82,167 research outputs found

    Competency-based assessment for the training of PhD students and early-career scientists.

    Get PDF
    The training of PhD students and early-career scientists is largely an apprenticeship in which the trainee associates with an expert to become an independent scientist. But when is a PhD student ready to graduate, a postdoctoral scholar ready for an independent position, or an early-career scientist ready for advanced responsibilities? Research training by apprenticeship does not uniformly include a framework to assess if the trainee is equipped with the complex knowledge, skills and attitudes required to be a successful scientist in the 21st century. To address this problem, we propose competency-based assessment throughout the continuum of training to evaluate more objectively the development of PhD students and early-career scientists. © 2018, Verderame et al

    The China Medical Boards Fellowship Programs and Its Shifting Focus to Taiwan during the Postwar Era, 19511973

    Get PDF
    In this report, I investigate the institutionalization of the China Medical Board's (CMB) exchange fellowship programs and its shifting focus from Mainland China to a broader East Asia region from 1951 to 1973. In particular, this report looks at the CMB fellowship programs in Taiwan, which facilitated a gigantic wave of young health professionals moving from Taiwan to the United States during the postwar era. I begin by analyzing the major historical events that ultimately shifted CMB's direction from Mainland China to other parts of Asia, and the ways in which Taiwan became a critical focus for CMB after its retreat from Mainland China. The report's second half lies in the anatomy of the CMB fellowship program's operation in the two elite medical schools in Taiwan—the Medical College at the National Taiwan University (NTU) and the National Defense Medical Center (NDMC). I examine the demographical trends from the CMB fellowship allocation files and the key components that emerged from the CMB fellowship program.

    Effect of change in the CG CAHPS survey instrument recall period on patient experience scores on healthcare utilization

    Get PDF
    Standardized patient experience survey instruments play an important role in informing healthcare quality and process improvement. However, any changes in standardized instruments can impact the interpretation, trending, and analysis of patient reported data. This study investigates how the change in Clinician and Group Consumer Assessment of Healthcare Providers and Systems (CG CAHPS) survey recall period, from 12- to 6-months, can impact the accuracy and quality of patient experience data. This study used primary survey data on patient experience collected in 2016. Analyses included tests of proportion and t-tests for a comparison of: 1) experience ratings, and 2) administrative data to corroborate how accurately respondents report the number of visits received within the recall period. The findings indicated that respondents, on average, underestimated their usage of care based on a 12-month recall period, apart from those who reported just one visit. A shorter 6-month recall period resulted in higher accuracy in reporting the number of actual visits that occurred. Furthermore, experiential measures showed consistently higher scores across measures for Provider Communications, Staff Communications, Timely Access to Care, and Care Coordination for a 6-month recall period compared to a 12-month period. This study showed that it would be difficult to compare CG CAHPS Version 2.0 to Version 3.0 due to recall differences in experiential measures. Given that shorter recall periods tend to be associated with higher CG CAHPS ratings, healthcare stakeholders should consider bias introduced by changes of recall periods in survey instruments. Experience Framework This article is associated with the Policy & Measurement lens of The Beryl Institute Experience Framework. (http://bit.ly/ExperienceFramework) Access other PXJ articles related to this lens. Access other resources related to this lens

    Assessing Generational Differences in Susceptibility to Social Engineering Attacks. A Comparison Between Millennial and Baby Boomer Generations

