752 resultados para internet-based intervention


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Early identification of beginning readers at risk of developing reading and writing difficulties plays an important role in the prevention and provision of appropriate intervention. In Tanzania, as in other countries, there are children in schools who are at risk of developing reading and writing difficulties. Many of these children complete school without being identified and without proper and relevant support. The main language in Tanzania is Kiswahili, a transparent language. Contextually relevant, reliable and valid instruments of identification are needed in Tanzanian schools. This study aimed at the construction and validation of a group-based screening instrument in the Kiswahili language for identifying beginning readers at risk of reading and writing difficulties. In studying the function of the test there was special interest in analyzing the explanatory power of certain contextual factors related to the home and school. Halfway through grade one, 337 children from four purposively selected primary schools in Morogoro municipality were screened with a group test consisting of 7 subscales measuring phonological awareness, word and letter knowledge and spelling. A questionnaire about background factors and the home and school environments related to literacy was also used. The schools were chosen based on performance status (i.e. high, good, average and low performing schools) in order to include variation. For validation, 64 children were chosen from the original sample to take an individual test measuring nonsense word reading, word reading, actual text reading, one-minute reading and writing. School marks from grade one and a follow-up test half way through grade two were also used for validation. The correlations between the results from the group test and the three measures used for validation were very high (.83-.95). Content validity of the group test was established by using items drawn from authorized text books for reading in grade one. Construct validity was analyzed through item analysis and principal component analysis. The difficulty level of most items in both the group test and the follow-up test was good. The items also discriminated well. Principal component analysis revealed one powerful latent dimension (initial literacy factor), accounting for 93% of the variance. This implies that it could be possible to use any set of the subtests of the group test for screening and prediction. The K-Means cluster analysis revealed four clusters: at-risk children, strugglers, readers and good readers. The main concern in this study was with the groups of at-risk children (24%) and strugglers (22%), who need the most assistance. The predictive validity of the group test was analyzed by correlating the measures from the two school years and by cross tabulating grade one and grade two clusters. All the correlations were positive and very high, and 94% of the at-risk children in grade two were already identified in the group test in grade one. The explanatory power of some of the home and school factors was very strong. The number of books at home accounted for 38% of the variance in reading and writing ability measured by the group test. Parents´ reading ability and the support children received at home for schoolwork were also influential factors. Among the studied school factors school attendance had the strongest explanatory power, accounting for 21% of the variance in reading and writing ability. Having been in nursery school was also of importance. Based on the findings in the study a short version of the group test was created. It is suggested for use in the screening processes in grade one aiming at identifying children at risk of reading and writing difficulties in the Tanzanian context. Suggestions for further research as well as for actions for improving the literacy skills of Tanzanian children are presented.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The aim of the study was to create and evaluate an intervention programme for Tanzanian children from a low-income area who are at risk of reading and writing difficulties. The learning difficulties, including reading and writing difficulties, are likely to be behind many of the common school problems in Tanzania, but they are not well understood, and research is needed. The design of the study included an identification and intervention phase with follow-up. A group based dynamic assessment approach was used in identifying children at risk of difficulties in reading and writing. The same approach was used in the intervention. The study was a randomized experiment with one experimental and two control groups. For the experimental and the control groups, a total of 96 (46 girls and 50 boys) children from grade one were screened out of 301 children from two schools in a low income urban area of Dar-es-Salaam. One third of the children, the experimental group, participated in an intensive training programme in literacy skills for five weeks, six hours per week, aimed at promoting reading and writing ability, while the children in the control groups had a mathematics and art programme. Follow-up was performed five months after the intervention. The intervention programme and the tests were based on the Zambian BASAT (Basic Skill Assessment Tool, Ketonen & Mulenga, 2003), but the content was drawn from the Kiswahili school curriculum in Tanzania. The main components of the training and testing programme