1000 resultados para interview protocols


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Investigative interviews with alleged victims form the central plank of evidence in the prosecution of child sexual abuse. Despite interviewers being provided with a guiding framework, child sexual abuse cases are often not prosecuted because of poor-quality evidence. The purpose of this study was to elicit feedback from prosecutors about the structure and format of current interview protocols and the ways in which these could potentially be improved from an evidential perspective. Focus group discussions (ranging in length from 180 to 190 minutes) were conducted with 13 Crown prosecutors representing every jurisdiction of Australia. Thematic analysis of the focus group discussions revealed that prosecutors were supportive of the structure of interview protocols, however, concerns were raised about four of the interview elements. These elements were the oath and truth–lie competency test, the ground rules, the practice narrative and eliciting a disclosure. The prosecutors’ concerns and their implications for protocol developers and trainers are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: Despite the heterogeneity of Australian Aboriginal peoples, certain styles of relating are shared and are markedly different to the communication styles of non-Aboriginal peoples. These differences may affect the suitability of current investigative interview protocols to Australian Aboriginal children. This study aimed to qualitatively evaluate the applicability of an investigative interview protocol to Australian Aboriginal children and examine how it could be modified to better suit the communication styles in many Aboriginal communities. Method: A diverse group of 28 participants who had expertise in Aboriginal language and culture, as well as an understanding of the child investigative interview process, each partook in an in-depth semi-structured interview where they were prompted to reflect on Aboriginal language and culture with reference to a current interview protocol (in the context of sexual assault investigation). Results: Thematic analysis revealed overall support for the narrative-based structure of the interview protocol when eliciting information from Aboriginal children. A number of concerns were also identified, and these largely related to the syntax and vocabulary within the protocol, as well as the methods of questioning and building rapport with the child. Conclusions: Directions for future research and potential modifications to investigative interview protocols to better suit Aboriginal children are discussed.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Tese de doutoramento, Educação (Teoria e Desenvolvimento Curricular), Universidade de Lisboa, Instituto de Educação, 2015

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-06

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This study examined the investigative interviewing of Australian Aboriginal children in cases of alleged sexual abuse, with a focus on three commonly included components of interview protocols: ground rules, practice narrative, and substantive phase. Analysis of 70 field transcripts revealed that the overall delivery and practice of ground rules at the beginning of the interview was positively associated with the spontaneous usage of rules in children's narratives of abuse. When specifically examining the "don't know" rule, however, only practice had an effect of children's usage of the rule (as opposed to simple delivery or no delivery at all). Children spoke more words overall, and interviewers used more open-ended prompts during the substantive phase when the interviews contained a practice narrative. Children most often disclosed sexual abuse in response to an open-ended prompt; however, they produced the most words in response to suggestive prompts. This article concludes with a discussion of the effectiveness of ground rules, practice narratives, and questioning with Aboriginal children.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This thesis focused on improving investigative interview protocols with Australian Aboriginal children (predominantly in cases of abuse). Current investigative interviewing procedures were evaluated, and a revised interview protocol tailored to Aboriginal children was created.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Introduction to interview data, how it is used and how and why it might be collected

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aims and objectives. The aim of the study was to determine how graduate nurses use protocols in their medication management activities. The objectives were to: examine the extent of adherence to various protocols in relation to medication activities and determine how the ward environment impacts on graduate nurses' use of protocols to manage patients' medications.
Background. Protocols help newly qualified nurses integrate new knowledge into practice and promote effective decision-making
Design. A descriptive prospective qualitative design was used.
Methods. Twelve graduate nurses involved in direct patient care in medical, surgical and specialty wards of a metropolitan teaching hospital participated in the study. Participant observations were conducted with the graduate nurses during a two-hour period when medications were being administered to patients. In-depth interviews were conducted with each nurse immediately after observations and demographic data were collected on participating nurses and patients in their care, including all medications prescribed. Protocols associated with medication management activities for the clinical settings were also transcribed.
Results. Six themes were evident from the data: availability and use of protocols, scrutinizing patients' identity before medication administration, double-checking certain medications before administration, writing incident reports, following specific policies and timing the administration of medications.
Conclusion. Graduate nurses adhered to protocols if they were perceived not to impede with other nursing activities. Participants were also more likely to follow protocols if they felt encouraged to make their own decisions and if there was a decreased likelihood that disciplinary action would be involved.
Relevance to clinical practice. Experienced health professionals should encourage graduate nurses to comply with medication protocols and to make clinically reasoned decisions about medication activities. By providing peer support and acting as role models, experienced health professionals can also demonstrate to graduate nurses how effective protocol use is an important component of quality patient care.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background: Chronic fatigue syndrome, also known as myalgic encephalomyelitis (CFS/ME), is characterized by chronic disabling fatigue and other symptoms, which are not explained by an alternative diagnosis. Previous trials have suggested that graded exercise therapy (GET) is an effective and safe treatment. GET itself is therapist-intensive with limited availability. Objective: While guided self-help based on cognitive behavior therapy appears helpful to patients, Guided graded Exercise Self-help (GES) is yet to be tested. Methods: This pragmatic randomized controlled trial is set within 2 specialist CFS/ME services in the South of England. Adults attending secondary care clinics with National Institute for Health and Clinical Excellence (NICE)-defined CFS/ME (N=218) will be randomly allocated to specialist medical care (SMC) or SMC plus GES while on a waiting list for therapist-delivered rehabilitation. GES will consist of a structured booklet describing a 6-step graded exercise program, supported by up to 4 face-to-face/telephone/Skype™ consultations with a GES-trained physiotherapist (no more than 90 minutes in total) over 8 weeks. The primary outcomes at 12-weeks after randomization will be physical function (SF-36 physical functioning subscale) and fatigue (Chalder Fatigue Questionnaire). Secondary outcomes will include healthcare costs, adverse outcomes, and self-rated global impression change scores. We will follow up all participants until 1 year after randomization. We will also undertake qualitative interviews of a sample of participants who received GES, looking at perceptions and experiences of those who improved and worsened. Results: The project was funded in 2011 and enrolment was completed in December 2014, with follow-up completed in March 2016. Data analysis is currently underway and the first results are expected to be submitted soon. Conclusions: This study will indicate whether adding GES to SMC will benefit patients who often spend many months waiting for rehabilitative therapy with little or no improvement being made during that time. The study will indicate whether this type of guided self-management is cost-effective and safe. If this trial shows GES to be acceptable, safe, and comparatively effective, the GES booklet could be made available on the Internet as a practitioner and therapist resource for clinics to recommend, with the caveat that patients also be supported with guidance from a trained physiotherapist. The pragmatic approach in this trial means that GES findings will be generalizable to usual National Health Service (NHS) practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work, we examine unbalanced computation between an initiator and a responder that leads to resource exhaustion attacks in key exchange protocols. We construct models for two cryp-tographic protocols; one is the well-known Internet protocol named Secure Socket Layer (SSL) protocol, and the other one is the Host Identity Protocol (HIP) which has built-in DoS-resistant mechanisms. To examine such protocols, we develop a formal framework based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. By adopting the key idea of Meadows' cost-based framework and re¯ning the de¯nition of operational costs during the protocol execution, our simulation provides an accurate cost estimate of protocol execution compar- ing among principals, as well as the percentage of successful connections from legitimate users, under four di®erent strategies of DoS attack.