748 resultados para Do-it-yourself work.
Resumo:
Objective: Partnerships in mental health care, particularly between public and private psychiatric services, are being increasingly recognized as important for optimizing patient management and the efficient organization of services. However, public sector mental health services and private psychiatrists do not always work well together and there seem to be a number of barriers to effective collaboration. This study set out to investigate the extent of collaborative 'shared care' arrangements between a public mental health service and private psychiatrists practising nearby. It also examined possible barriers to collaboration and some possible solutions to the identified problems. Method: A questionnaire examining the above factors was sent to all public sector mental health clinicians and all private psychiatrists in the area. Results: One hundred and five of the 154 (68.2%) public sector clinicians and 103 of the 194 (53.1%) private psychiatrists returned surveys. The main barriers to successful collaboration identified by members of both sectors were: 'Difficulty communicating' endorsed by 71.4% of public clinicians and 72% of private psychiatrists, 'Confusion of roles and responsibilities' endorsed by 62.9% and 66%, respectively, and 'Different treatment approach' by 47.6% and 45.6%, respectively. Over 60% of private psychiatrists identified problems with access to the public system as a barrier to successful shared care arrangements. It also emerged, as hypothesized, that the public and private systems tend to manage different patient populations and that public clinicians in particular are not fully aware of the private psychiatrists' range of expertise. This would result in fewer referrals for shared care across the sectors. Conclusions: A number of barriers to public sector clinicians and private psychiatrists collaborating in shared care arrangements were identified. The two groups surveyed identified similar barriers. Some of these can potentially be addressed by changes to service systems. Others require cultural shifts in both sectors. Improved communications including more opportunities for formal and informal meetings between people working in the two sectors would be likely to improve the understanding of the complementary sector's perspective and practice. Further changes would be expected to require careful work between the sectors on training, employment and practice protocols and initiatives, to allow better use of the existing services and resources.
Resumo:
The HMR model contains a mechanism whereby anyone who is concerned about the risk of medication misadventure can request a HMR from the patient's GP. Since nurses are widely involved in a range of triage and gatekeeping roles, utilising their primary care skills to identify patients for a HMR is a logical extension of this role. Furthermore, community nurses visit their clients in the home situation and see many difficulties the client may be experiencing at first hand. They are therefore well placed to request specialist assistance for the client. Blue Care in Brisbane, a community nursing service, approached its local Division of General practice to determine how best to request HMRs for its clients. The Division contacted The University of Queensland which initiated this study to engage the health care team to tailor the established HMR request process to the needs of community nurses and test the system developed. (non-author abstract)
Resumo:
The present study adopted an intergroup approach to information sharing and ratings of work team communication in a public hospital (N = 142) undergoing large-scale restructuring. Consistent with predictions, ratings of communication followed a double ingroup serving bias: while team members reported sending about the same levels of information to double ingroup members (same work team/same occupational group) as they did to partial ingroup members (same work team/different occupational group), they reported receiving less information from partial ingroup members than from double ingroup members and rated the communication that they received from partial ingroup members as less effective. We discuss the implication of these results for the management of information sharing and organizational communication.
Resumo:
In this article, we explore the challenges - and benefits - of conducting collaborative research on an international scale. The authors - from Australia, Canada, and New Zealand - draw upon their experiences in designing and conducting a three-country study. The growing pressures on scholars to work in collaborative research teams are described, and key findings and reflections are presented. It is claimed that such work is a highly complex and demanding extension to the academic's role. The authors conclude that, despite the somewhat negative sense that this reflection may convey, the synergies gained and the valuable comparative learning that took place make overcoming these challenges a worthwhile process. The experiences as outlined in this paper suggest that developing understandings of the challenges inherent in undertaking international collaborative research might well be a required component of the professional development opportunities afforded to new scholars.
Resumo:
Most modern models of personality are hierarchical, perhaps as a result of their development by means of exploratory factor analysis. Based on new ideas about the structure of personality and how it divides into biologically based and sociocognitively based components (as proposed by Carver, Cloninger, EUiot and Thrash, and ReveUe), I develop a series of rules that show how scales of personality may be linked from those that are most distal to those which are most proximal. I use SEM to confirm the proposed structure in scales of the Temperament Character Inventory (TCI) and the Eysenck Personality Profiler. Good fit is achieved and all proposed paths are significant. The model is then used to predict work performance, deviance and job satisfacdon.
Resumo:
Electronic information tools have become increasingly popular with channel manufacturers in their efforts to manage resellers. Although these tools have been found to increase the efficiency of communications, researchers and practitioners alike have questioned their effectiveness. To investigate how top-down electronic information affects social channel relationships we consider the use of such tools in information technology distribution channels. Using electronic communications theory and channel governance theory we hypothesize that the usefulness of the tools is a function of the type of information inherent in each tool (demand creation information or supply fulfillment information) and the particular communications characteristics of this information.
Resumo:
Presentation
Resumo:
In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.