116,472 research outputs found
Recommended from our members
Police Knowledge Exchange: Full Report 2018
[Executive Summary]
This report was commissioned to explore the enablers and barriers to sharing within and between police forces and between police forces and partners, including the public. This was completed from an interdisciplinary review of international literature covering sharing, knowledge exchange, learning and organisational learning. The literature broke down into four main factors; who, why, what and how. An introduction to the literature is presented with ‘Who’ is sharing which considers both personal identity and different institutional issues. The ‘Why’ literature covers issues of cultural and community motivators and barriers. The ‘What’ segment reviews concepts of data, information and knowledge and related legislative issues. Finally, the ‘how’ section spans face to face sharing approaches to technologies that produce both enablers and barriers. A series of 42 in-depth interviews and focus groups were completed and combined with 47 survey responses . The aim of the interviews, focus groups and survey was to show perceptions and beliefs around knowledge sharing from a small sample across policing in order to complement the findings from the literature review.
The survey was adapted from a standardised questionnaire (Biggs, 1987). The Biggs questionnaire focused on what motivated students to learn and how they approached their learning. Our adapted survey looked at what motivated police to share, and how they approached sharing. The responses showed a trend, across the police, towards a motivation for sharing to develop a deeper understanding of issues. However, the approaches and the strategies they used to share with others, which were primarily driven by achieving and surface approaches (to get promoted and get the job done). According to Biggs (1987) this could leave them discontented as they never progress to a deeper understanding of issues. Scaffolding sharing within the police through processes that are clearly defined, effective and valued could help to overcome these issues.
Within the interviews and focus group findings a similar structured approach to sharing was adopted. Within the ‘who’ section some key aspects around personal relationships, reciprocity and reputation were identified. The ‘why’ the police share was one of the largest discussion points. Not only was there a deep motivation to solve key policing issues there was an approach of reciprocity. Police sharing was deeply motivated to support ‘good practice’ in the prevention and detection of crime. However, a sharing barrier was identified in the parity of value given to different types of knowledge for example between professional judgement and research evidence knowledge. Sharing was achieved when there were reciprocal benefits, in particular with personal networks or face to face sharing which was noted as ‘safe’. Again, this was inhibited by misunderstandings around the ‘risks’ of sharing, frequently attributed to data protection legislation; producing cautious reactions and as an avoidance tactic to save time and effort sharing. However, a divide was noted between technical users and those who avoided any online systems for sharing; often due to poorly designed systems and a lack of confidence in how to use systems. The police culture was identified as being risk-adverse, and competitive due to multiple factors, a lack of supported time to share, Her Majesty’s Inspectorate of Constabulary (HMIC) reviews and promotion criteria. The result was perceived to be a poor cultural ability to learn from mistakes and a likelihood to repeat errors.
A set of strategic recommendations are given and include the use of a sharing authorised professional practice for HMIC reviews, sharing networks and training. A further set of operational recommendations are given such as; sharing impact cases for evidence based practice, data sharing officers and evaluating mechanisms for sharing.