were the same, only differing in content. The training process was different from traditional training in Tanzanian schools in that principles of teaching and training in dynamic assessment were followed. Feedback was the cornerstone of the training and the focus was on supporting the children in exploring knowledge and strategies in performing the tasks. The experimental group improved significantly more (p = .000) than the control groups during the intervention from pre-test to follow-up (repeated measures ANOVA). No differences between the control groups were noticed. The effect was significant on all the measures: phonological awareness, reading skills, writing skills and overall literacy skills. A transfer effect on school marks in Kiswahili and English was found. Following a discussion of the results, suggestions for further research and adaptation of the programme are presented.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aim and design: To evaluate an oral health program directed to expecting families and their children. The intervention was carried out in one of the four health care areas of the city of Turku. Another area acted as a control. Subjects and methods: Children (n = 1217), born between January 1, 1998 and June 30, 1999, in the respective health care areas were screened for mutans streptococci bacteria (MS), and their caretakers were interviewed when the child was 18 months old. MScolonization was used as the child’s risk indicator. Intensified health education and the use of xylitol lozenges targeted at the children at risk were the main elements of the program. Controls and the non-MS-colonized children received routine prevention –examination and education at the ages of three and five years. Altogether 794 subjects were followed for 42 months after receiving consent from their caretakers. Associations of oral-health-related factors with MS colonization and caries increment were studied inside the control group. Results: MS colonization associated with the occupation of the caretaker and ethnicity. The program was effective in white-collar families; prevented fraction being 67 %. In blue-collar families no effect was achieved. At the age of five years, caries increment was strongly related to the occupation of the caretaker, MS at 18 months, child’s sugar use, night feeding, use of thirst quencher at the age of 18 months, and father’s reported oral health. Conclusions: Programs targeted at MS-colonized children can reduce caries in whitecollar families. A program mainly based on activity at home seems to favor white-collar families, whereas different kind of support is needed for the blue-collar families.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The overall goal of the study was to describe adoption of information technology (IT)-based patient education (PE) developed for patients and nurses use in psychiatric nursing. The data were collected in three phases during the period 2000-2006 in a variety of psychiatric settings in Finland. Firstly, the development process of IT-based PE for patients with schizophrenia spectrum psychosis was described. Secondly, nurses’ adoption of IT-based PE and the variables explaining adoption were demonstrated. Moreover, use of daily IT-based PE in clinical practice and factors associated with use were identified and described. And thirdly, nurses’ experiences of the IT-based PE after one year clinical use were evaluated. IT-based PE program was developed in several stages based on users’ needs and it included information and multimedia applications. Altogether, almost 500 IT-based PE sessions were carried out by the nurses on the study wards and revealed nurses’ activity in educating patients using IT to vary and depend on the hospital in which they worked. Almost 80% of all the possible IT-based PE sessions involved 93 patients and 83 nurses. Less than 2% of the IT-based PE sessions were interrupted and less than 10% suffered disturbances due to the patients or external causes. Moreover, the patients whose education took more days had poorer mental status than those whose education was carried out over a shorter period. After a year’s experience, advantages and disadvantages were described by the nurses for both patients and nurses of the IT-based PE. IT-based PE can be used even on closed acute psychiatric wards with patients with serious mental health disorders. However, technology adoption requires time, and therefore, it must fit in with clinical practice. Collaboration between users and developers is needed when developing user-centered methods in the area of mental health services. Moreover, it is important to understand factors that affect IT adoption in healthcare settings. IT-based PE is one option in interactive and co-operative health care practice between patients and nurses. Therefore the staff should begin to refer patients to established, credible and well-maintained Internet sites that provide information on common psychological problems. Even if every nurse should be trained and engaged to carry out IT-based PE, by targeting the training especially for the most active nurses aids them to support the less active ones. Adoption should also be understood from a perspective that includes aspects related to the context where it is implemented and examine how and in what circumstances it works.