SlideShare a Scribd company logo
1 of 39
Access to e-resources within the NHS in
England: the role and impact of organisational
culture, information governance,
and IT strategy
Catherine Ebenezer
Health Informatics
Supervisor: Professor Peter Bath
02/10/13
1
• Introduction and background
• Literature review findings
• Methodology and proposed methods
• Research ethics and governance
• Timescales and plan
2
• LIS Manager in mental health NHS FT 2008-2012
• Variety of technological barriers / hindrances to information
seeking, teaching and learning, clinical practice
– ascribed variously to:
• Information governance
• Information security
• IT infrastructure policies and practices
• Blocking of ‘legitimate’ websites
• Obstacles to use of particular content types and applications
• Social media / Web 2.0 a particular problem
• Implications?
3
• Information governance (IG): (Cayton, 2006)
• “The structures, policies and practice of the DH, the NHS
and its suppliers to ensure the confidentiality and security
of all records, and especially patient records, and to
enable the ethical use of them for the benefit of individual
patients and the public good”.
• Information security (IS): (Anderson, 2003)
• “A well-informed sense of assurance that information
risks and controls are in balance.”
4
Policy support in English NHS for evidence-based
practice:
• All NHS staff to have access to the evidence base of
health care via the web (Information for health, 1998)
• NHS Evidence (High quality health for all, 2008)
• Evidence-based practice a pillar of clinical governance
(NHS quality improvement system)
• Health professions’ regulatory bodies set requirements
for keeping up to date
5
Strategic support in English NHS for e-learning:
• Framework for technology-enhanced learning, 2011
• Establishment of governance structures
• Development of content at national and local level
• Facilities for checking suitability of local PC infrastructure
• Much e-learning content also produced by HEIs,
professional bodies
• Wide range of delivery methods and content types
• Role of NHS libraries
6
• Information Governance Statement of Compliance (IGSoC)
variously interpreted (Blenkinsopp, 2008)
• NHS the locus of much teaching and research – not
recognised?
• IS policies and practices cf. organisational values
• Dominance of IG agenda – narrow view of business need
• Health and Social Care Information Centre (HSCIC) not
communicating proactively to NHS staff
• Web 2.0 and social media issues poorly understood –– access
usually blocked within trust network perimeter
• Inadequate input into trust IT and business
planning processes by LIS, workforce development
professionals
7
• NHS-HE Forum and Connectivity Project
• Commissioned report on educational use of social media from
specialist - eventually published as:
Lafferty, N. (2013). NHS-HE connectivity project: Web 2.0 and
social media in education and research. London: NHS-HE Forum.
At https://community.ja.net/groups/nhs-he-forum-connectivity-project
• Strategic Health Authority Library Leads IT subgroup
• Carried out survey of NHS library managers to map nature and
extent of resource access problems (mid-2008)
• Established centralised, regularly updated whitelist of websites
“never to be blocked within the NHS”
8
To investigate the possible relationship between stated
policy regarding evidence-based practice and professional
learning and the actual provision of computing facilities and
IT security policy and practice within NHS trusts in England.
More specifically:
1) the impacts that inadequate functionality and restrictions on access
to information facilities have on professional information-seeking,
learning and clinical practice
2) the practices, attitudes, values, and presuppositions of the relevant
staff regarding information-seeking and business need which bear on
how information security (i.e. of networks and devices) is implemented
9
Main areas:
• Information behaviour
• Multi-professional studies
• Doctors
• Nurses
• Health services managers
• Others
• Organisational culture and subcultures, IT staff
subcultures
• NHS information governance, information security
• Risk management
10
Leckie, Pettigrew and Sylvain (1996) model of (individual)
professional information behaviour
• Work roles and their associated tasks the primary
motivation of information-seeking
• Information-seeking shaped by variables relating to:
11
• Demographics
• Organisational context
• Frequency
• Predictability
• Sources – formal and informal
• Source preferences
• Awareness of sources
• Perceived accessibility of sources
• Familiarity
• Timeliness
• Previous successful use
• Cost
12
Leckie, Pettigrew and Sylvain’s model of professional information behaviour
From Leckie & Pettigrew, 1997, p. 100
General findings
• Wide variations by professional group in
• Cultural attitudes to information-seeking
• Access to and use of the Internet
• Preferences for types of resources consulted
• Overall moderate online information resource usage
• Use of Google is ubiquitous
• Obstacles to information-seeking frequently cited
• Lack of time
• Lack of training in conducting searches
• Shortage of computer facilities (nurses)
13
• Little agreement on definitions of organisational culture
• “The way things are done around here” ???
• Schein’s account (1985, 1996) best known / widely cited
within information security literature:
• Organisational culture (OC) operates at three levels:
• Deep tacit assumptions - invisible
• Espoused values and the norms that derive from
them – more recognisable, especially when
challenged
• Day-to-day behaviour and artifacts – visible, but
often indecipherable
14
• Definition of subculture:
“A subset of an organization’s members that identify
themselves as a distinct group within the organization and
routinely take action on the basis of their unique collective
understandings.” (Hatch, 2006)
• May reflect shared professional or other identities
• Can create “silos” and barriers to effective communication and
teamwork
• Occupational communities a particular type of occupational
subculture (Van Maanen & Barley, 1982);
• IT staff fulfil criteria (Duliba & Baroudi, 1991)
• Differences among occupational subcultures can lead to
organisational conflict and dysfunction (Trice, 1993)
15
Occupational subgroups characterised by:
• Consciousness of kind
• Pervasiveness of norms
• Abundance of cultural forms
• Ethnocentrism and feelings of superiority
towards other groups
• Esoteric knowledge
• Being subject to extreme demands
• Complaints about members of other subcultures
(Trice, 1993)
16
• IT staff form a distinct occupational subculture - they displayed
Trice’s (1993) characteristic signs (Guzman et al., 2004)
• Feelings of superiority reinforced by the technical vocabulary of IT
• Tendency to blame end-users for systems failures
• Distrust / negative stereotyping of end-users:
• “technophobic”
• “difficult to communicate with”
• “ignorant of technical priorities”
• Desire to restrict end-user functionality in an effort to retain control
of systems
• Cf. “Users are the weakest link” (Schneier, 2000)
17
• Web application security
• Network perimeter and end-point security
measures
• Information governance and security
within the NHS
• Structures
• Standards
18
• Definitions of risk
• No agreed definition! (Renn, 1998, cited by Joffe, 2003)
• “The probability of an event combined with the magnitude of the
losses and gains that it will entail”
• “Danger from future damage” (Douglas, 1994)
• Theories of risk / factors influencing risk assessment
• Cultural hypothesis (Douglas & Wildavsky, 1982)
• Social amplification of risk framework (Kasperson, 1988)
• Risk perception and communication research within cognitive and
social psychology (reviewed by Taylor-Gooby & Zinn, 2006)
• Risk homeostasis theory (Wilde, 1998)
• Social representation of risk theory (Moscovici, 1988)
19
• Plan|Do|Check|Act cycle:
Assess risks | treat risks | monitor and report risks | identify
risks
• Threat landscape is complex and evolving rapidly
• Judgments in both qualitative and quantitative risk analysis
methods are uncertain (Gerber & von Solms, 2005)
-- therefore a subjective process
• Relationships between risks, vulnerabilities, threats and
security measures can be complex (Bojanc et al., 2012)
• Trade-off between security and functionality
(Besnard & Arief, 2004)
• Precautionary in character and commercially driven
(Stewart, 2004); attitudes subject to groupthink? (Rose, 2011)
20
Rationale
• Employers’ legal liability for:
• Clogging of network bandwidth by non-work related use
• Wasted staff time
• Importance of acceptable use policies (AUPs)
21
• Hacking
• Discrimination
• Fraud
• Breaches of the
Data Protection Act
• Possession and distribution of illegal
pornography, other obscene or racially
inflammatory material
• Racial or sexual harassment
• Defamation of managers, customers etc.
• Copyright infringement, software piracy
Technologies
• Devices
• Web security gateways, application proxy firewalls,
deep packet inspection firewalls
• Approaches
• Labelling
• Blacklisting / whitelisting
• Content analysis / classification techniques
• Evaluation methods
• NB trade-off between percentages of true and false positives
- i.e. over-blocking
22
Impacts
• Prince, Kass & Klaber (2010) survey:
Medical e-resource availability (22 titles) in 37 NHS trusts
• “Shouldn’t we be managing the risks more effectively in order to
allow learners the freedom to use IT resources
to better effect?”
• “… of its nature intrusive and disruptive” (Gomez Hidalgo, 2009)
• Denial of autonomy
• Form of censorship – problem for librarians
• Inaccurate – over-blocking / false positives
• Problematic in respect of health information
• Low staff morale – demotivation / alienation
23
24
77
57
51
69
35
25
11
9
0 10 20 30 40 50 60 70 80 90
Social networking applications
Wikis and blogs
Communication tools
Discussion forums
Webmail
E-journals*
E-books*
Online databases
% of trusts
SHALL IT subgroup survey of NHS librarians (2008)
*’core content’
or locally
purchased
Impacts
Information behaviour
• Heterogeneity between professions
• Very little direct consideration of time frames or degrees of urgency
in seeking information, though time factors frequently discussed
indirectly
• Information-seeking does not feature as an aspect of clinical or
professional autonomy – no parallel with academic freedom
• Technical obstacles to information-seeking nowhere discussed in
sufficient detail to be informative
• Link between negative attitudes to the Internet and to information-
seeking and poor levels of access
• “Cyber-bureaucrat” view of web use (Anandarajan et al., 2006)
may be widespread and extend to all forms of use
25
Organisational culture / information security / risk management
• Very few studies directly addressing the research questions
(Kolkowska, 2011, closest in aim and method)