    Get PDF
    Digitaalse ühiskonna ajastul on sotsiaalse manipuleerimise ründed (social engineering attacks)väga edukad ja kahjuks kasutajad ei suuda ennast selliste rünnakute vastu kaitsta. Sotsiaalne manipuleerimine (social engineering) on keeruline probleem, mistõttu on väga raske eristada kõige kaitsetumaid kasutajaid. Sellised ründed ei ole suunatud ainult noorte ja töötajate vastu, vaid on laiaulatuslikud sõltumata vanusest. Tehnoloogia kiire kasvu ja selle ebasihipärase kasutamise tõttu on kõik selliste rünnakute poolt mõjutatud, kõik on haavatavad (Purkait, 2012; Aggarwal et al., 2012). Kasutajaid peetakse turvalisuse "nõrgimaks lüliks" (Mohebzada et al., 2012; Mitnick and Simon, 2011), ja seega konfidentsiaalse info kaitsmine peaks olema kõikide inimeste eesmärk. Hoolimata sellest, et on olemas erinevaid lahendusi kasutajate koolitamiseks selliste rünnakute vältimiseks, andmepüük on jätkuvalt edukas (Dhamija et al., 2006). See on eelkõige seetõttu, et küberteadlikkuse koolitused, teoreetilised kursused või raamistikud eeldatakse olevat võrdselt efektiivsed kõikidele kasutajatele vaatamata nende vanusest, kuigi kogemus näitab et see ei ole tõsi (Alseadoon, 2014). Selleks, et koolitused saaksid olla efektiivsed, on oluline et need on koostatud lähtudes sotsiaalse manipuleerimise turvanõrkustest, mis on erinevatel vanusegruppidel erinevad. Käesoleva töö eesmärgiks on põlvkondade unikaalsete tunnuste (demograafilised ja isikulised) ja nende haavatavuste faktorite määratlemine. Sellealusel on loodud raamistik, mis on võimalik rakendada ja mis addresseerib neid nõrkusi. Arvesse võttes probleemi keerikust, käesolev uurimistöö näitab, et on vaja läbi viia edasisi uurimusi laiemast perspektiivist lähtuvalt lisades "põlvkondade" elemendi uurimiseesmärkidesse, et kas on erinevusi haavatuse riskide osas läbi põlvkondade. Käesolev uurimistöö kasutab nii kvalitatiivseid kui kvantitatiivseid meetodeid eesmärkide saavutamiseks. Andmekogumise rünnaku efektiivsuse hindamisel analüüsitakse kasutajate käitumist ning antakse sellele psühholoogiline tõlgendus. Esimene uurimisküsimus keskendub sotsiaalne manipulatsiooni haavatavuse faktorite määratlemisele ja kvantitatiivsed andmed (statistiline analüüs) näitavad, et põlvkond on oluline element potentsiaalsete sotsiaalse manipulatsiooni ohvrite eristamisel, kusjuures arvutikasutusoskus ja haridustase ei määra olulist rolli hindamaks kasutajate tõenäosust langeda selliste rünnakute ohvriks. Eelpool toodud faktorite ja ka eelnevate uuringute alusel, ei ole ka sugu määrav faktor haavatavuse ennustamisel (Parsons et al., 2013). Teine uurimisküsimus püüab selgitada, mis põhjustab põlvkondade haavatavuse erinevusi ning uuringu tulemused näitavad, et Y-põlvkonna isikuomadused, sh teadvus, ekstravertsus ja meeldivus on põhifaktorid, mis mõjutavad haavatavust. Viimasena, lisaks tugeva aluse loomisel edaspidiseks põlvkondade haavatavuse uurimisel, pakub käesolev töö välja raamistiku, milles on eeltoodud leiud arvesse võetud ja mille eesmärk on vähendada Y-põlvkonna haavatust sotsiaalse manipuleerimise rünnakutele. Käesoleva magistritöö unikaalsus seisneb üldises lähenemisviisis: alates ulatuslikus kirjanduse ülevaates "põlvkondade" haavatavuse faktorite määratlemisega, statistilise analüüsiga haavatavuste hindamiseks ja lõpetades lahenduse väljapakkumisega, mis aitab lahendada "põlvkondade" turvalisuse probleemi.In the age of digital society Social Engineering attacks are very successful and unfortunately users still cannot protect themselves against these threats. Social Engineering is a very complex problem, which makes it difficult to differentiate among vulnerable users. These attacks not only target young users or employees, they select massively, regardless of the users' age. Due to the rapid growth of technology and its misuse, everyone is affected by these attacks, everyone is vulnerable to them (Purkait, 2012; Aggarwal et al., 2012). Users are considered the "weakest link" of security (Mohebzada et al., 2012; Mitnick and Simon, 2011) and as such, protecting confidential information should be the ultimate goal of all people. However, despite the fact that a number of different strategies exists to educate or train endusers to avoid these attacks, they still do, phishing still succeeds (Dhamija et al., 2006). This is mainly because the existing security awareness trainings, theoretical courses, or frameworks are expected to be equally effective for all users regardless of their age, but experience has shown that this is not true (Alseadoon, 2014). In order for these security trainings to be effective, it is essential that they are composed based on the Social Engineering security weaknesses attributed differently to different generations. Identifying unique characteristics (demographic and personality) of generations, determinants of their vulnerability is what this work aims to do. Then frameworks crafted based on that information (addressing these weaknesses) would be of use and worth implementing. Therefore, taking into consideration the complexity of this problem, this study suggests that there is a need to research it from a broader perspective, adding the "generation" element into the study focus to find out if there is indeed any difference in susceptibility among generational cohorts. In order to do so, this research will adapt both qualitative and quantitative methods towards reaching its objectives. Collected-data of users' performance in a phishing assessment are analyzed and psychological translation of results is provided. Thus, the first research question seeks to address what factors determinate endusers vulnerability to Social Engineering, and results from quantitative data (statistical analysis) show that generation is an important element to differentiate potential victims of Social Engineering, whilst computer-efficacy or educational level do not play any noteworthy role in predicting endusers' likelihood of falling for these threats. In consistency with the above elements and previous studies, also gender is shown no potentiality in predicting susceptibility (Parsons et al., 2013). The second research question deems to explain what makes generations differ in susceptibility and this study's findings propose that generation Y personality traits such as consciousness, extraversion and agreeableness are key influencers of their shown vulnerability. Finally, along with establishing strong foundations for future research in studying generations susceptibility to Social Engineering, this thesis employ these findings in proposing a framework aiming to lessen millennial likelihood to Social Engineering victimization. The originality of this study lies on its overall approach: starting with an exhaustive literature review towards identifying factors impacting generations' susceptibility level, then statistically measuring their vulnerability, to finish with a solution proposal crafted to suit the observed generational security weaknesses