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The central theme of this thesis is the emancipation and further development of learning activity in higher education in the context of the ongoing digital transformation of our societies. It was developed in response to the highly problematic mainstream approach to digital re-instrumentation of teaching and studying practises in contemporary higher education. The mainstream approach is largely based on centralisation, standardisation, commoditisation, and commercialisation, while re-producing the general patterns of control, responsibility, and dependence that are characteristic for activity systems of schooling. Whereas much of educational research and development focuses on the optimisation and fine-tuning of schooling, the overall inquiry that is underlying this thesis has been carried out from an explicitly critical position and within a framework of action science. It thus conceptualises learning activity in higher education not only as an object of inquiry but also as an object to engage with and to intervene into from a perspective of intentional change. The knowledge-constituting interest of this type of inquiry can be tentatively described as a combination of heuristic-instrumental (guidelines for contextualised action and intervention), practical-phronetic (deliberation of value-rational aspects of means and ends), and developmental-emancipatory (deliberation of issues of power, self-determination, and growth) aspects. Its goal is the production of orientation knowledge for educational practise. The thesis provides an analysis, argumentation, and normative claim on why the development of learning activity should be turned into an object of individual|collective inquiry and intentional change in higher education, and why the current state of affairs in higher education actually impedes such a development. It argues for a decisive shift of attention to the intentional emancipation and further development of learning activity as an important cultural instrument for human (self-)production within the digital transformation. The thesis also attempts an in-depth exploration of what type of methodological rationale can actually be applied to an object of inquiry (developing learning activity) that is at the same time conceptualised as an object of intentional change within the ongoing digital transformation. The result of this retrospective reflection is the formulation of “optimally incomplete” guidelines for educational R&D practise that shares the practicalphronetic (value related) and developmental-emancipatory (power related) orientations that had been driving the overall inquiry. In addition, the thesis formulates the instrumental-heuristic knowledge claim that the conceptual instruments that were adapted and validated in the context of a series of intervention studies provide means to effectively intervene into existing practise in higher education to support the necessary development of (increasingly emancipated) networked learning activity. It suggests that digital networked instruments (tools and services) generally should be considered and treated as transient elements within critical systemic intervention research in higher education. It further argues for the predominant use of loosely-coupled, digital networked instruments that allow for individual|collective ownership, control, (co-)production, and re-use in other contexts and for other purposes. Since the range of digital instrumentation options is continuously expanding and currently shows no signs of an imminent slow-down or consolidation, individual and collective exploration and experimentation of this realm needs to be systematically incorporated into higher education practise.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Bullying is characterized by an inequality of power between perpetrator and target. Findings that bullies can be highly popular have helped redefine the old conception of the maladjusted school bully into a powerful individual exerting influence on his peers from the top of the peer status hierarchy. Study I is a conceptual paper that explores the conditions under which a skillful, socially powerful bully can use the peer group as a means of aggression and suggests that low cohesion and low quality of friendships make groups easier to manipulate. School bullies’ high popularity should be a major obstacle for antibullying efforts, as bullies are unlikely to cease negative actions that are rewarding, and their powerful position could discourage bystanders from interfering. Using data from the Finnish program KiVa, Study II supported the hypothesis that antibullying interventions are less effective with popular bullies in comparison to their unpopular counterparts. In order to design interventions that can address the positive link between popularity and aggression, it is necessary to determine in which contexts bullies achieve higher status. Using an American sample, Study III examined the effects of five classroom features on the social status that peers accord to aggressive children, including classroom status hierarchy, academic level and grade level, controlling for classroom mean levels of aggression and ethnic distribution. Aggressive children were more popular and better liked in fifth grade relative to fourth grade and in classrooms of higher status hierarchy. Surprisingly, the natural emergence of status hierarchies in children’s peer groups has long been assumed to minimize aggression. Whether status hierarchies hinder or promote bullying is a controversial question in the peer relations’ literature. Study IV aimed at clarifying this debate by testing the effects of the degree of classroom status hierarchy on bullying. Higher hierarchy was concrrently associated with bullying and predictive of higher bullying six months later. As bullies’ quest for power is increasingly acknowledged, some researchers suggest teaching bullies to attain the elevated status they yearn for through prosocial acts. Study V cautions against such solutions by reviewing evidence that prosocial behaviors enacted with the intention of controlling others can be as harmful as aggression.