-- an exploratory approach is required
• Many wider issues:
• Management of information security risks: technical and organisational
aspects
• Strategic planning of NHS information technology
• Organisational politics / subcultures / professional agendas
• Values: organisational / professional / cultural
• Cultural attitudes to information-seeking
• Paradigmatic differences underlying concepts of risk
26
1. What is the current extent of information access problems?
2. To what extent is information seeking encouraged or
supported as a legitimate component of professional work /
as an aspect of professional autonomy and judgement? How
does this relate to overall culture, values and priorities?
3. What approach is taken to the strategic management of
information technology infrastructure?
4. How are risks managed that relate to the security of
information technology, in the context of overall risk
management?
5. What issues for the accessibility of information within the
English NHS are posed by current approaches to IT
infrastructure management and to information risk?
27
Exploratory case study
• Unit(s) of analysis
• One or more NHS trusts
• Methods
• Semi-structured interviews with key informants (15+ per trust)
• selected via purposive / snowball sampling
• representing a variety of perspectives:
• Library and information
• Information governance
• Network security and PC support
• Human resources, workforce development
• Communications
28
Exploratory case study
• Methods (cont’d)
• Telephone interviews with representatives of information providers
• Explore technical problems encountered in setting up access to
e-resources for NHS customers
• Documentary analysis
• Policies and strategies: IT, LIS, workforce development,
information governance, Internet AUP
• Network topology / N3 connections / security devices
• Q-methodology (if time allows)
• Investigate further the attitudes of information security and
information governance staff to online information-seeking
• Q-sort statements previous interviews,
literature review
29
Exploratory case study
• Assuring validity
• Integration of methods/triangulation: multiple vantage points,
comprehensiveness
• Member checking of transcriptions and analysis
• Need to develop:
• Interview guide(s)
• (Simple) data management plan
• Field notes
• Reflective diary
(Simons, 2009; Thomas, 2011; Yin, 2009)
• Data analysis
• Framework analysis - a possible approach (Ritchie & Spencer, 1994)
30
• NHS Research Ethics Committee approval not required
• Does require local NHS trust research governance approval
• Ethical issues are those of social research in general:
• Efficacy of design
• Excellent treatment of individuals
• Transparency of process
• Plausibility of products (Savin-Baden & Major, 2013)
• Safeguard interests of interview respondents:
• Data protection
• Provide clear information about study
• Fairly obtain and record informed consent
• Manage data securely
• Ensure anonymity of participants and organisation
• Disseminate findings in accordance with copyright law
• Information security a sensitive subject!
31
Activity Deliverable
September 2013
Develop methodology chapter
Submit School ethics application
Prepare for research presentation and viva
Presentation
October 2013
Submit ethics application to Information
School
Submit research governance application to
NHS trust(s) research governance depts.
Completed ethics application to
Information School
Ethics application paperwork for NHS
trust research governance depts.
First complete draft of literature
review
November 2013 Data collection and analysis – phase 1:
Arrange interviews
Develop interview guide
Conduct interviews
Transcribe interviews
Analyse interview data
First draft of methodology chapterDecember 2013
January 2014
February 2014
32
Activity Deliverable
June 2014
Write up chapter 4 Thesis chapter 4
July 2014
August 2014
Plan and design data collection phase 2September 2014
October 2014
November 2014 Submit ethics application
(if required)
December 2014 Data collection and analysis – phase 2:
as indicated
e.g. further interviews,
Q-sort
January 2015
February 2015
March 2015
April 2015
May 2015
Write up additions to chapter 4
June 2015
July 2015 Thesis draft to PB
August 2015 Revising thesis draft
September 2015 Submit thesis Thesis final draft
33
Questions?
Catherine Ebenezer
lip12cme@sheffield.ac.uk
http://www.mendeley.com/profiles/catherine-ebenezer1/
34
• Anandarajan, M., Paravastu, N., & Simmers, C. A. (2006). Perceptions of personal web usage in
the workplace: Q-methodology approach. CyberPsychology and Behavior, 9(3), 325–35.
• Anderson, J. (2003). Why we need a new definition of information security. Computers and Security
22(4), 308-313.
• Besnard, D., & Arief, B. (2004). Computer security impaired by legitimate users. Computers and
Security, 23(3), 253–264.
• Blenkinsopp, J. (2008). Bookmarks: web blocking – giving Big Brother a run for his money. He@lth
Information on the Internet, (62), 2008.
• Bojanc, R., Jerman-Blažič, B., & Tekavčič, M. (2012). Managing the investment in information
security technology by use of a quantitative modeling. Information Processing and Management,
48(6), 1031–1052.
• Cayton, H. (2006). Information governance in the Department of Health and the NHS.
London: Care Record Development Board, Department of Health.
• Darzi, A. (2008). High quality health for all: NHS Next Stage Review final report.
London: Department of Health.
• Department of Health. (2011). A framework for technology enhanced learning.
London: Department of Health.
• Douglas, M., & Wildavsky, A. B. (1983). Risk and culture: An essay on the
selection of technological and environmental dangers.
Berkeley and Los Angeles, CA: University of California Press.
35
• Douglas, M. (1994). Risk and blame: essays in cultural theory. London: Routledge.
• Duliba, K. A., & Baroudi, J. (1991). IS personnel: do they form an occupational community?. ACM
SIGCPR Computer Personnel, 13(2), 24-35.
• Elejabarrieta, F. (1994). Social positioning: a way to link social identity and social
representations. Social Science Information, 33(2), 241–253.
• Fidel, R., Pejtersen, A. M., Cleal, B., & Bruce, H. (2004). A multidimensional approach to the study
of human-information interaction: a case study of collaborative information retrieval. Journal of the
American Society for Information Science and Technology, 55(11) 939-953
• Gerber, M., & von Solms, R. (2005). Management of risk in the information age. Computers and
Security, 24(1), 16–30.
• Guzman, I. R., Stanton, J. M., Stam, K. R., Vijayasri, V., Yamodo, I., Zakaria, N., & Caldera, C.
(2004). A qualitative study of the occupational subculture of information systems employees in
organizations. In SIGMIS (Vol. 1). Tucson, AZ.
• Hatch, M. J. (2006). Organization theory: modern, symbolic and postmodern perspectives (2nd
ed.). New York: Oxford University Press.
• Jasanoff, S. (1998). The political science of risk perception. Reliability Engineering & System
Safety, 59(1), 91-99.
• Kasperson, R. E., Renn, O., Slovic, P., Brown, H. S., Emel, J., Goble, R., … Ratick, S. (1988). The
social amplification of risk: a conceptual framework. Risk Analysis, 8(2), 177–187.
36
• Kolkowska, E. (2011). Security subcultures in an organization - exploring value conflicts. ECIS 2011
Proceedings.
• Kummerow, E. H., & Innes, J. M. (1994). Social representations and the concept of organizational
culture. Social Science Information, 33(2), 255–271.
• Lafferty, N. (2013). NHS-HE connectivity project: Web 2.0 and social media in
education and research. Retrieved from
https://community.ja.net/groups/search/NHS-HE%2520forum
• Leckie, G. J., Pettigrew, K. E., & Sylvain, C. (1996). Modeling the information
seeking of professionals: a general model derived from research on engineers, health care
professionals, and lawyers. The Library Quarterly, 66(2), 161–193.
• Martin, J., Frost, P. J., & O’Neill, O. A. (2006). Organizational culture: beyond struggles for
intellectual dominance. In S. R. Clegg, C. Hardy, T. B. Lawrence, & W. R. Nord (Eds.), The Sage
handbook of organization studies (2nd ed., pp. 725–753). London: Sage.
• Moscovici, S. (1988). Notes towards a description of social representations. European Journal of
Social Psychology, 18, 211–250.
• NHS Executive. (1998). Information for health: an information strategy for the modern NHS 1998-
2005.
• Prince, N. J., Cass, H. D., & Klaber, R. E. (2010). Accessing e-learning and
e-resources. Medical Education, 44(436-437).
37
• Reddy, M. & Dourish, P. (2002). A finger on the pulse: temporal rhythms and information
seeking in medical work. Proceedings of the Conference on Computer Supported
Collaborative Work, 344-353. New Orleans, LA: ACM.
• Resnick, P., Richardson, C., & Hansen, D. (2002). See no evil: how internet filters affect the
search for online health information. Menlo Park, CA. Retrieved from www.kff.org
• Resnick, P. J., Hansen, D. L., & Richardson, C. R. (2004). Calculating error rates for filtering
software. Communications of the ACM, 47(9), 67-71
• Ritchie, J. & Spencer, E. (1994). Qualitative data analysis for applied policy research (pp.
173-194). In Bryman, A. & Burgess, R. G. (Ed.), Analyzing qualitative data. London:
Routledge.
• Rose, J. D. (2011). Diverse perspectives on the groupthink theory – a literary review.
Emerging Leadership Journeys, 4(1), 37 – 57.
• Savin-Baden, M., & Major, C. H. (2013). Qualitative research: the essential guide to
theory and practice. London: Routledge.
• Schein, E. H. (1985). Organizational culture and leadership. San Francisco, CA: Jossey-Bass.
• Schein, E. H. (1996). Three cultures of management: the key to organizational learning. Sloan
Management Review, 38(1), 9–20.
• Simons, H. (2009). Case study research in practice. London: Sage
38
• Stewart, A. (2004). On risk: perception and direction. Computers and Security, 23(5), 362–
370.
• Taylor-Gooby, P., & Zinn, J. O. (2006). Current directions in risk research: new
developments in psychology and sociology. Risk Analysis, 26(2), 397–411.
• Technical Design Authority Group. (2008). TDAG survey of access to electronic resources in
healthcare libraries. London: TDAG.
• Thomas, G. (2011) How to do your case study. London: Sage.
• Trice, H. M. (1993). Occupational subcultures in the workplace. Ithaca, NY: ILR Press.
• Vaast, E. (2007). Danger is in the eye of the beholders: social representations of information
systems security in healthcare. The Journal of Strategic Information Systems, 16(2), 130–
152.
• Van Maanen, J., & Barley, S. R. (1982). Occupational communities: culture and control in
organizations (Report no. TR-ONR-10). Cambridge, MA: Alfred P. Sloan School of
Management.
• Wilde, G. J. S. (1998). Risk homeostasis theory: an overview. Injury Prevention, 4, 89–91.
• Yin, R. K. (2009). Case study research: design and methods (4th ed., Vol. 5).
Thousand Oaks, CA: Sage.
39

