4 resultados para Information behaviours

em Aston University Research Archive


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objective To investigate current use of the internet and eHealth amongst adults. Design Focus groups were conducted to explore participants' attitudes to and reasons for health internet use. Main outcome measures The focus group data were analysed and interpreted using thematic analysis. Results Three superordinate themes exploring eHealth behaviours were identified: decline in expert authority, pervasiveness of health information on the internet and empowerment. Results showed participants enjoyed the immediate benefits of eHealth information and felt empowered by increased knowledge, but they would be reluctant to lose face-to-face consultations with their GP. Conclusions Our findings illustrate changes in patient identity and a decline in expert authority with ramifications for the practitioner–patient relationship and subsequent implications for health management more generally.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis explores the processes of team innovation. It utilises two studies, an organisationally based pilot and an experimental study, to examine and identify aspects of teams' behaviours that are important for successful innovative outcome. The pilot study, based in two automotive manufacturers, involved the collection of team members' experiences through semi-structured interviews, and identified a number of factors that affected teams' innovative performance. These included: the application of ideative & dissemination processes; the importance of good team relationships, especially those of a more informal nature, in facilitating information and ideative processes; the role of external linkages in enhancing quality and radicality of innovations; and the potential attenuation of innovative ideas by time deadlines. This study revealed a number key team behaviours that may be important in successful innovation outcomes. These included; goal setting, idea generation and development, external contact, task and personal information exchange, leadership, positive feedback and resource deployment. These behaviours formed the basis of a coding system used in the second part of the research. Building on the results from the field based research, an experimental study was undertaken to examine the behavioural differences between three groups of sixteen teams undertaking innovative an task to produce an anti-drugs poster. They were randomly assigned to one of three innovation category conditions suggested by King and Anderson (1990), emergent, imported and imposed. These conditions determined the teams level of access to additional information on previously successful campaigns and the degree of freedom they had with regarding to the design of the poster. In addition, a further experimental condition was imposed on half of the teams per category which involved a formal time deadline for task completion. The teams were video taped for the duration of their innovation and their behaviours analysed and coded in five main aspects including; ideation, external focus, goal setting, interpersonal, directive and resource related activities. A panel of experts, utilising five scales developed from West and Anderson's (1996) innovation outcome measures, assessed the teams' outputs. ANOVAs and repeated measure ANOVAs were deployed to identify whether there were significant differences between the different conditions. The results indicated that there were some behavioural differences between the categories and that over the duration of the task behavioural changes were identified. The results, however, revealed a complex picture and suggested limited support for three distinctive innovation categories. There were many differences in behaviours, but rarely between more than two of the categories. A main finding was the impact that different levels of constraint had in changing teams' focus of attention. For example, emergent teams were found to use both their own team and external resources, whilst those who could import information about other successful campaigns were likely to concentrate outside the team and pay limited attention to the internal resources available within the team. In contrast, those operating under task constraints with aspects of the task imposed onto them were more likely to attend to internal team resources and pay limited attention to the external world. As indicated by the earlier field study, time deadlines did significantly change teams' behaviour, reducing ideative and information exchange behaviours. The model shows an important behavioural progression related to innovate teams. This progression involved the teams' openness initially to external sources, and then to the intra-team environment. Premature closure on the final idea before their mid-point was found to have a detrimental impact on team's innovation. Ideative behaviour per se was not significant for innovation outcome, instead the development of intra-team support and trust emerged as crucial. Analysis of variance revealed some limited differentiation between the behaviours of teams operating under the aforementioned three innovation categories. There were also distinct detrimental differences in the behaviour of those operating under a time deadline. Overall, the study identified the complex interrelationships of team behaviours and outcomes, and between teams and their context.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Provision of information and behavioural instruction has been demonstrated to improve recovery after surgery. However, patients draw on a range of information sources and it is important to establish which sources patients use and how this influences perceptions and behaviour as they progress along the surgical pathway. In this qualitative, exploratory and longitudinal study, the use of information and instruction were explored from the perspective of people undergoing inguinal hernia repair surgery. Seven participants undergoing inguinal hernia repair surgery were interviewed using semi-structured interviews 2 weeks before surgery and 2 weeks and 4 months post-surgery. Nineteen interviews were conducted in total. Topic guides included sources of knowledge, reasons for help-seeking and opting for surgery and factors influencing return to activity. Data were analysed thematically according to Interpretative Phenomenological Analysis. Participants sought information from a range of sources, focusing on informal information sources before surgery and using information and instruction from health-care professionals post-surgery. This information influenced behaviours including deciding to undergo surgery, use of pain medication and returning to usual activity. Anxiety and help-seeking resulted when unexpected post-surgical events occurred such as extensive bruising. Findings were consistent with psychological and sociological theories. Overall, participants were positive about the information and instruction they received but expressed a desire for more timely information on post-operative adverse events.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.