142,123 research outputs found

    Stakeholder perspectives on new ways of delivering unscheduled health care: the role of ownership and organisational identity

    Get PDF
    <b>Rationale, aims and objectives</b>: To explore stakeholder perspectives of the implementation of a new, national integrated nurse-led telephone advice and consultation service (NHS 24), comparing the views of stakeholders from different health care organisations. <b>Methods</b>: Semi-structured interviews with 26 stakeholders including partner organisations located in primary and secondary unscheduled care settings (general practitioner (GP) out-of-hours co-operative; accident and emergency department; national ambulance service), members of NHS 24 and national policymakers. Attendance at key meetings, documentary review and email implementation diaries provided a contextual history of events with which interview data could be compared. <b>Results</b>: The contextual history of events highlighted a fast-paced implementation process, with little time for reflection. Key areas of partner concern were increasing workload, the clinical safety of nurse triage and the lack of communication across the organisations. Concerns were most apparent within the GP out-of-hours co-operative, leading to calls for the dissolution of the partnership. Accident and emergency and ambulance service responses were more conciliatory, suggesting that such problems were to be expected within the developmental phase of a new organisation. Further exploration of these responses highlighted the sense of ownership within the GP co-operative, with GPs having both financial and philosophical ownership of the co-operative. This was not apparent within the other two partner organisations, in particular the ambulance service, which operated on a regional model very similar to that of NHS 24. <b>Conclusions</b>: As the delivery of unscheduled primary health care crosses professional boundaries and locations, different organisations and professional groups must develop new ways of partnership working, developing trust and confidence in each other. The results of this study highlight, for the first time, the key importance of understanding the professional ownership and identity of individual organisations, in order to facilitate the most effective mechanisms to enable that partnership working

    Workplace Contextual Supports for LGBT Employees: A Review, Meta‐Analysis, and Agenda for future Research

    Get PDF
    The past decade has witnessed a rise in the visibility of the lesbian, gay, bisexual, and transgender (LGBT) community. This has resulted in some organizational researchers focusing their attention on workplace issues facing LGBT employees. While empirical research has been appropriately focused on examining the impact of workplace factors on the work lives of LGBT individuals, no research has examined these empirical relationships cumulatively. The purpose of this study was to conduct a comprehensive review and meta‐analysis of the outcomes associated with three workplace contextual supports (formal LGBT policies and practices, LGBT‐supportive climate, and supportive workplace relationships) and to compare the relative influence of these workplace supports on outcomes. Outcomes were grouped into four categories: (a) work attitudes, (b) psychological strain, (c) disclosure, and (d) perceived discrimination. Results show that supportive workplace relationships were more strongly related to work attitudes and strain, whereas LGBT supportive climate was more strongly related to disclosure and perceived discrimination compared to the other supports. Our findings also revealed a number of insights concerning the measurement, research design, and sample characteristics of the studies in the present review. Based on these results, we offer an agenda for future research

    New Arrivals Excellence Programme : management guide

    Get PDF

    A Middleware for the Internet of Things

    Full text link
    The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as things to the Internet, in an intelligent and pervasive fashion. This connectivity gives rise to the possibility of using the tracking capabilities of things to impinge on the location privacy of users. Most of the existing management and location privacy protection solutions do not consider the low-cost and low-power requirements of things, or, they do not account for the heterogeneity, scalability, or autonomy of communications supported in the IoT. Moreover, these traditional solutions do not consider the case where a user wishes to control the granularity of the disclosed information based on the context of their use (e.g. based on the time or the current location of the user). To fill this gap, a middleware, referred to as the Internet of Things Management Platform (IoT-MP) is proposed in this paper.Comment: 20 pages, International Journal of Computer Networks & Communications (IJCNC) Vol.8, No.2, March 201

    A User-Focused Reference Model for Wireless Systems Beyond 3G

    Get PDF
    This whitepaper describes a proposal from Working Group 1, the Human Perspective of the Wireless World, for a user-focused reference model for systems beyond 3G. The general structure of the proposed model involves two "planes": the Value Plane and the Capability Plane. The characteristics of these planes are discussed in detail and an example application of the model to a specific scenario for the wireless world is provided

    A Survey of Access Control Models in Wireless Sensor Networks

    Get PDF
    Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. Resource constraints in sensor nodes mean that security mechanisms with a large overhead of computation and communication are impractical to use in WSNs; security in sensor networks is, therefore, a challenge. Access control is a critical security service that offers the appropriate access privileges to legitimate users and prevents illegitimate users from unauthorized access. However, access control has not received much attention in the context of WSNs. This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control models, including a comparison and evaluation based on their characteristics in WSNs. Potential challenging issues for access control schemes in WSNs are also discussed.Peer reviewe

    Secure data sharing and processing in heterogeneous clouds

    Get PDF
    The extensive cloud adoption among the European Public Sector Players empowered them to own and operate a range of cloud infrastructures. These deployments vary both in the size and capabilities, as well as in the range of employed technologies and processes. The public sector, however, lacks the necessary technology to enable effective, interoperable and secure integration of a multitude of its computing clouds and services. In this work we focus on the federation of private clouds and the approaches that enable secure data sharing and processing among the collaborating infrastructures and services of public entities. We investigate the aspects of access control, data and security policy languages, as well as cryptographic approaches that enable fine-grained security and data processing in semi-trusted environments. We identify the main challenges and frame the future work that serve as an enabler of interoperability among heterogeneous infrastructures and services. Our goal is to enable both security and legal conformance as well as to facilitate transparency, privacy and effectivity of private cloud federations for the public sector needs. © 2015 The Authors
    corecore