This full report is supported by the Police Knowledge Exchange Summary Report 2018 which gives an overview of the findings and recommendations
Recommended from our members
E-learning adoption in higher education in Jordan: vision, reality and change
This paper discusses the implementation of an e-learning program at a Jordanian University (Al-Ahliyya Amman University). The program originally aimed to establish a virtual university which offers totally online courses but due to a number of reasons there had to be some changes in the implementation process. The paper discusses such changes and challenges faced by AAU in implementing its e-learning program from an IS project management point of view. Findings suggest that implementing such projects needs careful consideration of a variety of issues to ensure that the objectives are achieved. The case provides rich insights to other educational institutions wishing to implement such projects
E-safety and Web 2.0: Web 2.0 technologies for learning at Key Stages 3 and 4
Becta commissioned the University of Nottingham in conjunction with London Knowledge Lab and Manchester Metropolitan University to research Web 2.0 technologies for learning at Key Stages 3 and 4. This is the fourth report from that research and concentrates on the e-safety aspects of Web 2.0 in education
Identifying immersive environments’ most relevant research topics: an instrument to query researchers and practitioners
This paper provides an instrument for ascertaining researchers’ perspectives on the relative relevance of technological challenges facing immersive environments in view of their adoption in learning contexts, along three dimensions: access, content production, and deployment. It described its theoretical grounding and expert-review process, from a set of previously-identified challenges and expert feedback cycles. The paper details the motivation, setup, and methods employed, as well as the issues detected in the cycles and how they were addressed while developing the instrument. As a research instrument, it aims to be employed across diverse communities of research and practice, helping direct research efforts and hence contribute to wider use of immersive environments in learning, and possibly contribute towards the development of news
and more adequate systems.The work presented herein has been partially funded under the European H2020 program H2020-ICT-2015, BEACONING project, grant agreement nr. 687676.info:eu-repo/semantics/publishedVersio
Bringing Global Sourcing into the Classroom: Experiential Learning via Software Development Project
Global sourcing of software development has imposed new skill requirements on Information Technology (IT) personnel. In the U.S., this has resulted in a paradigm shift from technical to softer skills such as communications and virtual team management. Higher education institutions must, consequently, initiate innovative curriculum transformations to better prepare students for these emerging workforce needs. This paper describes one such venture between Marquette University (MU), U.S.A. and Management Development Institute (MDI), India, wherein IT students at MU collaborated with Management Information Systems (MIS) students at MDI on an offshore software development project. The class environment replicated an offshore client/vendor relationship in a fully virtual setting while integrating communications and virtual team management with traditional IT project management principles. Course measures indicated that students benefited from this project, gained first-hand experience in the process of software offshoring, and learned skills critical for conduct of global business. For faculty considering such initiatives, we describe the design and administration of this class over two semesters, lessons learned from our engagement, and factors critical to success of such initiatives and those detrimental to their sustenance
Planning strategically, designing architecturally : a framework for digital library services
In an era of unprecedented technological innovation and evolving user expectations and information seeking behaviour, we are arguably now an online society, with digital services increasingly common and increasingly preferred. As a trusted information provider, libraries are in an advantageous position to respond, but this requires integrated strategic and enterprise architecture planning, for information technology (IT) has evolved from a support role to a strategic role, providing the core management systems, communication networks, and delivery channels of the modern library. Further, IT components do not function in isolation from one another, but are interdependent elements of distributed and multidimensional systems encompassing people, processes, and technologies, which must consider social, economic, legal, organisational, and ergonomic requirements and relationships, as well as being logically sound from a technical perspective. Strategic planning provides direction, while enterprise architecture strategically aligns and holistically integrates business and information system architectures. While challenging, such integrated planning should be regarded as an opportunity for the library to evolve as an enterprise in the digital age, or at minimum, to simply keep pace with societal change and alternative service providers. Without strategy, a library risks being directed by outside forces with independent motivations and inadequate understanding of its broader societal role. Without enterprise architecture, it risks technological disparity, redundancy, and obsolescence. Adopting an interdisciplinary approach, this conceptual paper provides an integrated framework for strategic and architectural planning of digital library services. The concept of the library as an enterprise is also introduced
Addressing the cyber safety challenge: from risk to resilience
Addressing the cyber safety challenge: from risk to resilience describes the cyber safety issues emerging from a range of technology trends, how different populations are using technologies and the risks they face, and how we can effectively respond to each group’s unique cyber safety needs.
Written by the University of Western Sydney for Telstra Corporation Ltd, the report advocates for continuing to move cyber safety from a ‘risk and protection’ framework to one that focuses on building digital resilience, as well as fostering trust and confidence in the online environment. To do this we need to:
Address the needs of populations often neglected by current policies and programs – including adults, seniors, parents, and small to medium enterprises
Continue to build the digital literacy skills of all populations, because digital literacy strongly influences users’ ability to engage safely online – this is best achieved by a hands-on learning approach
Keep risk in perspective – the risks and benefits of digital participation go hand in hand
Broaden the focus from awareness-raising to long-term behaviour change.
