73 research outputs found

    The lived experience of adolescents with haematological malignancies in Jordan : an interpretive phenomenological analysis study

    Get PDF
    This thesis explored and documented the lived experiences of Jordanian adolescents with haematological malignancies (HMs). The study explored how these adolescents described their cancer journey throughout the different stages and how these experiences shaped the adolescents’ behavioural responses and coping strategies. A literature review revealed a paucity of bio-psychosocial care studies in this area conducted in Arab countries when compared to western countries. Furthermore, the available research was dominated by quantitative studies, with a dearth of research focused on adolescents with HM. Such a paucity of literature and limited understanding of adolescents’ experiences of living with HM has the potential to compromise the quality of care provided to this group of patients. This study contributes to the understanding of adolescents’ lived experiences and factors that facilitated or inhibited the experience through an in-depth descriptive account.A prospective longitudinal study using an interpretative phenomenological analysis methodology explored the lived experience of 14 Jordanian adolescents with haematological malignancies during the first six months following their diagnosis. In this study, in-depth interviews were the main method of data collection. A total of 27 face-to-face, semi-structured interviews were completed and each interview took on average 75 minutes. Each interview was transcribed verbatim and the data analysis occurred using the interpretive phenomenological analysis method first described by Smith in 1996. The data from transcribed interviews were managed using ©QSR NVivo8 software for qualitative data analysis.The results of the analysis of data were reported under three main themes depicting the participants’ experiences, which were the “silence of HM”, “life is changing”, and “ways of coping”. The analysis indicated that initially the participants received little information and had limited communication with their parents and health team members to assist them to understand what was happening to them. This resulted in the participants experiencing increased levels of distress and feelings of confusion as they were left alone to comprehend the cause of their physical problems. With the onset of cancer treatments, the bio-psychosocial side effects of the chemotherapy became one of the most distressing factors for participants affecting, as it did, all aspects of their lifeworld and generating uncertainty about their futures. Again, participants reported limited support from health team members during this critical stage. This led to difficulties in overcoming the unpleasant experiences associated with chemotherapy and cancer, for example, the alteration in their body image. Nevertheless, the participants were able to adapt and live with their illness with the use of various coping methods. For example, they used their Islamic belief to empower themselves, while playing down the severity of their illness. Some of them used hospital resources, such as the creativity room at the hospital to assist them to cope with the daily impact of their illness and maintain a sense of normality.The results of this study were consistent with previous research findings, highlighting a number of areas requiring further attention from Jordanian health planners and health team members responsible for caring for adolescents with haematological malignancies. For example, health team members need to place emphasis on the provision of psychosocial care for adolescents in order to prevent the development of co-morbidities during the illness journey. Health team members should also adopt a family centered approach to care to reduce the stress and concern of both the adolescents and their parents. In general, health team members, communities and schools need to work in collaboration in order to effectively provide adolescents with holistic care. The findings have added significantly to existing knowledge and understanding of the spiritual and psychosocial needs of adolescents during this time, particularly because this is the first qualitative research study conducted in Jordan in this area of health care.This thesis has limitations of which one was that due to hospital policy some of the participants’ parents attended the two data collection periods and their presence may have impacted of the experiences expressed. The thesis concludes with a discussion of practice changes and future research projects in this area. Additional longitudinal, qualitative and prospective research studies are needed to explore the lived experiences of adolescents with HM to further identify the bio-psychosocial developmental changes that they experience during their illness journey

    Information Security Policy Compliance: The Role of Information Security Awareness

    Get PDF
    Compliance and systems misuse has been the focus of researchers in the last couple of years. However, given that voids in this area is still significant and systems abuse is a pressing issue likely to persist in the future, more investigation is needed in this area. Toward this end, we conducted a research study to help understand factors motivating compliance behavior intentions. Drawing on Theory of Planned Behavior, we investigated the role of users’ self-learning and knowledge of security issues in shaping their attitudes toward compliance with information security policies (ISPs). We collected data from nine financial organizations to test the proposed research model. Results show that employees’ previous knowledge of security issues and technologies have significant positive impact on their attitudes toward compliance with ISPs. This study sheds light on the importance of users’ general awareness of security issues and technologies in shaping their attitudes to comply with ISPs

    Information Security Policy Compliance: A User Acceptance Perspective

    Get PDF
    Compliance with information security policies (ISPs) is a key factor in reducing an organization’s information security risks. As such, understanding employees’ compliance behavior with ISPs is an important first step to leverage knowledge worker assets in efforts targeted toward reducing information security risks. This study adapts the Technology Acceptance Model (TAM) to examine users’ behavioral intention to comply with ISPs. The impact of information security awareness on behavioral intentions to comply is also considered in the research model. This is a research in progress, and an instrument is being developed to conduct a survey study to gather data from employees in the banking sector in Jordan

    The impact of incentives on the performance of employees in public sector: Case study in Ministry of labor

    Get PDF
    The ultimate purpose of this search is to evaluate of incentives on the performance of employees in Jordan Case study :( Ministry of Labor). Results show that Incentives affect the performance of staff in the public sector in Jordan, do not affect the practical experience on the performance of staff in the public sector and the qualification does not affect the performance of  staff in the government sector. And recommendations are made in In order to focus on providing fair and adequate compensation when retired employees and  salaries compatable with the level of their performance at work and the interest in providing moral support and praise for the staff to raise the level of their performance. Keywords: incentives, practical experience, performance of employees