More Related Content

Similar to Access to e-resources within the NHS in England: the role and impact of organisational culture, information governance, and IT strategy

Social media applications within the NHS: role and impact of organisational c...
Social media applications within the NHS: role and impact of organisational c...Social media applications within the NHS: role and impact of organisational c...
Social media applications within the NHS: role and impact of organisational c...Catherine Ebenezer
 
Access to and use of Web 2.0 and social media applications within the NHS in ...
Access to and use of Web 2.0 and social media applications within the NHS in ...Access to and use of Web 2.0 and social media applications within the NHS in ...
Access to and use of Web 2.0 and social media applications within the NHS in ...ifuturesconf
 
Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...Catherine Ebenezer
 
Workforce Development for Social Care & Healthcare Staff Arising out of Teleh...
Workforce Development for Social Care & Healthcare Staff Arising out of Teleh...Workforce Development for Social Care & Healthcare Staff Arising out of Teleh...
Workforce Development for Social Care & Healthcare Staff Arising out of Teleh...CARER+ Project
 
Health information professionals and Artificial Intelligence
Health information professionals and Artificial IntelligenceHealth information professionals and Artificial Intelligence
Health information professionals and Artificial Intelligencecoxamcoxam
 
Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...
Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...
Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...Nawanan Theera-Ampornpunt
 
eHealth Services: How Library and Information Workers Can Make a Positive Con...
eHealth Services: How Library and Information Workers Can Make a Positive Con...eHealth Services: How Library and Information Workers Can Make a Positive Con...
eHealth Services: How Library and Information Workers Can Make a Positive Con...Self Employed
 
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...i_scienceEU
 
Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...
Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...
Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...Nawanan Theera-Ampornpunt
 
“Access denied”? Barriers for staff accessing, using and sharing published in...
“Access denied”? Barriers for staff accessing, using and sharing published in...“Access denied”? Barriers for staff accessing, using and sharing published in...
“Access denied”? Barriers for staff accessing, using and sharing published in...Catherine Ebenezer
 
The Challenges of Making Data Travel, by Sabina Leonelli
The Challenges of Making Data Travel, by Sabina LeonelliThe Challenges of Making Data Travel, by Sabina Leonelli
The Challenges of Making Data Travel, by Sabina LeonelliLEARN Project
 
You Are What You Tweet - Physicians, Professionalism, and Social Media
You Are What You Tweet - Physicians, Professionalism, and Social MediaYou Are What You Tweet - Physicians, Professionalism, and Social Media
You Are What You Tweet - Physicians, Professionalism, and Social MediaDavid Marcus
 
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)Hendrik Drachsler
 
eROSA Policy WS2: Second Stakeholder Workshop
eROSA Policy WS2: Second Stakeholder WorkshopeROSA Policy WS2: Second Stakeholder Workshop
eROSA Policy WS2: Second Stakeholder Workshope-ROSA
 

Similar to Access to e-resources within the NHS in England: the role and impact of organisational culture, information governance, and IT strategy (20)

Social media applications within the NHS: role and impact of organisational c...
Social media applications within the NHS: role and impact of organisational c...Social media applications within the NHS: role and impact of organisational c...
Social media applications within the NHS: role and impact of organisational c...
 
Access to and use of Web 2.0 and social media applications within the NHS in ...
Access to and use of Web 2.0 and social media applications within the NHS in ...Access to and use of Web 2.0 and social media applications within the NHS in ...
Access to and use of Web 2.0 and social media applications within the NHS in ...
 
Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...
 
Workforce Development for Social Care & Healthcare Staff Arising out of Teleh...
Workforce Development for Social Care & Healthcare Staff Arising out of Teleh...Workforce Development for Social Care & Healthcare Staff Arising out of Teleh...
Workforce Development for Social Care & Healthcare Staff Arising out of Teleh...
 
Health information professionals and Artificial Intelligence
Health information professionals and Artificial IntelligenceHealth information professionals and Artificial Intelligence
Health information professionals and Artificial Intelligence
 
Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...
Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...
Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...
 
eHealth Services: How Library and Information Workers Can Make a Positive Con...
eHealth Services: How Library and Information Workers Can Make a Positive Con...eHealth Services: How Library and Information Workers Can Make a Positive Con...
eHealth Services: How Library and Information Workers Can Make a Positive Con...
 
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
Lizzie Coles-Kemp, Royal Holloway University of London: Privacy Awareness: An...
 
Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...
Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...
Case Studies in Health IT Implementation & Sociotechnical Aspect of Health In...
 
“Access denied”? Barriers for staff accessing, using and sharing published in...
“Access denied”? Barriers for staff accessing, using and sharing published in...“Access denied”? Barriers for staff accessing, using and sharing published in...
“Access denied”? Barriers for staff accessing, using and sharing published in...
 
