To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
To the heads of operational line sections, economic protection sections of municipal district branches, and protection sections (sub-sections) of factories and enterprises:
We recently discovered that Comrade Piao Wenxiang in the Economic Protection Section of West of the Tracks Municipal District Branch, in the course of his work of operating agents, for fear of jeopardising secrecy by having face-to-face meetings with them and with the permission of the protection section chief, Comrade Deng Shirui, ordered agents to send their reports to him through the post in the form of ordinary letters. On 10 August, agent Zhang X’s report on the activities of a suspicious element went missing, and despite repeated inquiries with the post office, it still has not been located.
Public reputation mechanisms are an effective means to limit opportunistic behavior in markets suffering from moral hazard problems. While previous research was mostly concerned with the influence of exogenous feedback mechanisms, this study considers the endogenous emergence of reputation through deliberate information sharing among actors and the role of barriers in hindering information exchange. Using a repeated investment game, we analyze the effects of competition and transfer costs on players’ willingness to share information with each other. While transfer costs are a direct cost of the information exchange, competition costs represent an indirect cost that arises when the transfer of valuable information to competitors comes at the loss of a competitive advantage. We show that barriers to information exchange not only affect the behavior of the senders of information, but also affect the ones about whom the information is shared. While the possibility of sharing information about others significantly improves trust and market efficiency, both competition and direct transfer costs diminish the positive effect by substantially reducing the level of information exchange. Players about whom the information is shared anticipate and react to the changes in the costs by behaving more or less cooperatively. For reputation building, an environment is needed that fosters the sharing of information. Reciprocity is key to understanding information exchange. Even when it is costly, information sharing is used as a way to sanction others.
If interRAI home care information were shared with primary care providers, care provision and integration could be enhanced. The objective of this study was to co-develop an interRAI-based clinical information sharing tool (i.e., the Patient Falls Risk Report) with a sample of primary care providers. This mixed-methods study employed semi-structured interviews to inform the development of the Patient Falls Risk Report and online surveys based on the System Usability Scale instrument to test its usability. Most of the interview sample (n = 9) believed that the report could support patient care by sharing relevant and actionable falls-related information. However, criticisms were identified, including insufficient detail, clarity, and support for shared care planning. After incorporating suggestions for improvement, the survey sample (n = 27) determined that the report had excellent usability with an overall usability score of 83.4 (95% CI = 78.7–88.2). By prioritizing the needs of end-users, sustainable interRAI interventions can be developed to support primary care.
The field of dissemination and implementation science has the potential to narrow the translational research-to-practice gap and improve the use of evidence-based practices (EBPs) within community-based settings. Yet, foundational research related to dissemination efforts, such as understanding researcher attitudes, practices, and the determinants to sharing research findings, is lacking within extant literature.
Methods:
A sequential explanatory (QUAN$$ \to $$qual) mixed methods design was used to examine 85 academic researchers’ perspectives and self-reported dissemination methods used to share research outcomes with community stakeholders to better understand researcher’s usual dissemination practices (referred to as dissemination-as-usual). Quantitative surveys collected researcher demographic data, attitudes toward dissemination efforts, and dissemination strategy use.
Results:
Multiple linear regression examined predictors of the quantity of dissemination strategies utilized by researchers, finding that years since earning their degree, time spent disseminating, and the number of reasons for engaging in dissemination efforts predicted greater numbers of dissemination strategies utilized by researchers. Individual, semi-structured interviews with a subset of researchers (n = 18) expanded upon quantitative findings, identifying barriers and facilitators to their dissemination efforts. Data strands were integrated using a joint display, and the Dissemination of Research model guided data interpretation. More established researchers experienced fewer barriers and more facilitators to support their use of a variety of dissemination strategies to share findings with community stakeholders. However, researchers reported needing specific training, institutional support, and/or dedicated time to plan and enact dissemination strategies.
Conclusion:
The necessary first step in research translation is the dissemination of research evidence, and understanding dissemination-as-usual can identify areas of need to advance translational science.