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Since the 1990’s, the Internet has played a central role in our daily lives. The Internet is an integral part of our personal, business, family, research, entertainment, academic and social life. However, there are social implications in using the Internet that are dependent on categories such as gender, age, ethnicity and cultural attributes. This social aspect can play a detrimental role in the expression of human anxiety on the Internet. An anxiety is a complex phenomenon that requires further elaboration. Thus, the aim of this thesis is to investigate human anxiety, or specifically, whether Internet anxiety can be conceptualized and measured. This thesis utilizes literature, qualitative and quantitative research methodologies, and a triangulation validation approach to conceptualize and measure the Internet anxiety phenomenon. In particular, the aim is to explore anxiety levels of Internet participants to develop and validate an Internet anxiety scale based on earlier research on Internet anxiety. The results of the dissertation present a two phase study. In Phase I, a smaller set of studies were conducted with a limited sample size. In Phase II, the research topic was investigated using 385 participants. Based on a number of studies or experiments, the state-of-the-art discovered in this thesis is creation, design, and validation of two scales, the Self-Assessment Scale (SAS) and a Modified Internet Anxiety Scale (MIAS) for measuring users’ anxieties on the Internet. The result of this dissertation is a conceptualization and measurement of various types of Internet anxiety and measurement of affective feelings of users on the Internet. As a proof-of-concept of measuring Internet anxiety, this thesis describes the author’s implementation of three sets of tools: MyAnxiety, introducing Internet anxieties types; Intelligentia, for collecting Internet anxieties types; and MyIAControl tool, implemented as a browser plug-in, for measuring affective feelings of users on the Internet. Conclusions drawn from the results show that these empirically validated scales and tools might be useful for researchers and practitioners in understanding and measuring the Internet anxiety phenomenon further.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Antithrombotic treatment of patients with atrial fibrillation (AF) undergoing percutaneous coronary intervention (PCI) is a delicate balancing between the risk of thromboembolism and the risk of bleeding. The purpose of this dissertation was to analyze current antithrombotic treatment strategies at the periprocedural stage and report outcomes in-hospital and at 1-month follow-up, and to evaluate the effect of renal impairment and predictive values of various bleeding scores on 1-year outcome after PCI in patients with AF. The first article was based on retrospective data from 7 Finnish hospitals between 2002–2006 (n=377), while the others were based on a prospective 17-center European register (AFCAS) gathered between 2008–2010 (n=963). The main findings in patients with AF undergoing PCI were: The use of glycoprotein IIb/IIIa inhibitors during PCI was associated with a four- to five-fold increase in the risk of major bleeding (I). Uninterrupted warfarin treatment did not increase perioperative complications and seemed to decrease bleeding complications compared to heparin bridging (II). Already mild renal impairment (eGFR 60–90mL/min) was associated with a 2.3-fold risk of all-cause mortality during the 12 months following PCI (III). Major adverse cardiac events occurred in 4.5% and bleeding complications in 7.1% of patients in the AFCAS register by 1-month follow-up (IV). In a study of patients in AFCAS register, all currently used bleeding risk scores were poor predictors of bleeding complications by 1-year follow-up (V). The findings will help improve treatment strategies for this fragile patient population with a high risk of bleeding and thrombotic complications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The aim of this three phase study was to develop quality of radiotherapy care by the e-Feedback knowledge of radiotherapy -intervention (e-Re-Know). In Phase I, the purpose was to describe the quality of radiotherapy care and its deficits experienced by cancer patients. Based on the deficits in patient education in Phase II, the purpose was to describe cancer patients’ e-knowledge expectations in radiotherapy. In Phase III, the purpose was to develop and evaluate the outcomes of the e-Re-Know among breast cancer patients. The ultimate aim was to develop radiotherapy care to support patients’ empowerment with patient e-education. In Phase I (2004-2005), the descriptive design was used, and 134 radiotherapy patients evaluated their experiences by Good Nursing Care Scale for Patients (GNCS-P) in the middle of RT period. In Phase II (2006-2008), the descriptive longitudinal design was used and 100 radiotherapy patients’ e-knowledge expectations of RT were evaluated using open-ended questionnaire developed for this study before commencing first