152,933 research outputs found

    Sun Devils Together: Breaking Stigmas on Student Homelessness

    Get PDF
    abstract: In universities, such as Arizona State, students are becoming homeless at an alarming rate. These homeless ASU students are often invisible, as seen through the lack of information on who they are and what resources the university has developed to help them. Typically, students arrive at university campuses with most of the resources required for them to pursue a degree. However, several economic factors such as unemployment or financial instability can impact these resources which influence students ability to stay enrolled in classes. This feature is reflected in the well understood concept of the starving student. Despite this paradigm, the fact remains that students under this stress are attending classes and are under financial stress to do so while being unable to meet their basic needs. These intertwined elements result in ASU students becoming exposed to cyclical needs-insecurities including homelessness. Therefore, the team decided to develop a project called Sun Devils Together which addresses the needs of ASUs students facing homelessness and overall aims to help increase the accessibility of available resources through reducing the silo effect that occurs due to lack of communication between different departments and increases faculty, staff, and student awareness regarding the issue. In order to achieve this, the team has collaborated with the Assistant Dean of Students to produce a training module for ASU faculty, professional staff, and students. The team is contributing information to the creation of a new website that will have all the resources available to students in one place. In addition, the team will create a coded pamphlet with a map of resources that will be given out to different departments around campus that students may potentially reach out to for help while informing those departments regarding the existence of other departments that work towards the same cause

    What does it take to make integrated care work? A ‘cookbook’ for large-scale deployment of coordinated care and telehealth

    Get PDF
    The Advancing Care Coordination & Telehealth Deployment (ACT) Programme is the first to explore the organisational and structural processes needed to successfully implement care coordination and telehealth (CC&TH) services on a large scale. A number of insights and conclusions were identified by the ACT programme. These will prove useful and valuable in supporting the large-scale deployment of CC&TH. Targeted at populations of chronic patients and elderly people, these insights and conclusions are a useful benchmark for implementing and exchanging best practices across the EU. Examples are: Perceptions between managers, frontline staff and patients do not always match; Organisational structure does influence the views and experiences of patients: a dedicated contact person is considered both important and helpful; Successful patient adherence happens when staff are engaged; There is a willingness by patients to participate in healthcare programmes; Patients overestimate their level of knowledge and adherence behaviour; The responsibility for adherence must be shared between patients and health care providers; Awareness of the adherence concept is an important factor for adherence promotion; The ability to track the use of resources is a useful feature of a stratification strategy, however, current regional case finding tools are difficult to benchmark and evaluate; Data availability and homogeneity are the biggest challenges when evaluating the performance of the programmes

    Published incidents and their proportions of human error

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Purpose - The information security field experiences a continuous stream of information security incidents and breaches, which are publicised by the media, public bodies and regulators. Despite the need for information security practices being recognised and in existence for some time the underlying general information security affecting tasks and causes of these incidents and breaches are not consistently understood, particularly with regard to human error. Methodology - This paper analyses recent published incidents and breaches to establish the proportions of human error, and where possible subsequently utilises the HEART human reliability analysis technique, which is established within the safety field. Findings - This analysis provides an understanding of the proportions of incidents and breaches that relate to human error as well as the common types of tasks that result in these incidents and breaches through adoption of methods applied within the safety field. Originality - This research provides original contribution to knowledge through the analysis of recent public sector information security incidents and breaches in order to understand the proportions that relate to human erro

    Game Based Learning for Safety and Security Education

    Full text link
    Safety and security education are important part of technology related education, because of recent number of increase in safety and security related incidents. Game based learning is an emerging and rapidly advancing forms of computer-assisted instruction. Game based learning for safety and security education enables students to learn concepts and skills without the risk of physical injury and security breach. In this paper, a pedestal grinder safety game and physical security game have been developed using industrial standard modeling and game development software. The average score of the knowledge test of grinder safety game was 82%, which is higher than traditional lecture only instruction method. In addition, the survey of physical security game shows 84% average satisfaction ratio from high school students who played the game during the summer camp. The results of these studies indicated that game based learning method can enhance students' learning without potential harm to the students

    Email for clinical communication between healthcare professionals

    Get PDF
    Email is one of the most widely used methods of communication, but its use in healthcare is still uncommon. Where email communication has been utilised in health care, its purposes have included clinical communication between healthcare professionals, but the effects of using email in this way are not well known. We updated a 2012 review of the use of email for two-way clinical communication between healthcare professionals

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history

    Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge

    Get PDF
    The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-assessment methods for quantifying IoT cyber risk posture. To address this gap, an empirical analysis is performed of 12 cyber risk assessment approaches. The results and the main findings from the analysis is presented as the current and a target risk state for IoT systems, followed by conclusions and recommendations on a transformation roadmap, describing how IoT systems can achieve the target state with a new goal-oriented dependency model. By target state, we refer to the cyber security target that matches the generic security requirements of an organisation. The research paper studies and adapts four alternatives for IoT risk assessment and identifies the goal-oriented dependency modelling as a dominant approach among the risk assessment models studied. The new goal-oriented dependency model in this article enables the assessment of uncontrollable risk states in complex IoT systems and can be used for a quantitative self-assessment of IoT cyber risk posture

    Are HIV smartphone apps and online interventions fit for purpose?

    Get PDF
    Sexual health is an under-explored area of Human-Computer Interaction (HCI), particularly sexually transmitted infections such as HIV. Due to the stigma associated with these infections, people are often motivated to seek information online. With the rise of smartphone and web apps, there is enormous potential for technology to provide easily accessible information and resources. However, using online information raises important concerns about the trustworthiness of these resources and whether they are fit for purpose. We conducted a review of smartphone and web apps to investigate the landscape of currently available online apps and whether they meet the diverse needs of people seeking information on HIV online. Our functionality review revealed that existing technology interventions have a one-size-fits-all approach and do not support the breadth and complexity of HIV-related support needs. We argue that technology-based interventions need to signpost their offering and provide tailored support for different stages of HIV, including prevention, testing, diagnosis and management
    • …
    corecore