This chapter explores how shared governance through talent mobilization in the form of a global AI service corps can offset the negative impact of nation-states’ economic competition to develop AGI.
This chapter aims to establish the deep dependence of cybersecurity on information sharing (IS) as a critical tool for enabling cyber peace. IS on cyber threats and their mitigation constitutes a best practice within many domestic regulatory regimes and is often defined as a confidence-building measure, or CBM, in key international regulatory initiatives. Moreover, implementation of IS as a voluntary or recommended best practice or CBM – rather than as a mandated regulatory requirement – has the dual advantage of bypassing the legal challenges of enforcement at the national level; and, internationally, of achieving formal multistakeholder agreement on cyber norms. The difficulties of such normative barriers are characteristic of the contemporary cyber lay of the land, awaiting resolution until binding cyber norms can be effectively incorporated into both domestic and international legal regimes. The chapter emphasizes that a critical condition for IS specifically, as well as for cyber peace in general, is the establishment of trust among diverse stakeholders, best undertaken through polycentric regulation.
The international community is too often focused on responding to the latest cyber attack instead of addressing the reality of pervasive and persistent cyber conflict. From ransomware against the city government of Baltimore to state-sponsored campaigns targeting electrical grids in Ukraine and the United States, we seem to have relatively little bandwidth left over to ask what we can hope for in terms of “peace” on the Internet, and how to get there. It’s also important to identify the long-term implications for such pervasive cyber insecurity across the public and private sectors, and how they can be curtailed. This edited volume analyzes the history and evolution of cyber peace and reviews recent international efforts aimed at promoting it, providing recommendations for students, practitioners, and policymakers seeking an understanding of the complexity of international law and international relations involved in cyber peace. This title is also available as Open Access on Cambridge Core.
This chapter starts with a discussion of the role played by verifiers in peace. We discuss some of the many types of verifiers, and how those whose roles are outside the formal political process can help to construct peace. Many of these have scientific or investigatory roles whose work informs the state of the world. There are interesting models in aviation, including not only the National Transportation Safety Board (NTSB) but also a variety of others including institutions dedicated to telemetry analysis and near miss analysis. We examine each and suggest how a cyber equivalent could contribute to our understanding of the state of the world, and in doing so, support peace.
This chapter describes methods used for dissemination of the plan, including information exchange systems used for situational awareness, a common operating picture, and use of information technology.
In most EU policy areas, procedural cooperation between national administrations takes place through the shared implementation of “composite” decision-making procedures, facilitated by the operation of multijurisdictional networks or horizontal or vertical information exchange. In the context of asylum policy, such administrative cooperation has been necessary in the distribution of asylum seekers—in accordance with the Dublin III Regulation, which allocates responsibility among Member States to examine an asylum application. In addition to rules in the Regulation itself—Article 34—information sharing also takes place through Eurodac, an EU-wide centralized information system. This Article examines whether the Dublin system ensures effective judicial and administrative remedies in the operationalization of multijurisdictional information networks. It analyzes the relevant Eurodac and Dublin-related legislation, national implementation, and national case law through the lens of administrative cooperation. The assumption that the data exchanged has been acquired and processed lawfully, due to interstate trust, and the extent to which that assumption is rebuttable, are central themes throughout this Article. It is argued that administrative cooperation through information sharing takes precedence over the right to an effective remedy, and that, in practice, judicial and extrajudicial remedies are insufficient to protect asylum seekers.
This chapter begins by showing why armed groups perceive threats when civilians support community members. As armed groups respond, they make civilians perceive community support as dangerous. Then, it explains how civilians develop the motivation and opportunity to share information. Afterwards, it analyzes how and why civilians select specific conversation partners, particularly strong social ties, co-ethnics, and people with similar ideological views. Next, it discusses how civilians use code words when sharing information. Civilians perceive protection from this strategy of sharing information, even though the code words that they choose are often very easy to decipher.