    No Girls Allowed: Television Boys’ Clubs as Resistance to Feminism

    Get PDF
    This article analyzes the male-only spaces present in four television series, FX’s The Shield, Nip/Tuck , Rescue Me, and ABC’s Boston Legal, which each include a gendered territory as a recurring feature. I argue that these homosocially segregated environments enforce boundaries against women and shelter intense bromance relationships that foreclose romantic relationships of any kind, acting as physical incarnations of troubling retrograde sexual politics and ideologies. I also assert that the “boys’ clubs” in which these narratives take place, enabled and empowered by the aesthetic dimensions of architecture and design, help establish workplace patriarchy as commonplace, reasonable, and benign. This article reveals that in these television boys’ clubs, problematic gender ideologies are protected and celebrated, misogyny is naturalized, and patriarchal beliefs and behaviors legitimized

    Action Collaborative on Clinician Well-Being and Resilience

    Get PDF
    https://openworks.mdanderson.org/hrc_burnout_presentations/1000/thumbnail.jp

    Gerodiversity - How Facing Adversity across the Lifespan can Foster Workplace Resilience

    Get PDF
    Symposium Topic: Older Women Who Work: Examinations of Grey and Grit Chair: Lisa Hollis-Sawyer, PhD, Northeastern Illinois University Participants: Mary Gergen, PhD, Penn State University; and Ellen Cole, PhD, The Sage Colleges. When Just Getting by Is Getting Old: Women Working in Later Life to Pay the Bills- Monica Teixeira, MA, Columbia College. The Impact of Aging and Authentic Leadership in a Higher Education Latina Leader - Julie Hicks Patrick, PhD, West Virginia University. Appalachian Grit and Older Working Women - Niva Piran, PhD, University of Toronto, Toronto, ON, Canada. Missions Continued: The Meaning of Work in Older Women’s Lifelong Journey - Ashley Stripling, PhD, and Jodie Maccarrone, MS, Nova Southeastern University. Gerodiversity - How Facing Adversity Across the Lifespan Can Facilitate Workplace Resilience Discussant: Ellen Cole, PhD, The Sage College

    CASE STUDIES OF EdD AND PhD DISSERTATIONS

    Get PDF
    The purpose of this study is to provide an understanding of how faculty describe the purpose, expectations and quality of dissertations in education administration. The study also investigated differences and similarities between PhD and EdD dissertations. This study was guided by this general question: How do faculty describe is the purpose, expectations and quality of a PhD and EdD dissertation in education administration. This study is a qualitative case study of five education administration programs housed at research universities that offer both the PhD and EdD degree in education administration. The study found that the purpose of the PhD and EdD degree is similar and focuses on career preparation. In addition, PhD and EdD education administration programs have similar expectations in their coursework, exams and with the dissertation. And that faculty use the same terminology to describe the quality of PhD and EdD doctoral dissertations. Based on these findings, future research should consider how education administration doctoral students learn to do research and the effectiveness of having two doctoral degrees with very similar expectations and purposes
    corecore