RT, in the middle of the treatment, and concluding RT period. In Phase III, firstly (2009-2010), the e-Re-Know intervention, i.e. knowledge test and feedback, was developed in terms of empowering knowledge and implemented with e-feedback approach based on literature and expert reviews. Secondly (2011-2014), the randomized controlled study was used to evaluate the e-Re-Know. Breast cancer patients randomized to either the intervention group (n=65) receiving the e-Re-Know by e-mail before commencing first RT and standard education or the control group (n=63) receiving standard education. The data were collected before commencing first RT, concluding last RT and 3 months after last RT using RT Knowledge Test, Spielberger’s State Trait Inventory (STAI) and Functional Assessment of Cancer Therapy - Breast (FACT-B) –instruments. Data were analyzed using statistical methods and content analysis. The study showed radiotherapy patients experienced quality of care high. However, there were deficits in patient education. Furthermore, radiotherapy patients’ multidimensional e-knowledge expectations through Internet covered mainly bio-physiological and functional knowledge. Thus, the e-Re-Know was developed and evaluated. The study showed when breast cancer patients’ carried out the e-Re-Know their knowledge of side effects self-care was significantly increased and quality of life (QOL) significantly improved in line with decrease in anxiety from time before radiotherapy period to three months after. In addition, the e-Re-Know has potential to have positive effects on anxiety and QOL, regardless of patient characteristics or knowledge level. The results support the theory of empowering patient education suggesting that empowerment can be supported by confirming patients’ understanding of own knowledge level. In summary, the e-Feedback knowledge of radiotherapy (e-Re-Know) intervention can be recommended in development of quality of radiotherapy care experienced by breast cancer patients. Further research is needed to assess and develop patient-centred quality of care by patient education among cancer patients.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

With the new age of Internet of Things (IoT), object of everyday such as mobile smart devices start to be equipped with cheap sensors and low energy wireless communication capability. Nowadays mobile smart devices (phones, tablets) have become an ubiquitous device with everyone having access to at least one device. There is an opportunity to build innovative applications and services by exploiting these devices’ untapped rechargeable energy, sensing and processing capabilities. In this thesis, we propose, develop, implement and evaluate LoadIoT a peer-to-peer load balancing scheme that can distribute tasks among plethora of mobile smart devices in the IoT world. We develop and demonstrate an android-based proof of concept load-balancing application. We also present a model of the system which is used to validate the efficiency of the load balancing approach under varying application scenarios. Load balancing concepts can be apply to IoT scenario linked to smart devices. It is able to reduce the traffic send to the Cloud and the energy consumption of the devices. The data acquired from the experimental outcomes enable us to determine the feasibility and cost-effectiveness of a load balanced P2P smart phone-based applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent advances in Information and Communication Technology (ICT), especially those related to the Internet of Things (IoT), are facilitating smart regions. Among many services that a smart region can offer, remote health monitoring is a typical application of IoT paradigm. It offers the ability to continuously monitor and collect health-related data from a person, and transmit the data to a remote entity (for example, a healthcare service provider) for further processing and knowledge extraction. An IoT-based remote health monitoring system can be beneficial in rural areas belonging to the smart region where people have limited access to regular healthcare services. The same system can be beneficial in urban areas where hospitals can be overcrowded and where it may take substantial time to avail healthcare. However, this system may generate a large amount of data. In order to realize an efficient IoT-based remote health monitoring system, it is imperative to study the network communication needs of such a system; in particular the bandwidth requirements and the volume of generated data. The thesis studies a commercial product for remote health monitoring in Skellefteå, Sweden. Based on the results obtained via the commercial product, the thesis identified the key network-related requirements of a typical remote health monitoring system in terms of real-time event update, bandwidth requirements and data generation. Furthermore, the thesis has proposed an architecture called IReHMo - an IoT-based remote health monitoring architecture. This architecture allows users to incorporate several types of IoT devices to extend the sensing capabilities of the system. Using IReHMo, several IoT communication protocols such as HTTP, MQTT and CoAP has been evaluated and compared against each other. Results showed that CoAP is the most efficient protocol to transmit small size healthcare data to the remote servers. The combination of IReHMo and CoAP significantly reduced the required bandwidth as well as the volume of generated data (up to 56 percent) compared to the commercial product. Finally, the thesis conducted a scalability analysis, to determine the feasibility of deploying the combination of IReHMo and CoAP in large numbers in regions in north Sweden.