Poor connectivity between diverse resource users and complex wider governance networks is a challenge in environmental governance. Organizations that ‘broker’ interactions among these relationships are expected to improve governance outcomes. Here, we used semi-structured interviews and social network analysis to identify actors in positions to broker coral reef-related information to and from resource users and to assess the performance of these brokers. Representatives (n = 262) of actor groups were interviewed, including local and national government, non-governmental organizations (NGOs), community organizations and resource user groups from 12 communities across four Caribbean countries, to map information-sharing networks and to identify brokers. Broker performance was assessed through separate interviews with coral reef resource users (n = 545). The findings show that marine NGOs were the highest-functioning brokers. Where such local-level organizations were absent, government agencies in reef management roles acted as brokers, but their performance was lower. Actors in brokerage positions did not always effectively share information, with broker performance being positively correlated with network brokerage scores. The results further our understanding of the roles of brokers in different governance contexts. Identifying those in brokerage positions and supporting their roles in connecting local resource users to wider governance networks could encourage functional brokerage and enhance reef management outcomes.
This chapter provides a unique account of the content of discussions in SPS and TBT Committees. Based on an in-depth analysis of Committee meeting minutes over 5 years (2010–2014), it looks into the demand side of information, i.e. in the information sought by WTO Members raising a concern in the SPS and TBT Committees and their purpose in raising such concerns. It finds that Members active in the STC discussions are either after further information or clarification of a measure, they intend to influence draft regulations through inputs to other Members’ regulatory process, or they try to address a problem they face in the implementation of the measure. STCs therefore allow WTO Members to engage in technical dialogue about domestic regulations, against the backdrop of the SPS and TBT Agreements, without there being a legal stake in the discussion. In other words, transparency can be seen as shaping the behaviour of WTO Members without there being new agreements or enforcement.
Edited by
Beatrice de Graaf, Universiteit Utrecht, The Netherlands,Ido de Haan, Universiteit Utrecht, The Netherlands,Brian Vick, Emory University, Atlanta
This chapter analyses the development of transnational policing as a crucial element of the federal–transnational security regime of the German Confederation, which the Congress of Vienna had established in 1815 to maintain external and internal security. Narratives of cross-border political subversion and crime triggered new modes of political and transnational policing in nineteenth-century Europe, resulting in both formal police cooperation as well as in various actors and techniques of transnational policing and securitisation. Through the ‘commission-mode’ and the ‘conference-mode’, policing agencies aimed at intelligence, surveillance and suppression, and contributed to the production and dissemination of a systematic knowledge base on political subversion and international crime. In the process, they influenced the development of security narratives and logics and practices of securitisation, and constituted important elements of the emerging European security culture.
In Australia, policies such as the Better Outcomes in Mental Health Care initiative have been the impetus for improved collaboration between medical practitioners and psychologists in general. However, policies that promote collaboration between school psychologists and community mental health, health, justice and/or human services professionals are yet to occur. This is despite known benefits arising from integrated service delivery to people with complex needs, including young people. School psychologists are an integral part of the service mix and are in an excellent position to promote collaborative practices and to assist students and families to navigate and access school-based and community-based support. This study, conducted in Queensland, Australia, investigated school psychologists’, guidance officers’ and school counsellors’ current and preferred levels of collaboration, their perceptions of the drivers and barriers to collaborative practices, and their views on how collaborative practices affect students. Results revealed that participants engaged more fully in within-school collaboration than collaboration with professionals and agencies outside of the school; they had a desire to collaborate more fully both internally and externally; and that concerns regarding confidentiality, time restrictions, and lack of access to appropriate services can sometimes make collaboration and information sharing difficult. Implications for school psychological practice are discussed.
Translating Emergency Knowledge for Kids (TREKK) is a national network aimed at improving emergency care for children by increasing collaborations and knowledge sharing between general and pediatric emergency departments (EDs). This study aimed to determine patterns of knowledge sharing within the network and to identify connections, barriers, and opportunities to obtaining pediatric information and training.