The Challenges of Making Data Travel, by Sabina Leonelli
The Challenges of Making Data Travel, by Sabina LeonelliThe Challenges of Making Data Travel, by Sabina Leonelli
The Challenges of Making Data Travel, by Sabina Leonelli
 
Roles and Direction of mHealth
Roles and Direction of mHealthRoles and Direction of mHealth
Roles and Direction of mHealth
 
You Are What You Tweet - Physicians, Professionalism, and Social Media
You Are What You Tweet - Physicians, Professionalism, and Social MediaYou Are What You Tweet - Physicians, Professionalism, and Social Media
You Are What You Tweet - Physicians, Professionalism, and Social Media
 
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
Ethics and Privacy in the Application of Learning Analytics (#EP4LA)
 
eROSA Policy WS2: Second Stakeholder Workshop
eROSA Policy WS2: Second Stakeholder WorkshopeROSA Policy WS2: Second Stakeholder Workshop
eROSA Policy WS2: Second Stakeholder Workshop
 
Irt
IrtIrt
Irt
 
Irt
IrtIrt
Irt
 
Irt
IrtIrt
Irt
 
Irt
IrtIrt
Irt
 
Irt
IrtIrt
Irt
 

More from Catherine Ebenezer

Access denied? Barriers for staff accessing, using and sharing published info...
Access denied? Barriers for staff accessing, using and sharing published info...Access denied? Barriers for staff accessing, using and sharing published info...
Access denied? Barriers for staff accessing, using and sharing published info...Catherine Ebenezer
 
Libraries, learning and information meeting the future needs of healthcare st...
Libraries, learning and information meeting the future needs of healthcare st...Libraries, learning and information meeting the future needs of healthcare st...
Libraries, learning and information meeting the future needs of healthcare st...Catherine Ebenezer
 
E-resources in Tees, Esk and Wear Valleys NHS Foundation Trust
E-resources in Tees, Esk and Wear Valleys NHS Foundation TrustE-resources in Tees, Esk and Wear Valleys NHS Foundation Trust
E-resources in Tees, Esk and Wear Valleys NHS Foundation TrustCatherine Ebenezer
 
Use of the SHALL online toolkit for impact assessment: TEWV LIS’s impact study
Use of the SHALL online toolkit for impact assessment: TEWV LIS’s impact studyUse of the SHALL online toolkit for impact assessment: TEWV LIS’s impact study
Use of the SHALL online toolkit for impact assessment: TEWV LIS’s impact studyCatherine Ebenezer
 
Embedding the Team Knowledge Officer role within clinical teams via a pilot c...
Embedding the Team Knowledge Officer role within clinical teams via a pilot c...Embedding the Team Knowledge Officer role within clinical teams via a pilot c...
Embedding the Team Knowledge Officer role within clinical teams via a pilot c...Catherine Ebenezer
 
Key developments in electronic delivery in LIS 2005-2008
Key developments in electronic delivery in LIS 2005-2008Key developments in electronic delivery in LIS 2005-2008
Key developments in electronic delivery in LIS 2005-2008Catherine Ebenezer
 
Knowledge management in mental health services: the role of NHS libraries
Knowledge management in mental health services: the role of NHS librariesKnowledge management in mental health services: the role of NHS libraries
Knowledge management in mental health services: the role of NHS librariesCatherine Ebenezer
 
Literature searching for research
Literature searching for researchLiterature searching for research
Literature searching for researchCatherine Ebenezer
 

More from Catherine Ebenezer (8)

Access denied? Barriers for staff accessing, using and sharing published info...
Access denied? Barriers for staff accessing, using and sharing published info...Access denied? Barriers for staff accessing, using and sharing published info...
Access denied? Barriers for staff accessing, using and sharing published info...
 
Libraries, learning and information meeting the future needs of healthcare st...
Libraries, learning and information meeting the future needs of healthcare st...Libraries, learning and information meeting the future needs of healthcare st...
Libraries, learning and information meeting the future needs of healthcare st...
 
E-resources in Tees, Esk and Wear Valleys NHS Foundation Trust
E-resources in Tees, Esk and Wear Valleys NHS Foundation TrustE-resources in Tees, Esk and Wear Valleys NHS Foundation Trust
E-resources in Tees, Esk and Wear Valleys NHS Foundation Trust
 
Use of the SHALL online toolkit for impact assessment: TEWV LIS’s impact study
Use of the SHALL online toolkit for impact assessment: TEWV LIS’s impact studyUse of the SHALL online toolkit for impact assessment: TEWV LIS’s impact study
Use of the SHALL online toolkit for impact assessment: TEWV LIS’s impact study
 
Embedding the Team Knowledge Officer role within clinical teams via a pilot c...
Embedding the Team Knowledge Officer role within clinical teams via a pilot c...Embedding the Team Knowledge Officer role within clinical teams via a pilot c...
Embedding the Team Knowledge Officer role within clinical teams via a pilot c...
 
Key developments in electronic delivery in LIS 2005-2008
Key developments in electronic delivery in LIS 2005-2008Key developments in electronic delivery in LIS 2005-2008
Key developments in electronic delivery in LIS 2005-2008
 
Knowledge management in mental health services: the role of NHS libraries
Knowledge management in mental health services: the role of NHS librariesKnowledge management in mental health services: the role of NHS libraries
Knowledge management in mental health services: the role of NHS libraries
 
Literature searching for research
Literature searching for researchLiterature searching for research
Literature searching for research
 

Recently uploaded

Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfHemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfMedicoseAcademics
 
Call Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Nandini 7001305949 Independent Escort Service BangaloreCall Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalorenarwatsonia7
 
Glomerular Filtration and determinants of glomerular filtration .pptx
Glomerular Filtration and  determinants of glomerular filtration .pptxGlomerular Filtration and  determinants of glomerular filtration .pptx
Glomerular Filtration and determinants of glomerular filtration .pptxDr.Nusrat Tariq
 
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceCollege Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceNehru place Escorts
 
Call Girls Service Chennai Jiya 7001305949 Independent Escort Service Chennai
Call Girls Service Chennai Jiya 7001305949 Independent Escort Service ChennaiCall Girls Service Chennai Jiya 7001305949 Independent Escort Service Chennai
Call Girls Service Chennai Jiya 7001305949 Independent Escort Service ChennaiNehru place Escorts
 
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...narwatsonia7
 
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service JaipurHigh Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipurparulsinha
 
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
call girls in munirka DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in munirka  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in munirka  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in munirka DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
call girls in green park DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in green park  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in green park  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in green park DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...Miss joya
 
Ahmedabad Call Girls CG Road 🔝9907093804 Short 1500 💋 Night 6000
Ahmedabad Call Girls CG Road 🔝9907093804  Short 1500  💋 Night 6000Ahmedabad Call Girls CG Road 🔝9907093804  Short 1500  💋 Night 6000
Ahmedabad Call Girls CG Road 🔝9907093804 Short 1500 💋 Night 6000aliya bhat
 
97111 47426 Call Girls In Delhi MUNIRKAA
97111 47426 Call Girls In Delhi MUNIRKAA97111 47426 Call Girls In Delhi MUNIRKAA
97111 47426 Call Girls In Delhi MUNIRKAAjennyeacort
 
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% SafeBangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safenarwatsonia7
 
Asthma Review - GINA guidelines summary 2024
Asthma Review - GINA guidelines summary 2024Asthma Review - GINA guidelines summary 2024
Asthma Review - GINA guidelines summary 2024Gabriel Guevara MD
 
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowKolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowNehru place Escorts
 
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...narwatsonia7
 
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbersBook Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbersnarwatsonia7
 

Recently uploaded (20)

Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
 
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfHemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
 
Call Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Nandini 7001305949 Independent Escort Service BangaloreCall Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
 
Glomerular Filtration and determinants of glomerular filtration .pptx
Glomerular Filtration and  determinants of glomerular filtration .pptxGlomerular Filtration and  determinants of glomerular filtration .pptx
Glomerular Filtration and determinants of glomerular filtration .pptx
 
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceCollege Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
 
Call Girls Service Chennai Jiya 7001305949 Independent Escort Service Chennai
Call Girls Service Chennai Jiya 7001305949 Independent Escort Service ChennaiCall Girls Service Chennai Jiya 7001305949 Independent Escort Service Chennai
Call Girls Service Chennai Jiya 7001305949 Independent Escort Service Chennai
 
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
 
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service JaipurHigh Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
 
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
 
call girls in munirka DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in munirka  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in munirka  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in munirka DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
call girls in green park DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in green park  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in green park  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in green park DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
 
Ahmedabad Call Girls CG Road 🔝9907093804 Short 1500 💋 Night 6000
Ahmedabad Call Girls CG Road 🔝9907093804  Short 1500  💋 Night 6000Ahmedabad Call Girls CG Road 🔝9907093804  Short 1500  💋 Night 6000
Ahmedabad Call Girls CG Road 🔝9907093804 Short 1500 💋 Night 6000
 
