97 research outputs found

    Patient Safety and Quality: An Evidence-Based Handbook for Nurses

    Get PDF
    Compiles peer-reviewed research and literature reviews on issues regarding patient safety and quality of care, ranging from evidence-based practice, patient-centered care, and nurses' working conditions to critical opportunities and tools for improvement

    Is Airline Passenger Profiling Necessary?

    Get PDF

    Hybridity as a dynamic process of evolution: hybrid transitions in the banking sector

    Get PDF
    This work project explores hybridity as a dynamic process of evolution. Whilst past research has focused on hybridity as a characteristic determined upon foundation, it left under explored the case of incumbent traditional organizations gradually incorporating a hybrid logic. Drawing on the analysis of 57 reportsfrom15 commercial banks, from 2017 to2019,thiswork project applies a thematic trajectory analysis to assess the growing degrees of hybridity visible in the intensification of the social logic, and its convergence with the economic logic in terms of relative importance. The study concludes that hybrid evolution is detectable across different dimensions, thus, advancing scholarship to better reflect the reality of organizations going through a process of ideological transformation

    Is Airline Passenger Profiling Necessary?

    Get PDF

    Democracy and Fake News

    Get PDF
    This book explores the challenges that disinformation, fake news, and post-truth politics pose to democracy from a multidisciplinary perspective. The authors analyse and interpret how the use of technology and social media as well as the emergence of new political narratives has been progressively changing the information landscape, undermining some of the pillars of democracy. The volume sheds light on some topical questions connected to fake news, thereby contributing to a fuller understanding of its impact on democracy. In the Introduction, the editors offer some orientating definitions of post-truth politics, building a theoretical framework where various different aspects of fake news can be understood. The book is then divided into three parts: Part I helps to contextualise the phenomena investigated, offering definitions and discussing key concepts as well as aspects linked to the manipulation of information systems, especially considering its reverberation on democracy. Part II considers the phenomena of disinformation, fake news, and post-truth politics in the context of Russia, which emerges as a laboratory where the phases of creation and diffusion of fake news can be broken down and analysed; consequently, Part II also reflects on the ways to counteract disinformation and fake news. Part III moves from case studies in Western and Central Europe to reflect on the methodological difficulty of investigating disinformation, as well as tackling the very delicate question of detection, combat, and prevention of fake news. This book will be of great interest to students and scholars of political science, law, political philosophy, journalism, media studies, and computer science, since it provides a multidisciplinary approach to the analysis of post-truth politics

    Luton Roma Trust Evaluation

    Get PDF
    A Community Fund commissioned/funded independent evaluation of the services provided by Luton Roma Trust (LRT) to their Roma clients and wider statutory services/civil society in relation to community engagement, creating an inclusive society and supporting the development of accessible public sector services

    Development of a Social Engineering eXposure Index (SEXI) using Open-Source Personal Information

    Get PDF
    Millions of people willingly expose their lives via Internet technologies every day, and even the very few ones who refrain from the use of the Internet find themselves exposed through data breaches. Billions of private information records are exposed through the Internet. Marketers gather personal preferences to influence shopping behavior. Providers gather personal information to deliver enhanced services, and underground hacker networks contain repositories of immense data sets. Few users of Internet technologies have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used by cyber hackers to harm the very organizations with whom they are affiliated. While this threat can affect any person holding any position at an organization, upper management poses a significantly higher risk due to their level of access to critical data and finances targeted by cybercrime. The goal of this research was to develop and validate a Social Engineering eXposure Index (SEXI)™ using Open-Source Personal Information (OSPI) to assist in identifying and classifying social engineering vulnerabilities. This study combined an expert panel using the Delphi method, developmental research, and quantitative data collection. The expert panel categorized and assessed information privacy components into three identifiability groups, subsequently used to develop an algorithm that formed the basis for a SEXI. Validation of the algorithm used open-source personal information found on the Internet for 50 executives of Fortune 500 organizations and 50 Hollywood celebrities. The exposure of each executive and persona was quantified and the collected data were evaluated, analyzed, and presented in an anonymous aggregated form. Phase 1 of this study developed and evaluated the SEXI benchmarking instrument via an expert panel using the Delphi expert methodology. During the first round, 3,531 data points were collected with 1,530 having to do with the demographics, qualifications, experience, and working environments of the panel members as well as 2,001 attributing levels of exposure to personal information. The second Delphi round presented the panel members with the feedback of the first-round tasking them with categorizing personal information, resulting in 1,816 data points. Phase 2 of this study used the composition, weights, and categories of personal information from Phase 1 in the development of a preliminary SEXI benchmarking instrument comprised of 105 personal information items. Simulated data was used to validate the instrument prior to the data collection. Before initiating Phase 3, the preliminary SEXI benchmarking instrument was fully tested to verify the accuracy of recorded data. Phase 3 began with discovering, evaluating, and validating repositories of publicly available data sources of personal information. Approximately two dozen sources were used to collect 11,800 data points with the SEXI benchmarking index. Upon completion of Phase 3, data analysis of the Fortune 500 executives and Hollywood personas used to validate the SEXI benchmarking index. Data analysis was conducted in Phase 3 by one-way Analysis of Variance (ANOVA). The results of the ANOVA data analysis from Phase 3 revealed that age, gender, marital status, and military/police experience were not significant in showing SEXI differences. Additionally, income, estimated worth, industry, organization position, philanthropic contributions are significant, showing differences in SEXI. The most significant differences in SEXI in this research study were found with writers and chief information officers. A t-test was performed to compare the Fortune 500 executives and the Hollywood personas. The results of the t-test data analysis showed a significant difference between the two groups in that Hollywood Personas had a higher SEXI than the Fortune 500 Executives suggesting increased exposure due to OSPI. The results of this research study established, categorized, and validated a quantifiable measurement of personal information. Moreover, the results of this research study validated that the SEXI benchmarking index could be used to assess an individual’s exposure to social engineering due to publicly available personal information. As organizations and public figures rely on Internet technologies understanding the level of personal information exposure is critical is protecting against social engineering attacks. Furthermore, assessing personal information exposure could provide an organization insight into exposed personal information facilitating further mitigation of threats or potential social engineering attack vectors. Discussions and implications for future research are provided