Methods
We conducted 22 semi-structured interviews with health care professionals working in general EDs, purposefully sampled to represent connected and disconnected sites, based on two previous internal quantitative social network analyses (SNA). Data were analyzed by two independent reviewers.
Results
Participants included physicians (59%) and nurses (41%) from 18 general EDs in urban (68%) and rural/remote (32%) Canada. Health care professionals sought information both formally and informally, by using guidelines, talking to colleagues, and attending pediatric related training sessions. Network structure and processes were found to increase connections, support practice change, and promote standards of care. Participants identified personal, organizational and system level barriers to information and skill acquisition, including resources and personal costs, geography, dissemination, and time. Providing easy access to information at the point of care was promoted through enhancing content visibility and by embedding resources into local systems. There remains a need to share successful methods of local dissemination and implementation across the network, and to leverage local professional champions such as clinical nurse liaisons.
Conclusions
These findings reinforce the critical role of ongoing network evaluation to improve the design and delivery of knowledge mobilization initiatives.
This study examines the effect of supervisors’ Confucian values on interpersonal trust, interpersonal justice, and information sharing in the context of South Korean workers, using multilevel analysis. We also investigate the moderating roles of blood, regional, and school ties (BRST) among their relationships. A survey was conducted with 46 supervisors and 210 subordinates from South Korean manufacturing companies. Our empirical findings indicated that supervisors’ Confucian values were positively associated with the interpersonal trust, interpersonal justice, and information sharing of subordinates. Contrary to our expectation, the BRST had no significant moderating role in the relationship between supervisors’ Confucian values and interpersonal trust, interpersonal justice, and information sharing of subordinates. Our study contributes to organisational behaviour and psychology by highlighting the significance of societal values such as Confucian values in understanding an organisational member's attitude and behaviour in the East Asian region.
Seclusion may be harmful and traumatic to patients, detrimental to therapeutic relationships, and can result in physical injury to staff. Further, strategies to reduce seclusion have been identified as a potential method of improving cost-effectiveness of psychiatric services. However, developing alternative strategies to seclusion can be difficult. Interventions to reduce seclusion do not lend themselves to evaluation using randomized controlled trials (RCTs), though comprehensive literature reviews have demonstrated considerable non-RCT evidence for interventions to reduce seclusion in psychiatric facilities. In the UK, a recent 5-year evaluation of seclusion practice in a high secure UK hospital revealed reduced rates of seclusion without an increase in adverse incidents. To assess the effect of a novel intervention strategy for reduction of long-term segregation on a high secure, high dependency forensic psychiatry ward in the UK, we introduced a pilot program involving stratified levels of seclusion (“long-term segregation”), multidisciplinary feedback and information sharing, and a bespoke occupational therapy program. Reduced seclusion was demonstrated and staff feedback was mainly positive, indicating increased dynamism and empowerment on the ward. A more structured, stratified approach to seclusion, incorporating multidisciplinary team-working, senior administrative involvement, dynamic risk assessment, and bespoke occupational therapy may lead to a more effective model of reducing seclusion in high secure hospitals and other psychiatric settings. While lacking an evidence base at the level of RCTs, innovative, pragmatic strategies are likely to have an impact at a clinical level and should guide future practice and research.
This is a summary of the presentations and discussion of Panel 2.18, Logistics, Information Technology, and Telecommunication in crisis Management of the Conference, Health Aspects of the Tsunami Disaster in Asia, convened by the World Health Organization (WHO) in Phuket, Thailand, 04–06 May 2005. The topics discussed included issues related to logistics, information Technology (IT), and crisis communication pertaining to the responses to the damage created by the Tsunami. It iss presented in the following major sections: (1) issues; (2) lessons learned; (3)what was done well; (4)what could have been done better; and (5)conclusions and recommendations. Each major section is presented in four sub-sections: (1) needs assessments; (2) coordination; (3) filling the gaps; and (4) capacity building.