97111 47426 Call Girls In Delhi MUNIRKAA
97111 47426 Call Girls In Delhi MUNIRKAA97111 47426 Call Girls In Delhi MUNIRKAA
97111 47426 Call Girls In Delhi MUNIRKAA
 
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Servicesauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
 
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% SafeBangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
 
Asthma Review - GINA guidelines summary 2024
Asthma Review - GINA guidelines summary 2024Asthma Review - GINA guidelines summary 2024
Asthma Review - GINA guidelines summary 2024
 
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowKolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
 
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
 
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbersBook Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
 

Access to e-resources within the NHS in England: the role and impact of organisational culture, information governance, and IT strategy

  • 1. Access to e-resources within the NHS in England: the role and impact of organisational culture, information governance, and IT strategy Catherine Ebenezer Health Informatics Supervisor: Professor Peter Bath 02/10/13 1
  • 2. • Introduction and background • Literature review findings • Methodology and proposed methods • Research ethics and governance • Timescales and plan 2
  • 3. • LIS Manager in mental health NHS FT 2008-2012 • Variety of technological barriers / hindrances to information seeking, teaching and learning, clinical practice – ascribed variously to: • Information governance • Information security • IT infrastructure policies and practices • Blocking of ‘legitimate’ websites • Obstacles to use of particular content types and applications • Social media / Web 2.0 a particular problem • Implications? 3
  • 4. • Information governance (IG): (Cayton, 2006) • “The structures, policies and practice of the DH, the NHS and its suppliers to ensure the confidentiality and security of all records, and especially patient records, and to enable the ethical use of them for the benefit of individual patients and the public good”. • Information security (IS): (Anderson, 2003) • “A well-informed sense of assurance that information risks and controls are in balance.” 4
  • 5. Policy support in English NHS for evidence-based practice: • All NHS staff to have access to the evidence base of health care via the web (Information for health, 1998) • NHS Evidence (High quality health for all, 2008) • Evidence-based practice a pillar of clinical governance (NHS quality improvement system) • Health professions’ regulatory bodies set requirements for keeping up to date 5
  • 6. Strategic support in English NHS for e-learning: • Framework for technology-enhanced learning, 2011 • Establishment of governance structures • Development of content at national and local level • Facilities for checking suitability of local PC infrastructure • Much e-learning content also produced by HEIs, professional bodies • Wide range of delivery methods and content types • Role of NHS libraries 6
  • 7. • Information Governance Statement of Compliance (IGSoC) variously interpreted (Blenkinsopp, 2008) • NHS the locus of much teaching and research – not recognised? • IS policies and practices cf. organisational values • Dominance of IG agenda – narrow view of business need • Health and Social Care Information Centre (HSCIC) not communicating proactively to NHS staff • Web 2.0 and social media issues poorly understood –– access usually blocked within trust network perimeter • Inadequate input into trust IT and business planning processes by LIS, workforce development professionals 7
  • 8. • NHS-HE Forum and Connectivity Project • Commissioned report on educational use of social media from specialist - eventually published as: Lafferty, N. (2013). NHS-HE connectivity project: Web 2.0 and social media in education and research. London: NHS-HE Forum. At https://community.ja.net/groups/nhs-he-forum-connectivity-project • Strategic Health Authority Library Leads IT subgroup • Carried out survey of NHS library managers to map nature and extent of resource access problems (mid-2008) • Established centralised, regularly updated whitelist of websites “never to be blocked within the NHS” 8
  • 9. To investigate the possible relationship between stated policy regarding evidence-based practice and professional learning and the actual provision of computing facilities and IT security policy and practice within NHS trusts in England. More specifically: 1) the impacts that inadequate functionality and restrictions on access to information facilities have on professional information-seeking, learning and clinical practice 2) the practices, attitudes, values, and presuppositions of the relevant staff regarding information-seeking and business need which bear on how information security (i.e. of networks and devices) is implemented 9
  • 10. Main areas: • Information behaviour • Multi-professional studies • Doctors • Nurses • Health services managers • Others • Organisational culture and subcultures, IT staff subcultures • NHS information governance, information security • Risk management 10
  • 11. Leckie, Pettigrew and Sylvain (1996) model of (individual) professional information behaviour • Work roles and their associated tasks the primary motivation of information-seeking • Information-seeking shaped by variables relating to: 11 • Demographics • Organisational context • Frequency • Predictability • Sources – formal and informal • Source preferences • Awareness of sources • Perceived accessibility of sources • Familiarity • Timeliness • Previous successful use • Cost
  • 12. 12 Leckie, Pettigrew and Sylvain’s model of professional information behaviour From Leckie & Pettigrew, 1997, p. 100
  • 13. General findings • Wide variations by professional group in • Cultural attitudes to information-seeking • Access to and use of the Internet • Preferences for types of resources consulted • Overall moderate online information resource usage • Use of Google is ubiquitous • Obstacles to information-seeking frequently cited • Lack of time • Lack of training in conducting searches • Shortage of computer facilities (nurses) 13
  • 14. • Little agreement on definitions of organisational culture • “The way things are done around here” ??? • Schein’s account (1985, 1996) best known / widely cited within information security literature: • Organisational culture (OC) operates at three levels: • Deep tacit assumptions - invisible • Espoused values and the norms that derive from them – more recognisable, especially when challenged • Day-to-day behaviour and artifacts – visible, but often indecipherable 14
  • 15. • Definition of subculture: “A subset of an organization’s members that identify themselves as a distinct group within the organization and routinely take action on the basis of their unique collective understandings.” (Hatch, 2006) • May reflect shared professional or other identities • Can create “silos” and barriers to effective communication and teamwork • Occupational communities a particular type of occupational subculture (Van Maanen & Barley, 1982); • IT staff fulfil criteria (Duliba & Baroudi, 1991) • Differences among occupational subcultures can lead to organisational conflict and dysfunction (Trice, 1993) 15
  • 16. Occupational subgroups characterised by: • Consciousness of kind • Pervasiveness of norms • Abundance of cultural forms • Ethnocentrism and feelings of superiority towards other groups • Esoteric knowledge • Being subject to extreme demands • Complaints about members of other subcultures (Trice, 1993) 16
  • 17. • IT staff form a distinct occupational subculture - they displayed Trice’s (1993) characteristic signs (Guzman et al., 2004) • Feelings of superiority reinforced by the technical vocabulary of IT • Tendency to blame end-users for systems failures • Distrust / negative stereotyping of end-users: • “technophobic” • “difficult to communicate with” • “ignorant of technical priorities” • Desire to restrict end-user functionality in an effort to retain control of systems • Cf. “Users are the weakest link” (Schneier, 2000) 17
  • 18. • Web application security • Network perimeter and end-point security measures • Information governance and security within the NHS • Structures • Standards 18
  • 19. • Definitions of risk • No agreed definition! (Renn, 1998, cited by Joffe, 2003) • “The probability of an event combined with the magnitude of the losses and gains that it will entail” • “Danger from future damage” (Douglas, 1994) • Theories of risk / factors influencing risk assessment • Cultural hypothesis (Douglas & Wildavsky, 1982) • Social amplification of risk framework (Kasperson, 1988) • Risk perception and communication research within cognitive and social psychology (reviewed by Taylor-Gooby & Zinn, 2006) • Risk homeostasis theory (Wilde, 1998) • Social representation of risk theory (Moscovici, 1988) 19
  • 20. • Plan|Do|Check|Act cycle: Assess risks | treat risks | monitor and report risks | identify risks • Threat landscape is complex and evolving rapidly • Judgments in both qualitative and quantitative risk analysis methods are uncertain (Gerber & von Solms, 2005) -- therefore a subjective process • Relationships between risks, vulnerabilities, threats and security measures can be complex (Bojanc et al., 2012) • Trade-off between security and functionality (Besnard & Arief, 2004) • Precautionary in character and commercially driven (Stewart, 2004); attitudes subject to groupthink? (Rose, 2011) 20
  • 21. Rationale • Employers’ legal liability for: • Clogging of network bandwidth by non-work related use • Wasted staff time • Importance of acceptable use policies (AUPs) 21 • Hacking • Discrimination • Fraud • Breaches of the Data Protection Act • Possession and distribution of illegal pornography, other obscene or racially inflammatory material • Racial or sexual harassment • Defamation of managers, customers etc. • Copyright infringement, software piracy
  • 22. Technologies • Devices • Web security gateways, application proxy firewalls, deep packet inspection firewalls • Approaches • Labelling • Blacklisting / whitelisting • Content analysis / classification techniques • Evaluation methods • NB trade-off between percentages of true and false positives - i.e. over-blocking 22
  • 23. Impacts • Prince, Kass & Klaber (2010) survey: Medical e-resource availability (22 titles) in 37 NHS trusts • “Shouldn’t we be managing the risks more effectively in order to allow learners the freedom to use IT resources to better effect?” • “… of its nature intrusive and disruptive” (Gomez Hidalgo, 2009) • Denial of autonomy • Form of censorship – problem for librarians • Inaccurate – over-blocking / false positives • Problematic in respect of health information • Low staff morale – demotivation / alienation 23
  • 24. 24 77 57 51 69 35 25 11 9 0 10 20 30 40 50 60 70 80 90 Social networking applications Wikis and blogs Communication tools Discussion forums Webmail E-journals* E-books* Online databases % of trusts SHALL IT subgroup survey of NHS librarians (2008) *’core content’ or locally purchased Impacts
