root-cause approach. The study uses correlation analysis and maps frauds with their respective drivers to determine the resource specific effective mitigation plan.
Findings
Finally, the paper concludes with a conceptual framework for preventing internal-led cyber fraud within the scope of the study. A cyber fraud mitigation ecosystem will be helpful for policymakers and fraud investigation officers to create a more robust environment for banks through timely and quick detection of cyber frauds and prevention of them.
Research limitations/implications
Additionally, the study supports the Reserve Bank of India and the Government of India's launched cyber security initiates and schemes which ensure protection for the banking ecosystem i.e. RBI direct scheme, integrated ombudsman scheme, cyber swachhta kendra (botnet cleaning and malware analysis centre), National Cyber Coordination Centre (NCCC) and Security Monitoring Centre (SMC).
Practical implications
Structured and effective internal-led plans for cyber fraud mitigation proposed in this study will conserve banks, employees, regulatory authorities, customers and economic resources, save bank authoritiesâ and policymakersâ time and money, and conserve resources. Additionally, this will enhance the reputation of the Indian banking industry and extend its lifespan.
Originality/value
The innovative insider-led cyber fraud mitigation approach quickly identifies cyber fraud, prioritizes it, identifies its prominent root causes, map frauds with respective root causes and then suggests strategies to ensure a cost-effective and time-saving bank ecosystem.
Details
Keywords
Ana Campos-Holland, Grace Hall and Gina Pol
The No Child Left Behind Act (2002) and Race to the Top (2009) led to the highest rate of standardized-state testing in the history of the United States of America. As a resultâŠ
Abstract
Purpose
The No Child Left Behind Act (2002) and Race to the Top (2009) led to the highest rate of standardized-state testing in the history of the United States of America. As a result, the Every Student Succeeds Act (2015) aims to reevaluate standardized-state testing. Previous research has assessed its impact on schools, educators, and students; yet, youthâs voices are almost absent. Therefore, this qualitative analysis examines how youth of color perceive and experience standardized-state testing.
Design/methodology/approach
Seventy-three youth participated in a semistructured interview during the summer of 2015. The sample consists of 34 girls and 39 boys, 13â18 years of age, of African American, Latino/a, Jamaican American, multiracial/ethnic, and other descent. It includes 6â12th graders who attended 61 inter-district and intra-district schools during the 2014â2015 academic year in a Northeastern metropolitan area in the United States that is undergoing a racial/ethnic integration reform.
Findings
Youth experienced testing overload under conflicting adult authorities and within an academically stratified peer culture on an ever-shifting policy terrain. While the parent-adult authority remained in the periphery, the state-adult authority intrusively interrupted the teacher-student power dynamics and the disempowered teacher-adult authority held youth accountable through the âattentivenessâ rhetoric. However, youthâs perspectives and lived experiences varied across grade levels, school modalities, and school-geographical locations.
Originality/value
In this adult-dominated society, the market approach to education reform ultimately placed the burden of teacher and school evaluation on youth. Most importantly, youth received variegated messages from their conflicting adult authorities that threatened their academic journeys.
Details
Keywords
Tabletop âpen and paperâ role-play games (TTRPGs) can function as spaces of creative experimentation with gender identity through shared storytelling. The last decade has seen anâŠ
Abstract
Tabletop âpen and paperâ role-play games (TTRPGs) can function as spaces of creative experimentation with gender identity through shared storytelling. The last decade has seen an explosion of Actual Play (AP) shows that broadcast recorded gameplay of TTRPGs to online audiences. Neverafter is the 15th season of well-known AP show Dimension 20 and is a horror-themed re-imagining of classic fairy tales through the rules of Dungeons and Dragons. Four of the six player characters are male, based individually on the fairy tales of Pinocchio, Puss in Boots, the Frog Prince, and a (gender-swapped) Mother Goose, adventuring together in a story-world called âThe Neverafterâ. Not only are these versions of the fairy tale characters shaped by the players' own explorations of identity, but as an AP show, this is also layered with the expectations produced by the show's wide fan base. Their diverse gender explorations and their subversion of fairy tale conventions are enabled by the fluency of the players and audience in freely flowing between the framing perspectives of player and character. This chapter will focus on non-binary player Ally Beardsley's creation and performance of Mother Timothy Goose as a gay, elderly, human man as a particularly meaningful case study. This analysis considers how heroic masculinity is reconceptualised in Neverafter through the horror-themed embodiment of fairy tale men in the context of contemporary gender issues.
