Search results
1 – 10 of 226Charles E. Hacker, Deborah Debono, Joanne Travaglia and David J. Carter
This paper explores the role of hospital cleaners and their contribution to healthcare safety. Few studies have examined the activities and input of hospital cleaners, rendering…
Abstract
Purpose
This paper explores the role of hospital cleaners and their contribution to healthcare safety. Few studies have examined the activities and input of hospital cleaners, rendering them largely invisible in healthcare research. Yet, as coronavirus disease 2019 (COVID-19) has demonstrated, this sizeable workforce carries out tasks critical to healthcare facilities and wider health system functioning.
Design/methodology/approach
Drawing on the work of Habermas, the authors examine the literature surrounding cleaners and quality and safety in healthcare. The authors theorise cleaners' work as both instrumental and communicative and examine the perceptions of healthcare professionals and managers, as well as cleaners themselves, of healthcare professionals and managers' role and contribution to quality and safety.
Findings
Cleaners are generally perceived by the literature as performing repetitive – albeit important – tasks in isolation from patients. Cleaners are not considered part of the “healthcare team” and are excluded from decision-making and interprofessional communication. Yet, cleaners can contribute to patient care; ubiquity and proximity of cleaners to patients offer insights and untapped potential for involvement in hospital safety.
Originality/value
This paper brings an overdue focus to this labour force by examining the nature and potential of their work. This paper offers a new application of Habermas' work to this domain, rendering visible how the framing of cleaners' role works to exclude this important workforce from participation in the patient safety agenda.
Details
Keywords
While liberals agree that the best society is one that supports the equal exercise of personal liberty, there is little agreement among them on what policies best achieve this…
Abstract
While liberals agree that the best society is one that supports the equal exercise of personal liberty, there is little agreement among them on what policies best achieve this end. Conflicts within liberalism over the place of socially derived goals vis-à-vis personal liberty and autonomy create tension and skew public discourse on policy alternatives. In this article, I characterize the debate among dominant strands of liberal ideology and consider the effort of Charles Taylor to resolve these tensions. Finding his resolution unsatisfying, I explore the alternative conception offered by American pragmatism. I argue that liberal theories fail because they fall prey to the problem of principles-they attempt to justify axiomatic thinking rather than perpetuate society and culture. Pragmatism provides a justification for liberal public discourse as the best mechanism for constructing, evaluating and revising policies that support cultural adaptation to social, economic and technological contingencies.
J. David Hacker, Michael R. Haines and Matthew Jaremski
The US fertility transition in the nineteenth century is unusual. Not only did it start from a very high fertility level and very early in the nation’s development, but it also…
Abstract
The US fertility transition in the nineteenth century is unusual. Not only did it start from a very high fertility level and very early in the nation’s development, but it also took place long before the nation’s mortality transition, industrialization, and urbanization. This paper assembles new county-level, household-level, and individual-level data, including new complete-count IPUMS microdata databases of the 1830–1880 censuses, to evaluate different theories for the nineteenth-century American fertility transition. We construct cross-sectional models of net fertility for currently-married white couples in census years 1830–1880 and test the results with a subset of couples linked between the 1850–1860, 1860–1870, and 1870–1880 censuses. We find evidence of marital fertility control consistent with hypotheses as early as 1830. The results indicate support for several different but complementary theories of the early US fertility decline, including the land availability, conventional structuralist, ideational, child demand/quality-quantity tradeoff, and life cycle savings theories.
Details
Keywords
Suggests that computer passwords can pose a major computer securityrisk, as password guessing is the most prevalent and effective method ofsystem penetration. Introduces a new…
Abstract
Suggests that computer passwords can pose a major computer security risk, as password guessing is the most prevalent and effective method of system penetration. Introduces a new computer package which can address this problem by generating difficult‐to‐guess passwords by removing human judgement from the password construction process.
Details
Keywords
Hannes Zacher and Cort W. Rudolph
As the workforce is aging and becoming increasingly age diverse, successful aging at work has been proclaimed to be a desirable process and outcome, as well as a responsibility of…
Abstract
As the workforce is aging and becoming increasingly age diverse, successful aging at work has been proclaimed to be a desirable process and outcome, as well as a responsibility of both workers and their organizations. In this chapter, we first review, compare, and critique theoretical frameworks of successful aging developed in the gerontology and lifespan developmental literatures, including activity, disengagement, and continuity theories; Rowe and Kahn’s model; the resource approach; the model of selective optimization with compensation; the model of assimilative and accommodative coping; the motivational theory of lifespan development; socioemotional selectivity theory; and the strength and vulnerability integration model. Subsequently, we review and critically compare three conceptualizations of successful aging at work developed in the organizational literature. We conclude the chapter by outlining implications for future research on successful aging at work.
Details
Keywords
Identifies key activities that network users can perform in orderto use the network effectively. Offers recommended reading, frombeginner to expert user status. Explains some…
Abstract
Identifies key activities that network users can perform in order to use the network effectively. Offers recommended reading, from beginner to expert user status. Explains some commonly used terms (e.g. Turbo Gopher with Veronica!). Lists useful Internet resources.
This paper poses the question of whether the mainstream feminist movement in the United States, in concentrating its efforts on achieving gender parity in the existing workplace…
Abstract
This paper poses the question of whether the mainstream feminist movement in the United States, in concentrating its efforts on achieving gender parity in the existing workplace, is selling women short. In it, I argue that contemporary U.S. feminism has not adequately theorized the problems with the relatively unregulated market system in the United States. That failure has contributed to a situation in which women’s participation in the labor market is mistakenly equated with liberation, and in which other far-ranging effects of the market system on women’s lives inside and outside of work – many of them negative – are overlooked. To theorize the effects of the market system on women’s lives in a more nuanced manner, I borrow from the insights of earlier Marxist and socialist feminists. I then use this more nuanced perspective to outline an agenda for feminism, which I call “market-cautious feminism,” that seeks to regulate the market to serve women’s interests.
Details
Keywords
Talal H. Hayale and Husam A. Abu Khadra
The objective of this study is to investigate perceived security threats of Computerized Accounting Information Systems (CAIS) that face Jordanian domestic banks. An empirical…
Abstract
The objective of this study is to investigate perceived security threats of Computerized Accounting Information Systems (CAIS) that face Jordanian domestic banks. An empirical survey using self‐administrated questionnaire has been carried out to achieve the above‐mentioned objective. The study results reveal that accidental entry of “bad” data by employees, accidental destruction of data by employees; intentional entry of “bad” data by employees and employees’ sharing passwords are the top four security threats that face domestic banks. The paper concludes that most security threats that face domestic banks are internally generated and unintentional.
Details