30,407 research outputs found

    An Exploratory Study of Patient Falls

    Get PDF
    Debate continues between the contribution of education level and clinical expertise in the nursing practice environment. Research suggests a link between Baccalaureate of Science in Nursing (BSN) nurses and positive patient outcomes such as lower mortality, decreased falls, and fewer medication errors. Purpose: To examine if there a negative correlation between patient falls and the level of nurse education at an urban hospital located in Midwest Illinois during the years 2010-2014? Methods: A retrospective crosssectional cohort analysis was conducted using data from the National Database of Nursing Quality Indicators (NDNQI) from the years 2010-2014. Sample: Inpatients aged ≥ 18 years who experienced a unintentional sudden descent, with or without injury that resulted in the patient striking the floor or object and occurred on inpatient nursing units. Results: The regression model was constructed with annual patient falls as the dependent variable and formal education and a log transformed variable for percentage of certified nurses as the independent variables. The model overall is a good fit, F (2,22) = 9.014, p = .001, adj. R2 = .40. Conclusion: Annual patient falls will decrease by increasing the number of nurses with baccalaureate degrees and/or certifications from a professional nursing board-governing body

    DYNAMICS OF IDENTITY THREATS IN ONLINE SOCIAL NETWORKS: MODELLING INDIVIDUAL AND ORGANIZATIONAL PERSPECTIVES

    Get PDF
    This dissertation examines the identity threats perceived by individuals and organizations in Online Social Networks (OSNs). The research constitutes two major studies. Using the concepts of Value Focused Thinking and the related methodology of Multiple Objectives Decision Analysis, the first research study develops the qualitative and quantitative value models to explain the social identity threats perceived by individuals in Online Social Networks. The qualitative value model defines value hierarchy i.e. the fundamental objectives to prevent social identity threats and taxonomy of user responses, referred to as Social Identity Protection Responses (SIPR), to avert the social identity threats. The quantitative value model describes the utility of the current social networking sites and SIPR to achieve the fundamental objectives for averting social identity threats in OSNs. The second research study examines the threats to the external identity of organizations i.e. Information Security Reputation (ISR) in the aftermath of a data breach. The threat analysis is undertaken by examining the discourses related to the data breach at Home Depot and JPMorgan Chase in the popular microblogging website, Twitter, to identify: 1) the dimensions of information security discussed in the Twitter postings; 2) the attribution of data breach responsibility and the related sentiments expressed in the Twitter postings; and 3) the subsequent diffusion of the tweets that threaten organizational reputation

    Comparative analysis of decriminalisation and change in the commonwealth: understanding contexts and discerning strategies

    Get PDF

    Not So Revolutionary After All: The Role of Reinforcing Frames in US Magazine Discourse about Microcomputers

    Get PDF
    This study investigates the role of media discourse in the hegemonic process by which the microcomputer became a common and trusted appliance in the USA during the early years of the technology\u27s adoption: the 1980s to 1990s. A critical discourse analysis combined with framing analysis of four cases from consumer magazines — two advertisements and two editorial feature stories — reveals that a device heralded as \u27revolutionary\u27 was presented in fact using rhetoric that incorporated and legitimized traditional values, roles and practices such as capitalism. Any frames that potentially challenged existing social structures and power relationships were secondary and \u27super-framed\u27 by the reinforcing frames

    Scenarios for the development of smart grids in the UK: literature review

    Get PDF
    Smart grids are expected to play a central role in any transition to a low-carbon energy future, and much research is currently underway on practically every area of smart grids. However, it is evident that even basic aspects such as theoretical and operational definitions, are yet to be agreed upon and be clearly defined. Some aspects (efficient management of supply, including intermittent supply, two-way communication between the producer and user of electricity, use of IT technology to respond to and manage demand, and ensuring safe and secure electricity distribution) are more commonly accepted than others (such as smart meters) in defining what comprises a smart grid. It is clear that smart grid developments enjoy political and financial support both at UK and EU levels, and from the majority of related industries. The reasons for this vary and include the hope that smart grids will facilitate the achievement of carbon reduction targets, create new employment opportunities, and reduce costs relevant to energy generation (fewer power stations) and distribution (fewer losses and better stability). However, smart grid development depends on additional factors, beyond the energy industry. These relate to issues of public acceptability of relevant technologies and associated risks (e.g. data safety, privacy, cyber security), pricing, competition, and regulation; implying the involvement of a wide range of players such as the industry, regulators and consumers. The above constitute a complex set of variables and actors, and interactions between them. In order to best explore ways of possible deployment of smart grids, the use of scenarios is most adequate, as they can incorporate several parameters and variables into a coherent storyline. Scenarios have been previously used in the context of smart grids, but have traditionally focused on factors such as economic growth or policy evolution. Important additional socio-technical aspects of smart grids emerge from the literature review in this report and therefore need to be incorporated in our scenarios. These can be grouped into four (interlinked) main categories: supply side aspects, demand side aspects, policy and regulation, and technical aspects.

    An Experimental Study on Ubiquitous commerce Adoption: Impact of Personalization and Privacy Concerns

    Get PDF
    Ubiquitous commerce (u-commerce) represents anytime, anywhere commerce. U-commerce can provide a high level of personalization, which can bring significant benefits to customers. However, privacy is a major concern to customers and an obstacle to the adoption of u-commerce. This research examines how personalization and context can impact customers\u27 privacy concerns as well as intention to adopt u-commerce applications. As u-commerce is new and emerging, we used the scenario-based approach to operationalize personalization and context in an experimental study. The experimental results show that the effects of personalization on customers\u27 privacy concerns and adoption intention are situation dependent

    Trust and Privacy Permissions for an Ambient World

    Get PDF
    Ambient intelligence (AmI) and ubiquitous computing allow us to consider a future where computation is embedded into our daily social lives. This vision raises its own important questions and augments the need to understand how people will trust such systems and at the same time achieve and maintain privacy. As a result, we have recently conducted a wide reaching study of people’s attitudes to potential AmI scenarios with a view to eliciting their privacy concerns. This chapter describes recent research related to privacy and trust with regard to ambient technology. The method used in the study is described and findings discussed

    Facebook: Changing the face of communication research

    Get PDF
    The ubiquitous social networking site, Facebook, registered over one billion active users in 2012 and continues to grow (Facebook, 2018a). Not surprisingly, communication researchers around the world noticed this phenomenal shift in communication practice, a practice aided by a combination of digital communication tools—easy to access communication networks, low cost bandwidth, smartphones, application features, and so on. These developments transformed the understanding of “social networks,” turning them from face-to-face interactions among small groups into world spanning digital connections, from networks of business or professional associations supported by analogue or “old” communication practices (such as letter writing, telephone calls, or conference meetings) into always-on real-time tracking of people’s activities. This review examines 400 articles published between 2006 and 2017 in peer reviewed communication- related journals and listed in the EBSCO Communication Source database. The database returned the initial list of articles to a query using the single search term “Facebook.” Subsequent analysis grouped the articles into a number of themes. As we will see, much of the published research that involves Facebook addresses not Facebook itself but Facebook as a source of material or research data on more particular communication topics. In a way, Facebook appears as another medium for communication. After some introductory comments on the history and prior study of Facebook, this review will present the key themes that appear in the research. These include Facebook in theoretical perspectives, Facebook used in interpersonal communication, Facebook’s relationship to journalism, Facebook in education, Facebook in political communication, corporate and organizational use of Facebook, legal and ethical issues arising with Facebook, and other areas of research

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
    corecore