983 resultados para healthcare communication


Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the most part, the literature base for Integrated Marketing Communication (IMC) has developed from an applied or tactical level rather than from an intellectual or theoretical one. Since industry, practitioner and even academic studies have provided little insight into what IMC is and how it operates, our approach has been to investigate that other IMC community, that is, the academic or instructional group responsible for disseminating IMC knowledge. We proposed that the people providing course instruction and directing research activities have some basis for how they organize, consider and therefore instruct in the area of IMC. A syllabi analysis of 87 IMC units in six countries investigated the content of the unit, its delivery both physically and conceptually, and defined the audience of the unit. The study failed to discover any type of latent theoretical foundation that might be used as a base for understanding IMC. The students who are being prepared to extend, expand and enhance IMC concepts do not appear to be well-served by the curriculum we found in our research. The study concludes with a model for further IMC curriculum development.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines whether two key partners in the marketing communication process, advertising and public relations’ practitioners perceive IMC in the same way. It compares perceptions across a wide range of implementation, organizational and strategic issues in IMC to test if perceptions have moved past Stage 1 of IMC development (Schultz and Kitchen 2000). Although both advertising and PR practitioners concur with each other and the literature on a wide range of perceptions of IMC, they still believe that advertising and public relations practitioners have dissimilar views about IMC. PR practitioners position themselves as a separate breed of marketing communicator, requiring divergent skills from advertising practitioners and thinking differently about IMC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2003, the “ICT Curriculum Integration Performance Measurement Instrument” was developed froman extensive review ofthe contemporary international and Australian research pertaining to the definition and measurement of ICT curriculum integration in classrooms (Proctor, Watson, & Finger, 2003). The 45-item instrument that resulted was based on theories and methodologies identified by the literature review. This paper describes psychometric results from a large-scale evaluation of the instrument subsequently conducted, as recommended by Proctor, Watson, and Finger (2003). The resultant 20-item, two-factor instrument, now called “Learning with ICTs: Measuring ICT Use in the Curriculum,” is both statistically and theoretically robust. This paper should be read in association with the original paper published in Computers in the Schools(Proctor, Watson, & Finger, 2003) that described in detail the theoretical framework underpinning the development of the instrument.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to extend marketing knowledge into perceived risk in online transactions beyond the current positivistic, hypotheses-driven research by providing qualitative insights into how individuals construct their accounts of perceived risk online. Additionally, the study reported in this paper aims to explore how communication sources influence both these subjective constructions and individuals' behavioural experiences with transaction activity on the web. Design/methodology/approach - The study was developed within a grounded theory method.Ten in-depth interviews were conducted which were analysed using constant comparison of incidents procedures to provide rich descriptions of the interviewees' subjective perceptions and lived experiences with online transaction activity. Findings - The findings provide insights into how the human clement is present in individuals'perceptions and constructions of their accounts of the risk involved online.The findings also identify the influence of mass communication sources on the construction of these accounts. The study provides insights into whether change agent communication sources, such as marketers or web designers,influence consumers' behaviours towards online transaction activity through mediating their perceptions of the risks involved. The study also reveals how social communication networks influence the interviewees' decisions to use the web (or transaction activities, in particular online purchasing, and how the group in this study might act as a communication source to influence others. Research limitations/Implications - While the findings cannot be generalised to the internet population overall, the sample used was able to provide relevant information regarding the phenomenon of interest. Future research should continue to examine perceived risk and the influence of communications sources, such as e-mail, discussion groups and virtual communities. Originality/value - The value of the paper lies in permitting the participants to account for perceived risk for themselves. The findings ex.plore what this means at increasing levels of personal relevance and the influence of communication sources to create, sustain or mediate perceptions of this phenomenon.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the increased offering of online communication channels to support web-based retail systems, there is limited marketing research that investigates how these channels act singly, or in combination with online channels, to influence an individual' s intention to purchase online. If the marketer's strategy is to encourage online transactions, this requires a focus on consumer acceptance of the web-based transaction technology, rather than the purchase of the products per se. The exploratory study reported in this paper examines normative influences from referent groups in an individual's on and offline social communication networks that might affect their intention to use online transaction facilities. The findings suggest that for non-adopters, there is no normative influence from referents in either network. For adopters, one online and one offline referent norm positively influenced this group's intentions to use online transaction facilities. The implications of these findings are discussed together with future research directions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Communication plays an important role in the development of trust within an organization. While a number of researchers have studied the relationship of trust and communication, little is known about the specific linkages among quality of information, quantity of information, openness, trust, and outcomes such as employee involvement. This study tests these relationships using communication audit data from 218 employees in the oil industry. Using mediation analysis and structural equation modeling, we found that quality of information predicted trust of one's coworkers and supervisors while adequacy of information predicted one's trust of top management. Trust of coworkers, supervisors, and top management influenced perceptions of organizational openness, which in turn influenced employees' ratings of their own level of involvement in the organization's goals. This study suggests that the relationship between communication and trust is complex, and that simple strategies focusing on either quality or quantity of information may be ineffective for dealing with all members in an organization.