  • 25. Information behaviour • Heterogeneity between professions • Very little direct consideration of time frames or degrees of urgency in seeking information, though time factors frequently discussed indirectly • Information-seeking does not feature as an aspect of clinical or professional autonomy – no parallel with academic freedom • Technical obstacles to information-seeking nowhere discussed in sufficient detail to be informative • Link between negative attitudes to the Internet and to information- seeking and poor levels of access • “Cyber-bureaucrat” view of web use (Anandarajan et al., 2006) may be widespread and extend to all forms of use 25
  • 26. Organisational culture / information security / risk management • Very few studies directly addressing the research questions (Kolkowska, 2011, closest in aim and method) -- an exploratory approach is required • Many wider issues: • Management of information security risks: technical and organisational aspects • Strategic planning of NHS information technology • Organisational politics / subcultures / professional agendas • Values: organisational / professional / cultural • Cultural attitudes to information-seeking • Paradigmatic differences underlying concepts of risk 26
  • 27. 1. What is the current extent of information access problems? 2. To what extent is information seeking encouraged or supported as a legitimate component of professional work / as an aspect of professional autonomy and judgement? How does this relate to overall culture, values and priorities? 3. What approach is taken to the strategic management of information technology infrastructure? 4. How are risks managed that relate to the security of information technology, in the context of overall risk management? 5. What issues for the accessibility of information within the English NHS are posed by current approaches to IT infrastructure management and to information risk? 27
  • 28. Exploratory case study • Unit(s) of analysis • One or more NHS trusts • Methods • Semi-structured interviews with key informants (15+ per trust) • selected via purposive / snowball sampling • representing a variety of perspectives: • Library and information • Information governance • Network security and PC support • Human resources, workforce development • Communications 28
  • 29. Exploratory case study • Methods (cont’d) • Telephone interviews with representatives of information providers • Explore technical problems encountered in setting up access to e-resources for NHS customers • Documentary analysis • Policies and strategies: IT, LIS, workforce development, information governance, Internet AUP • Network topology / N3 connections / security devices • Q-methodology (if time allows) • Investigate further the attitudes of information security and information governance staff to online information-seeking • Q-sort statements previous interviews, literature review 29
  • 30. Exploratory case study • Assuring validity • Integration of methods/triangulation: multiple vantage points, comprehensiveness • Member checking of transcriptions and analysis • Need to develop: • Interview guide(s) • (Simple) data management plan • Field notes • Reflective diary (Simons, 2009; Thomas, 2011; Yin, 2009) • Data analysis • Framework analysis - a possible approach (Ritchie & Spencer, 1994) 30
  • 31. • NHS Research Ethics Committee approval not required • Does require local NHS trust research governance approval • Ethical issues are those of social research in general: • Efficacy of design • Excellent treatment of individuals • Transparency of process • Plausibility of products (Savin-Baden & Major, 2013) • Safeguard interests of interview respondents: • Data protection • Provide clear information about study • Fairly obtain and record informed consent • Manage data securely • Ensure anonymity of participants and organisation • Disseminate findings in accordance with copyright law • Information security a sensitive subject! 31
  • 32. Activity Deliverable September 2013 Develop methodology chapter Submit School ethics application Prepare for research presentation and viva Presentation October 2013 Submit ethics application to Information School Submit research governance application to NHS trust(s) research governance depts. Completed ethics application to Information School Ethics application paperwork for NHS trust research governance depts. First complete draft of literature review November 2013 Data collection and analysis – phase 1: Arrange interviews Develop interview guide Conduct interviews Transcribe interviews Analyse interview data First draft of methodology chapterDecember 2013 January 2014 February 2014 32
  • 33. Activity Deliverable June 2014 Write up chapter 4 Thesis chapter 4 July 2014 August 2014 Plan and design data collection phase 2September 2014 October 2014 November 2014 Submit ethics application (if required) December 2014 Data collection and analysis – phase 2: as indicated e.g. further interviews, Q-sort January 2015 February 2015 March 2015 April 2015 May 2015 Write up additions to chapter 4 June 2015 July 2015 Thesis draft to PB August 2015 Revising thesis draft September 2015 Submit thesis Thesis final draft 33
  • 35. • Anandarajan, M., Paravastu, N., & Simmers, C. A. (2006). Perceptions of personal web usage in the workplace: Q-methodology approach. CyberPsychology and Behavior, 9(3), 325–35. • Anderson, J. (2003). Why we need a new definition of information security. Computers and Security 22(4), 308-313. • Besnard, D., & Arief, B. (2004). Computer security impaired by legitimate users. Computers and Security, 23(3), 253–264. • Blenkinsopp, J. (2008). Bookmarks: web blocking – giving Big Brother a run for his money. He@lth Information on the Internet, (62), 2008. • Bojanc, R., Jerman-Blažič, B., & Tekavčič, M. (2012). Managing the investment in information security technology by use of a quantitative modeling. Information Processing and Management, 48(6), 1031–1052. • Cayton, H. (2006). Information governance in the Department of Health and the NHS. London: Care Record Development Board, Department of Health. • Darzi, A. (2008). High quality health for all: NHS Next Stage Review final report. London: Department of Health. • Department of Health. (2011). A framework for technology enhanced learning. London: Department of Health. • Douglas, M., & Wildavsky, A. B. (1983). Risk and culture: An essay on the selection of technological and environmental dangers. Berkeley and Los Angeles, CA: University of California Press. 35
  • 36. • Douglas, M. (1994). Risk and blame: essays in cultural theory. London: Routledge. • Duliba, K. A., & Baroudi, J. (1991). IS personnel: do they form an occupational community?. ACM SIGCPR Computer Personnel, 13(2), 24-35. • Elejabarrieta, F. (1994). Social positioning: a way to link social identity and social representations. Social Science Information, 33(2), 241–253. • Fidel, R., Pejtersen, A. M., Cleal, B., & Bruce, H. (2004). A multidimensional approach to the study of human-information interaction: a case study of collaborative information retrieval. Journal of the American Society for Information Science and Technology, 55(11) 939-953 • Gerber, M., & von Solms, R. (2005). Management of risk in the information age. Computers and Security, 24(1), 16–30. • Guzman, I. R., Stanton, J. M., Stam, K. R., Vijayasri, V., Yamodo, I., Zakaria, N., & Caldera, C. (2004). A qualitative study of the occupational subculture of information systems employees in organizations. In SIGMIS (Vol. 1). Tucson, AZ. • Hatch, M. J. (2006). Organization theory: modern, symbolic and postmodern perspectives (2nd ed.). New York: Oxford University Press. • Jasanoff, S. (1998). The political science of risk perception. Reliability Engineering & System Safety, 59(1), 91-99. • Kasperson, R. E., Renn, O., Slovic, P., Brown, H. S., Emel, J., Goble, R., … Ratick, S. (1988). The social amplification of risk: a conceptual framework. Risk Analysis, 8(2), 177–187. 36
  • 37. • Kolkowska, E. (2011). Security subcultures in an organization - exploring value conflicts. ECIS 2011 Proceedings. • Kummerow, E. H., & Innes, J. M. (1994). Social representations and the concept of organizational culture. Social Science Information, 33(2), 255–271. • Lafferty, N. (2013). NHS-HE connectivity project: Web 2.0 and social media in education and research. Retrieved from https://community.ja.net/groups/search/NHS-HE%2520forum • Leckie, G. J., Pettigrew, K. E., & Sylvain, C. (1996). Modeling the information seeking of professionals: a general model derived from research on engineers, health care professionals, and lawyers. The Library Quarterly, 66(2), 161–193. • Martin, J., Frost, P. J., & O’Neill, O. A. (2006). Organizational culture: beyond struggles for intellectual dominance. In S. R. Clegg, C. Hardy, T. B. Lawrence, & W. R. Nord (Eds.), The Sage handbook of organization studies (2nd ed., pp. 725–753). London: Sage. • Moscovici, S. (1988). Notes towards a description of social representations. European Journal of Social Psychology, 18, 211–250. • NHS Executive. (1998). Information for health: an information strategy for the modern NHS 1998- 2005. • Prince, N. J., Cass, H. D., & Klaber, R. E. (2010). Accessing e-learning and e-resources. Medical Education, 44(436-437). 37
  • 38. • Reddy, M. & Dourish, P. (2002). A finger on the pulse: temporal rhythms and information seeking in medical work. Proceedings of the Conference on Computer Supported Collaborative Work, 344-353. New Orleans, LA: ACM. • Resnick, P., Richardson, C., & Hansen, D. (2002). See no evil: how internet filters affect the search for online health information. Menlo Park, CA. Retrieved from www.kff.org • Resnick, P. J., Hansen, D. L., & Richardson, C. R. (2004). Calculating error rates for filtering software. Communications of the ACM, 47(9), 67-71 • Ritchie, J. & Spencer, E. (1994). Qualitative data analysis for applied policy research (pp. 173-194). In Bryman, A. & Burgess, R. G. (Ed.), Analyzing qualitative data. London: Routledge. • Rose, J. D. (2011). Diverse perspectives on the groupthink theory – a literary review. Emerging Leadership Journeys, 4(1), 37 – 57. • Savin-Baden, M., & Major, C. H. (2013). Qualitative research: the essential guide to theory and practice. London: Routledge. • Schein, E. H. (1985). Organizational culture and leadership. San Francisco, CA: Jossey-Bass. • Schein, E. H. (1996). Three cultures of management: the key to organizational learning. Sloan Management Review, 38(1), 9–20. • Simons, H. (2009). Case study research in practice. London: Sage 38
  • 39. • Stewart, A. (2004). On risk: perception and direction. Computers and Security, 23(5), 362– 370. • Taylor-Gooby, P., & Zinn, J. O. (2006). Current directions in risk research: new developments in psychology and sociology. Risk Analysis, 26(2), 397–411. • Technical Design Authority Group. (2008). TDAG survey of access to electronic resources in healthcare libraries. London: TDAG. • Thomas, G. (2011) How to do your case study. London: Sage. • Trice, H. M. (1993). Occupational subcultures in the workplace. Ithaca, NY: ILR Press. • Vaast, E. (2007). Danger is in the eye of the beholders: social representations of information systems security in healthcare. The Journal of Strategic Information Systems, 16(2), 130– 152. • Van Maanen, J., & Barley, S. R. (1982). Occupational communities: culture and control in organizations (Report no. TR-ONR-10). Cambridge, MA: Alfred P. Sloan School of Management. • Wilde, G. J. S. (1998). Risk homeostasis theory: an overview. Injury Prevention, 4, 89–91. • Yin, R. K. (2009). Case study research: design and methods (4th ed., Vol. 5). Thousand Oaks, CA: Sage. 39