    Security policy compliance: User acceptance perspective

    Get PDF
    Information security policy compliance is one of the key concerns that face organizations today. Although, technical and procedural security measures help improve information security, there is an increased need to accommodate human, social and organizational factors. While employees are considered the weakest link in information security domain, they also are assets that organizations need to leverage effectively. Employees\u27 compliance with Information Security Policies (ISPs) is critical to the success of an information security program. The purpose of this research is to develop a measurement tool that provides better measures for predicting and explaining employees\u27 compliance with ISPs by examining the role of information security awareness in enhancing employees\u27 compliance with ISPs. The study is the first to address compliance intention from a users\u27 perspective. Overall, analysis results indicate strong support for the proposed instrument and represent an early confirmation for the validation of the underlying theoretical model

    Coping Strategies of Jordanian Adolescents With Cancer: An Interpretive Phenomenological Analysis Study

    Get PDF
    Interpretive phenomenological analysis methodology was used to explore coping strategies used by hospitalized Jordanian adolescents with cancer. In-depth face-to-face interviews were conducted with 10 Jordanian adolescents, aged 13 to18 years, who were receiving chemotherapy for cancer. During treatment, participants were confronted with physical, psychosocial, and emotional distresses resulting from the disease process, the treatment, and its associated side-effects. To cope with the impact of their illness, participants utilized 4 coping strategies: "Strengthening spiritual convictions," "Being optimistic and rebuilding hope," "Enhancing appearance," and "Finding self again." The findings of this study can assist health team members to promote positive psychological care to Arab Muslim adolescents with cancer in a supportive and therapeutic treatment environment

    Information Security Policy Compliance: An Ethical Perspective

    Get PDF
    Ethical issues are key factors with respect to compliance intention with information security policies (ISPs). As such, understanding employees’ compliance behavior with ISPs from ethical lenses is an important first step to leverage knowledge worker assets in efforts targeted toward reducing information security risks. This study proposes an integrated model that combines the Theory of Reasoned Action (TRA) and ethics theories; deontology and teleology, to examine users’ behavioral intention to comply with ISPs. This is a research in progress, and an instrument is under development to conduct a survey study to gather data from employees in the banking sector in Jordan

    Information Security Policy Compliance: An Empirical Study of Ethical Ideology

    Get PDF
    Information security policy compliance (ISP) is one of the key concerns that face organizations today. Although technical and procedural measures help improve information security, there is an increased need to accommodate human, social and organizational factors. Despite the plethora of studies that attempt to identify the factors that motivate compliance behavior or discourage abuse and misuse behaviors, there is a lack of studies that investigate the role of ethical ideology per se in explaining compliance behavior. The purpose of this research is to investigate the role of ethics in explaining Information Security Policy (ISP) compliance. In that regard, a model that integrates behavioral and ethical theoretical perspectives is developed and tested. Overall, analyses indicate strong support for the validation of the proposed theoretical model

    Evaluating Carbon Footprint in the Life Cycle Design of Residential Concrete Structures in Jordan

    Get PDF
    The construction industry is a significant source of greenhouse gas emissions, and there is a growing global interest in reducing the environmental impact of carbon dioxide emissions associated with building construction and operation. Concrete, the most commonly used material in construction, is known to release a substantial amount of environmentally harmful waste throughout its life cycle, including production, construction, operation, and demolition. The worldwide production and consumption of concrete contribute to approximately 5% of all human-related CO2 emissions each year. To assess the carbon footprint of concrete manufacturing and its application in construction projects, a comprehensive approach called life cycle assessment (LCA) is necessary. This paper presents a new process-based LCA approach to analyze carbon emissions and evaluate the carbon footprint of concrete from raw material extraction to the end-of-life stage. To address carbon emissions throughout the life cycle of concrete structures in the Middle East, the study adopts a case study approach, focusing on selected concrete structures in Jordan. The findings from these case studies highlight that the operational phase of concrete structures is the primary contributor to carbon emissions. By thoroughly examining the carbon cycle within structures and their interactions with the surrounding ecosystem, significant reductions in CO2 emissions, environmental deterioration, and its consequences can be achieved. Doi: 10.28991/CEJ-2023-09-07-07 Full Text: PD

    The Ottoman Empire Procedures in Preventing Zionism Infiltration to Jerusalem in the Reign of Sultan Abdul Hamid II District of the (1876-1909)

    Get PDF
    The current study is seeking to answer one main question which is: Did the Ottoman take proper and critical procedures to prevent Zionism infiltration to district of empire Jerusalem? What are the related consequences?. The study deals with three domains: 1. Herzl international communications. 2. Immigrations to Jerusalem. 3. proper and critical procedures taken by the Ottoman Empire to prevent Zionism infiltration to Jerusalem. The researchers attached two reports for governors Akram Bek and Ahamd Rasheed Bek as two main sources of this study. The study adopted Ottoman documents, Arabic studies, Turkish studies and foreign studies. The study concludes that the Ottoman empire represented by Sultan Abdulhamid did not ;legitimize the Jewish immigration to Palestine and loyal employees such as Akram Bek transformed this into practical procedures. Meanwhile, some corrupted employees breached this and facilitated the immigration of jews to Palestine.Similar breach are taking place nowdays
    • …
    corecore