As digital technologies become further integrated into the everyday lives of Australians, users are potentially exposed to greater risks. However, the risks and benefits of digital participation go hand in hand. The challenge, therefore, is to support users to minimise the risks without limiting their digital participation and their capacity to derive the full benefits of connectivity. If Australians are to benefit as either consumers or providers of online services and products in the e-commerce environment, consumer safety and trust need to be improved.
Cyber safety needs to be considered against a transforming backdrop of technology trends, products and practices. While the rise of social media has tended to dominate recent debate and developments in cyber safety, particularly in relation to young people, a range of other trends is also shaping how users engage online, the risks they potentially face in the new media landscape, and the strategies used to address them. These trends include the rise of user generated content and content sharing platforms; the uptake of mobile technologies and, in particular, the adoption of smartphones; cloud computing; platform integration and single sign-on mechanisms; and the rise of GPS and location based services
EU - Information and Communication Technology (ICT) and e-learning in Education Project - Phase II
The training needs analysis was conducted beteeen February and April 2015 for the EU funded project: ICT in Education in Kosovo. The processes required to perform the traning needs analysis have been. The design of a framework of competences; The identification of target groups; The creation and implementation of an online survey to assess the competence of education sector personnel against the competences contained in the framework; The collation, preparation and analysis of the survey data; and Reporting the research findings.European Union Office in KosovoEuropeAid/133846/C/SER/X
Proposal to Strenghern Health Information System [HIS]
\ud
The HMIS Program described in this document aims at improving and strengthening the current Health Management Information System (HMIS) in Tanzania, known as MTUHA. The consortium behind the HMIS Program is headed by the Ministry of Health & Social Welfare (MOHSW) and consists of the following additional partners; Ifakara Health Research and Development Centre, University of Dar es Salaam and the University of Oslo, representing national and international capacity in HMIS. The HMIS Program is linked to the Payment for performance (P4P) funding scheme which is initiated by the Norway Tanzania Partnership Initiative. The P4P has a focus on maternal and child health and relies upon quality indicators on performance in these areas from health facilities and districts. The provision of quality data and indicators on MDG 4 & 5 is therefore a key target for the HMIS Program. The chosen approach is, however, to derive these data from the HMIS and not to establish a separate data collection structure, hence the HMIS Program. Quality information by way of essential indicators, such as for monitoring the Millennium Development Goals 4 & 5, are crucial for health services delivery and program management as well as for M&E. Currently, however, the HMIS is not providing such needed data of sufficient completeness, timeliness and quality, leading health programs and funding agencies to establish their own structures for data collection, and thus creating fragmentation and adding to the problem. The HMIS Program aims at changing this negative trend and turning the HMIS into the key source of shared essential quality information in Tanzania by; focusing on action oriented use of information for management at each level of the health services and by providing timely quality information to all stakeholders, including all health programs and funding agencies in the HMIS strengthening process – making it an all-inclusive national process, focusing on capacity development; on-site support and facilitation, short courses and continuous education, building capacity in the MOHSW and establishing a national network of HMIS support, and by building on experience, methods and tools from Africa’s “best practices” HMIS, such as South Africa – and Zanzibar Within this proposal the aim is to carry out the HMIS strengthening process in 1/3 of the districts in the country, 7 regions, during the first 3 years. The objective, however, is to cover the entire country during the 5 years duration of the NTPI. By aiming at quick and tangible results, the expectation is that other funding agencies will join forces and thereby ensuring national coverage.\ud
\u
Strategic planning the key to financial sustainability: a value for money planning guide
"This practical guide aims to support schools in creating a five-year strategic plan and recommends
good practice through innovative strategies underpinned by sound resource planning - thus ensuring
long-term financial sustainability and value for money." - Page 2
- …