    Democracy and Fake News

    Get PDF
    This book explores the challenges that disinformation, fake news, and post-truth politics pose to democracy from a multidisciplinary perspective. The authors analyse and interpret how the use of technology and social media as well as the emergence of new political narratives has been progressively changing the information landscape, undermining some of the pillars of democracy. The volume sheds light on some topical questions connected to fake news, thereby contributing to a fuller understanding of its impact on democracy. In the Introduction, the editors offer some orientating definitions of post-truth politics, building a theoretical framework where various different aspects of fake news can be understood. The book is then divided into three parts: Part I helps to contextualise the phenomena investigated, offering definitions and discussing key concepts as well as aspects linked to the manipulation of information systems, especially considering its reverberation on democracy. Part II considers the phenomena of disinformation, fake news, and post-truth politics in the context of Russia, which emerges as a laboratory where the phases of creation and diffusion of fake news can be broken down and analysed; consequently, Part II also reflects on the ways to counteract disinformation and fake news. Part III moves from case studies in Western and Central Europe to reflect on the methodological difficulty of investigating disinformation, as well as tackling the very delicate question of detection, combat, and prevention of fake news. This book will be of great interest to students and scholars of political science, law, political philosophy, journalism, media studies, and computer science, since it provides a multidisciplinary approach to the analysis of post-truth politics

    A comparison of career goals and educational values between Hispanic immigrant and Caucasian United States citizen employees of Louisiana crawfish farm operations

    Get PDF
    Hispanic immigrants come to the United States with hopes to obtain a better life for their families through perceived better wages and educational opportunities. One source of income for Hispanic immigrants is through employment in crawfish farm operations. Crawfish farm operations benefit from the employment of Hispanic immigrants through government programs that supply workers to the industry. Therefore, many crawfish farm operations in Louisiana employ both Caucasian U.S. citizen and Hispanic immigrant labor to operate efficiently. The purpose of this study was to compare selected characteristics of crawfish farm workers as well as to explore values related to education, monetary values, career expectations, and perceptions of migrant workers held by each ethnic group. The results of this study indicated significant differences associated with Hispanic immigrant and Caucasian U.S. citizen crawfish farmer’s educational backgrounds, demographics, monetary values, career values, and perceptions of migrant workers. The Hispanic immigrants are younger and have a lower overall educational attainment than the Caucasian U.S. citizens. Also, education is equally important for Caucasian U.S. citizens and Hispanic immigrants. Hispanic immigrants perceive monetary earnings and migrant workers as more important than is perceived by Caucasian U.S. citizens; while Caucasian U.S. citizens perceive career plans and working on crawfish farms as more important than is perceived by Hispanic immigrants. The results of this study can be used by extension services and other educational programs to direct future educational activities based on collected information related to values and perceptions of crawfish farm employees in Louisiana. These activities can enhance the value of extension and educational programs that are meant to serve all populations in Louisiana
    • …
    corecore