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Marketers and commercial media alike are confronted by shifts in the social relations of media production and consumption in the global services economy, including the challenge of capturing, managing and commercialising media-user productivity. This trajectory of change in media cultures and economies is described here as ‘mass conversation’. Two media texts and a new media object provide a starting point for charting the ascendance and social impact of mass conversation. Apple’s 1984 television commercial, which launched the Macintosh computer, inverted George Orwell’s dystopian vision of the social consequences of panoptic communications systems. It invoked a revolutionary rhetoric to anticipate the social consequences of a new type of interactivity since theorised as ‘intercreativity’. This television commercial is contrasted with another used in Nike’s 2006 launch of its Nike+ (Apple iPod) system. The Nike+ online brand community is also used to consider how a multiplatform brand channel is seeking to manage the changing norms and practices of consumption and end-user agency. This analysis shows that intercreativity modifies the operations of ‘Big Brother’ but serves the more mundane than revolutionary purpose of generating commercial value from the affective labour of end-users.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter reports on Australian and Swedish experiences in the iterative design, development, and ongoing use of interactive educational systems we call ‘Media Maps.’ Like maps in general, Media Maps are usefully understood as complex cultural technologies; that is, they are not only physical objects, tools and artefacts, but also information creation and distribution technologies, the use and development of which are embedded in systems of knowledge and social meaning. Drawing upon Australian and Swedish experiences with one Media Map technology, this paper illustrates this three-layered approach to the development of media mapping. It shows how media mapping is being used to create authentic learning experiences for students preparing for work in the rapidly evolving media and communication industries. We also contextualise media mapping as a response to various challenges for curriculum and learning design in Media and Communication Studies that arise from shifts in tertiary education policy in a global knowledge economy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Innovation processes are rarely smooth and disruptions often occur at transition points were one knowledge domain passes the technology on to another domain. At these transition points communication is a key component in assisting the smooth hand over of technologies. However for smooth transitions to occur we argue that appropriate structures have to be in place and boundary spanning activities need to be facilitated. This paper presents three case studies of innovation processes and the findings support the view that structures and boundary spanning are essential for smooth transitions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a secure communication protocol which can be used as the framework for an e-tendering scheme. This protocol is focused on securing the integrity of tendering documents and ensuring that a secure record of document generation is kept. Our protocol provides a mechanism to manage e-tendering contract evidence as a legal record in a unique and effective manner. It is the starting point of reliable record keeping. To a certain extent, it also addresses existing security problems in the traditional tendering processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The innovation diffusion and knowledge management literature strongly supports the importance of communities of practice (COP) for enabling knowledge about how to use and adopt innovation initiatives. One of the most powerful tools for innovation diffusion is word-of-mouth wisdom from committed individuals who mentor and support each other. Close proximity for face-to-face interaction is highly effective, however, many organisations are geographically dispersed with projects being virtual linked sub-organisations using ICT to communicate. ICT has also introduced a useful facilitating technology for developing knowledge networks. This paper presents findings from a research program concentrating on ICT innovation diffusion in the Australian construction industry. One way in which ICT diffusion is taking place was found to be through within-company communities of practice. We undertook in-depth unstructured interviews with three of the major 10 to 15 contractors in Australia to discuss their ICT diffusion strategies. We discovered that in all three cases,within company networked communities of practice was a central strategy. Further, effective diffusion of ICT groupware tools can be critical in developing COP where they are geographically dispersed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Discrete event-driven simulations of digital communication networks have been used widely. However, it is difficult to use a network simulator to simulate a hybrid system in which some objects are not discrete event-driven but are continuous time-driven. A networked control system (NCS) is such an application, in which physical process dynamics are continuous by nature. We have designed and implemented a hybrid simulation environment which effectively integrates models of continuous-time plant processes and discrete-event communication networks by extending the open source network simulator NS-2. To do this a synchronisation mechanism was developed to connect a continuous plant simulation with a discrete network simulation. Furthermore, for evaluating co-design approaches in an NCS environment, a piggybacking method was adopted to allow the control period to be adjusted during simulations. The effectiveness of the technique is demonstrated through case studies which simulate a networked control scenario in which the communication and control system properties are defined explicitly.