Editor's Notes

  1. An investigation of the impacts within the English NHS of IT infrastructure planning and provision and of information governance and security policies upon professional learning and information seeking
  2. My library was part of a Medical Education and Development Department Barriers a source of much discussion and complaint When investigated informally they appeared to relate to a number of different organisational issues or factors Hindrances (discussed in more detail later) included Blocking of websites (including NHS ‘core content’ e-journals, union catalogues such as COPAC, official websites) Unable to download podcasts Some browser functionality disabled No sound cards on some PCs Unable to use some web conferencing applications Significant barriers thereby presented to: Information seeking to support clinical and management decision-making Teaching of students CPD and e-learning Networking with professional peers Clinical practice Consequences for quality of care?
  3. There seems to be some form of disconnect, if you like, between the realities of access – or lack of it – on the ground and stated NHS policy: Darzi review of 2008 stated the need for a single source of health care evidence – led to the establishment of NHS Evidence – previously NICE and National Library for Health were run separately The clinical governance system was established within the NHS in the late 1990s: . . . a framework through which NHS organisations are accountable for continually improving the quality of their services and safeguarding high standards of care by creating an environment in which excellence in clinical care will flourish (Donaldson and Gray, 1998). Regulatory bodies e.g. GMC, NMC, Health Professions Council
  4. Framework for technology-enhanced learning 2011 Establishment of governance structures nationally Strategy Board, Management Group, e-Learning Leads Development of content ,and of collections of content, at national and local level Facilities for checking suitability of local PC infrastructure NB role of NHS libraries Strategic input – facilitating access Athens administration – third-party authentication system used within NHS for e-content and by some providers Developing e-content User support
  5. While preparing the proposal for this research back in early 2012 when I was applying to the iSchool I formulated what I called “provisional observations” – they arose from reflecting on my experience of problems of access to e-resources as a librarian: Information Governance Statement of Compliance (IGSoC) open to different interpretations (Blenkinsopp, 2008) – security devolved to local trust level – his article followed a post on LIS-MEDICAL appealing for horror stories – led to the TDAG survey … NHS a teaching and research environment as well as a clinical one – information governance (IG) and information security (IS) do not recognise this – narrow perception of business need IS policies and practices not perceived or applied in any wider context of organisational values, e.g. trust, empowerment and support of staff, which may be formally stated, e.g. in staff compacts or statements of trust corporate values
  6. The NHS-Higher Education Connectivity Project aims to: Co-ordinate and support network connectivity between the NHS and Universities involved with education and research in medicine, nursing and professions allied to medicine. And it has as its objective: To achieve good inter-operability between NHS and Higher Education (HE) networks that enable secure anytime, anywhere access by medical, nursing and al lied profession students, clinical teachers and researchers Natalie Lafferty is a medical education specialist at the University of Dundee, with a particular interest in the use of social media with medical and health professions education - her report was several years in the gestation. whitelist of websites ‘never to be blocked within the NHS’ included e.g. royal colleges, publishers and aggregators, regulatory bodies, government websites relating to health – local LIS staff to suggest additions and pass list to local IT security staff
  7. More specifically: the impacts of inadequate functionality and restrictions on access to information resources and applications on professional information seeking within the NHS 2) the attitudes, presuppositions and practices of information governance, communications, human resources and technical staff which bear on how the security of networks and devices (PCs, laptops, and smartphones) is implemented within NHS trusts, particularly regarding information seeking and business need, in relation to overall organisational priorities and strategies.
  8. There seemed to be a need to look at information behaviour in detail, as without that I had very little idea of what health professionals’ actual information needs and patterns of information use were in the course of their practice. Anyone who works in the NHS runs up against professional tribalism in one form or another. It is also likely that they will have encountered problems of communication with their local IT support staff and managers. It seemed worthwhile to focus on organisational culture issues for that reason. I had also to acquaint myself with both the technical and the organisational aspects of information governance and security within the NHS – IS is managed as part of IG, and with the relevant general technical issues within IS One of the very few studies directly related to my topic (Prince et al. 2010), which I talk about later, had highlighted risk assessment with in the NHS as an issue and called for it to be improved. I also therefore had to look at risk management processes within IS and some of the social sciences literature on risk and risk perception
  9. As part of my reading in IB I looked for theoretical models that were relevant. I failed to find anything that was really useful other than LP&S; it is sometimes cited in health professionals’ IB studies. LP&S originally studied IB of engineers, health professional s and lawyers You can see here how they identify the variables relating to professional information seeking Limitations of LPS model: Does not address information behaviour of professionals working within groups Assumes relative autonomy of the professional within their organisation Not developed or superseded that I am aware of – though Madhu Reddy and his team at Pennsylvania State University have undertaken work on information behaviour within clinical teams – focusing on an intensive care unit, and Raya Fidel has studies collaborative information behaviour among engineers
  10. Can you see this? Diagram may not be very clear
  11. General findings Wide variations by professional group in access to and use of the Internet, preferences for types of resources consulted Overall moderate online information resource usage Usage of Google is high Obstacles to information-seeking frequently cited: Shortage of time to search Lack of training in conducting searches Lack of management support for information seeking Shortage of computer facilities Lack of information resources
  12. Little agreement on definitions of organisational culture – since little agreement on definitions of culture in social anthropology! Kroeber and Kluckhohn (1952) identified 152 definitions within the contemporary literature In my literature review I used Martin’s (2005, 2006) 3D-matrix typology of theoretical approaches : 1)integration, a differentiation or a fragmentation perspective. 2)“managerialist” or a critical theory perspective 3)quantitative or qualitative methods Schein’s theory: Work very readable Deep tacit assumptions - invisible Espoused values and the norms that derive from them – more recognisable, especially when challenged – ideologies, rationalisations, values, aspirations (Answer to ‘why are you doing what you are doing?’) May be mutually contradictory! Day-to-day behaviour and artifacts – structures and processes - visible, but often indecipherable e.g. policies, manuals, workplace layouts, dress codes, decision-making practices etc. (‘what is going on here?’)
  13. A subculture = “a subset of an organization’s members that identify themselves as a distinct group within the organization and routinely take action on the basis of their unique collective understandings” (Hatch, 2006, p. 176) Subcultures may reflect shared professional, gendered, racial, ethnic or occupational identities, national or regional cultural differences Can create ‘silos’ and barriers to effective communication and teamwork Occupational communities a particular type of (very strong, cohesive, pervasive) occupational subculture (Van Maanen and Barley, 1982) An occupational community is defined as "a group of people who consider themselves to be engaged in the same sort of work; whose identity is drawn from the work; who share with one another a set of values, norms and perspectives that apply to but extend beyond work related matters; and whose social relationships meld work and leisure Differences among occupational subcultures can lead to organisational conflict and dysfunction (Trice, 1993) – interesting to compare with accounts of inter-professional conflicts within the NHS, which may refer to tribes and tribalism (I was once sent on a course: “Communicating with your IT department”!)