Details
Keywords
Bradley Maguire and Lisa Ogilvie
The purpose of this paper is to examine recovery through lived experience. It is part of a series that explores candid accounts of addiction and recovery to identify importantâŠ
Abstract
Purpose
The purpose of this paper is to examine recovery through lived experience. It is part of a series that explores candid accounts of addiction and recovery to identify important components in the recovery process.
Design/methodology/approach
The G-CHIME model comprises six elements important to addiction recovery (growth, connectedness, hope, identity, meaning in life and empowerment). It provides a standard against which to consider addiction recovery, having been used in this series, as well as in the design of interventions that improve well-being and strengthen recovery. In this paper, a first-hand account is presented, followed by a semi-structured e-interview with the author of the account. Narrative analysis is used to explore the account and interview through the G-CHIME model.
Findings
This paper shows that addiction recovery is a remarkable process that can be effectively explained using the G-CHIME model. The significance of each component in the model is apparent from the account and e-interview presented.
Originality/value
Each account of recovery in this series is unique and, as yet, untold.
Details
Keywords
Zachary Williams, Jason E. Lueg, Ronald D. Taylor and Robert L. Cook
The events of September 11, 2001 heightened the awareness of supply chain professionals to the threat of manâmade disasters on the security of supply chains. According toâŠ
Abstract
Purpose
The events of September 11, 2001 heightened the awareness of supply chain professionals to the threat of manâmade disasters on the security of supply chains. According to institutional theory, the environment in which an organization operates creates pressures (normative, coercive, and mimetic) to adopt âinstitutionalizedâ norms and practices in order to be perceived as âlegitimate.â Using an institutional theory perspective, this paper identifies and explores the environmental drivers that motivate firms to engage in supply chain security (SCS) practices to thwart manâmade supply chain disasters.
Design/methodology/approach
Qualitative research in the form of 19 depth interviews with midâtoâhigh level supply chain management professionals is conducted.
Findings
The findings of the qualitative research indicate that four primary drivers of SCS exist: government, customers, competitors, and society. Implications and suggestions for future research are provided.
Research limitations/implications
The qualitative findings call for future empirical testing.
Practical implications
Practitioners will benefit from the research presented here by better understanding what environmental factors are causing improved security measures in the supply chain.
Originality/value
This paper investigates drivers of SCS, an issue that is currently having an impact on supply chain operations worldwide. This is the first SCS study to investigate the reason behind why supply chains are implementing security strategies.
Details
Keywords
Michael S. Garver, Zachary Williams, G. Stephen Taylor and William R. Wynne
Much of the research conducted in logistics/SCM has focused on satisfaction/retention of customers. This has left a critical gap for managers: before customers can be satisfiedâŠ
Abstract
Purpose
Much of the research conducted in logistics/SCM has focused on satisfaction/retention of customers. This has left a critical gap for managers: before customers can be satisfied and ultimately retained, a purchase choice of logistics services has to occur. To date, very little research has addressed how logistics customers make purchase choice decisions about logistics services. The purpose of this paper, using logistics research methods, is to introduce adaptive choice modelling (ACM) to address this gap and put forth a research method that is useful for academic researchers and logistics/SCM managers.
Design/methodology/approach
This paper provides an overview of ACM, along with a discussion of its important research advantages, limitations, and practical applications. Additionally, an empirical demonstration of this research technique is provided to illustrate how academic researchers and logistics managers can use ACM to better understand the decisionâmaking process of customers when selecting logistics services.
Findings
In order to demonstrate this research technique, a research project was designed and implemented that analyzed the choice process of consumers selecting parcel carriers to ship a textbook. The results show that price, speed of delivery, and tracking are the three most important variables in the selection decision. The results also show that consumers are not homogeneous, but can be divided into five distinct needâbased segments. Recognizing and understanding the nature of these segments should help managers better meet the needs of parcel shippers.
Research limitations/implications
The main research limitation with this study is that it is based on a convenience sample; thus future research will need to replicate this study to confirm the research findings. However, the ultimate purpose of the study is to present a new research method and discuss how to apply this method, so that logistics/SCM practitioners and academic researchers can better understand customers of logistics/SCM services. Thus, while the nature of the sample is a limitation, it should be viewed in this context.
Originality/value
While conjoint analysis has existed for decades, this technique has rarely been implemented by logistics/SCM researchers and practitioners. Instead, logistics/SCM researchers and practitioners have focused more on retention methods and have virtually ignored modelling the actual purchase choice of logistics/SCM services. New advancements in conjoint analysis, specifically the ACM approach, have many important and unique advantages and applications for logistics/SCM researchers and practitioners. ACM has not been used in a logistics/SCM context.