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this thesis, a unique subgroup involved in the bullying phenomenon, the bully-victims, are identified and examined. Despite the increasing attention on the bully-victims in recent years, their prevalence, psychosocial adjustment, and response to anti-bullying programs has not been clearly determined. Three empirical studies were conducted in this thesis to examine the prevalence of bully-victims. Moreover, in study I, the psychosocial adjustment of bully-victims was compared with that of pure bullies, pure victims, and non-involved students. In study II, different forms of bullying and victimization were compared among pure bullies, pure victims, bully-victims, and non-involved students. In study III, the effectiveness of anti-bullying programs, in particular, the KiVa program, on bully-victims was demonstrated. Overall, bully-victims formed the smallest group comparing with pure bullies, pure victims, and non-involved students, and in general differed from pure bullies rather than pure victims in terms of subjective experience of maladjustment. They employed more verbal, physical, and cyberbullying perpetration, but not indirect bullying; and they were more victimized by verbal, physical, cyber, and indirect bullying. The KiVa anti-bullying program in Finland is effective in reducing the prevalence of bully-victims.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Imagine the potential implications of an organization whose business and IT processes are well aligned and are capable of reactively and proactively responding to the external and internal changes. The Philips IT Infrastructure and Operations department (I&O) is undergoing a series of transformation activities to help Philips business keeping up with the changes. I&O would serve a critical function in any business sectors; given that the I&O’s strategy switched from “design, build and run” to “specify, acquire and performance manage”, that function is amplified. In 2013, I&O’s biggest transforming programme I&O Futures engaged multiple interdisciplinary departments and programs on decommissioning legacy processes and restructuring new processes with respect to the Information Technology Internet Library (ITIL), helping I&O to achieve a common infrastructure and operating platform (CI&OP). The author joined I&O Futures in the early 2014 and contributed to the CI&OP release 1, during which a designed model Bing Box and its evaluations were conducted through the lens of six sigma’s structured define-measure-analyze-improve-control (DMAIC) improvement approach. This Bing Box model was intended to firstly combine business and IT principles, namely Lean IT, Agile, ITIL best practices, and Aspect-oriented programming (AOP) into a framework. Secondly, the author implemented the modularized optimization cycles according to the defined framework into Philips’ ITIL-based processes and, subsequently, to enhance business process performance as well as to increase efficiency of the optimization cycles. The unique of this thesis is that the Bing Box model not only provided comprehensive optimization approaches and principles for business process performance, but also integrated and standardized optimization modules for the optimization process itself. The research followed a design research guideline that seek to extend the boundaries of human and organizational capabilities by creating new and innovative artifacts. The Chapter 2 firstly reviewed the current research on Lean Six Sigma, Agile, AOP and ITIL, aiming at identifying the broad conceptual bases for this study. In Chapter 3, we included the process of constructing the Bing Box model. The Chapter 4 described the adoption of Bing Box model: two-implementation case validated by stakeholders through observations and interviews. Chapter 5 contained the concluding remarks, the limitation of this research work and the future research areas. Chapter 6 provided the references used in this thesis.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

IoT consists of essentially thousands of tiny sensor nodes interconnected to the internet, each one of which executes the programmed functions under memory and power limita- tions. The sensor nodes are distributed mainly for gathering data in various situations. IoT envisions the future technologies such as e-health, smart city, auto-mobiles automa- tion, construction sites automation, and smart home. Secure communication of data under memory and energy constraints is major challenge in IoT. Authentication is the first and important phase of secure communication. This study presents a protocol to authenticate resource constraint devices in physical proximity by solely using the shared wireless communication interfaces. This model of authentication only relies on the abundance of ambient radio signals to authenticate in less than a second. To evaluate the designed protocol, SkyMotes are emulated in a network environment simulated by Contiki/COOJA. Results presented during this study proves that this approach is immune against passive and active attacks. An adversary located as near as two meters can be identified in less than a second with minimal expense of energy. Since, only radio device is used as required hardware for the authentication, this technique is scalable and interoperable to heterogeneous nature of IoT.