  14. Insert your favourite subgroup here! Subcategories of Group Dimension Description Consciousness of kind The boundaries of an occupational culture are defined by members who see themselves in terms of their occupational role (Van-Maanen & Barley, 1984) and know what makes people either members or non-members of the community Pervasiveness Refers to the activities inside or outside the occupation for which the occupation sets the norms. Members of occupational communities extend their work relationships into their non-work lives because they prefer to be friends with their colleagues. Abundance of cultural forms Cultural forms reinforce meaning and motivate members of the culture to have beliefs that are in accordance with the occupation’s ideology (Douglas, 1982). A very rich culture will have unique language, many occupational heroes and stories, complex rites, and potent occupational associations that represent cohesiveness.
  15. Indira Guzman – teaches at Trident University International (U.S.- based online university) – has done work on infose c as well as aspects of the IT profession. Study was conducted in eight small to medium non-profit organisations. Schneier, 2000 – famous book about information security, Secrets and Lies
  16. Web application security Network perimeter and end-point security measures Information governance and security within the NHS Structures Health and Social Care Information Centre (HSCIC) Role of Information Commissioner’s Office (ICO) Standards NHS Information Security Management Code of Practice Information Governance Statement of Compliance (IGSoC) BS ISO/IEC 27001 HSCIC security guidance Practices in Information risk management BS ISO/IEC 27001 an information security management system (ISMS) standard
  17. Definitions of risk Theories of risk / factors influencing risk assessment Cultural hypothesis (Douglas & Wildavsky, 1982) Factual beliefs about risks/benefits of activity X are based on the cultural appraisal of X Different types of institutional setting each generate a characteristic set of general attitudes and values (cosmology / cultural bias) acting as filters in evaluating information Hierarchical organisations lean towards routine risk management procedures Social amplification of risk framework (Kasperson, 1988) Events pertaining to hazards interact with psychological, social, institutional and cultural processes in ways that can heighten or attenuate individual and social perceptions of risk Institutions can act as ‘Amplification stations’ Risk perception and communication research Judgments regarding risk are affected by Availability bias, Immediacy of effect, Loss aversion, Judged controllability, Voluntariness, Dread, Degree of organised safety Risk homeostasis theory (Wilde, 1998) First formulated in studies of road safety Individuals, groups and societies have an “inbuilt” level of risk that they are prepared to accept, such that increased risk exposure in one area will be compensated for by decreased exposure in another Social representation of risk theory (Moscovici, 1988) “Expert” versus “lay” knowledge Addresses complexity of meanings made of risks by individuals positioned within specified social contexts Social representations linked to: Social and professional identity (Elejabarrieta, 1994; Vaast, 2007) Organisational culture (Kummerow & Innes, 1994) Psychometric research on risk perception has frequently been invoked as evidence for a distinction between ‘actual’ risk as measured by experts and ‘perceived’ risk as experienced by laypersons. According to this view, perceived risk represents a distorted version of actual risk, shaped by the ignorance, prior beliefs, and subjective personal experiences of non-experts. The goal of risk perception research, it follows, is to illuminate the factors that account for deviations between ‘actual’ and ‘perceived’ risks. qualitative social and political analyses of risk perception question the validity of the actual/perceived dichotomy and suggest that all perceptions of risk, whether lay or expert, represent partial or selective views of the things and situations that threaten us.
  18. The main conclusions: In interests of security vendors to ‘talk up’ risks Also ‘talking up’ risks can help enable ISS managers to obtain funding for infosec products and systems. ISS managers feel the need to respond to an identified risk, however unlikely the event may be …. Andrews contends that their attitudes are subject to the phenomenon described as groupthink.
  19. model NHS AUP is based upon nature / purpose of activity pursued
  20. Technologies Web security gateways, application proxy firewalls, deep packet inspection (next-generation) firewalls WebSense WebMarshal Labelling, e.g. PICS (platform for internet content selection), POWDER (Protocol for Web Description Resource) Blacklisting / whitelisting Content analysis / classification techniques Image processing – skin detection to exclude pornography Keyword matching – primitive – no semantic awareness Automated text classification - most widely used approach Evaluation Precision and recall - precision (P) (proportion of items classified as positive that were really positive) and recall (R) (proportion of items classified as positive from the whole set of positive items). Or in terms of true positives / false positives / true negatives / false negatives An “ideal” filter that is totally error-free does not exist; moreover there is a trade-off between percentage of true positives and percentage of false positives. The ROC curve plots % of true +ves against % of false positives Experimental evaluations of web filtering systems rarely translate into real-world conditions (Gomez Hidalgo et al., 2009). Experimental evaluations in vivo e.g. Resnick et al., 2002, 2004 – found that increasing the sensitivity of blocks to objectionable material restricted access to health information
  21. Health information: Sexual health Child protection Forensic psychiatry Mental health – including sites accessed by patients
  22. Highly heterogeneous: wide variations between professions in attitudes to EBP and information-seeking Very little direct consideration of time frames or degrees of urgency in seeking information, though time factors frequently discussed indirectly – satisficing behaviour is frequently reported Reddy (2002) considers time in one of his studies – focuses on integration of information-seeking within other medical work - “Drawing on an ethnographic study of medical work, we explore the relationship between information and temporal coordination and discuss the role of temporal patterns or "rhythms" in providing individuals with the means to coordinate information and work”. Technical obstacles to information-seeking nowhere discussed in sufficient detail to be informative Link between negative attitudes to the Internet and to information-seeking and poor levels of access “Cyber-bureaucrat” view of web use (Anandarajan et al., 2006) may be widespread and extend to all forms of use Their sample a group of 25 managers, administrators and professionals in Philadelphia - classifies attitudes to personal web use also as ‘cyber-humanist’ and ‘cyber-adventurer’
  23. Realist models of risk privilege expert over lay discourse, constructivist ones generally do not (Jasanoff, 1998); discursive model emphasises role of professional languages (e.g. quantitative risk assessment, cost-benefit analysis) in shaping public perceptions – however these formal discourses constrain even the experts’ perceptions of risk. Policy improvement, therefore, is to be sought through criticism of the dominant discourse.
  24. The following issues should be taken into account: What types of site or resource are not accessible? Why is this? What impacts do these restrictions on access have on information seeking by clinicians, information professionals, students on placement, and others? Are there other obstacles to information access? How are computer desktops, including patches and updates, managed? What processes / procedures exist for resolving information access problems? How satisfactory are these in the experience of end-users? What is the prevailing operational definition of “evidence-based practice”? What approach is taken to the content and enforcement of Internet acceptable use policies? What balance between technical and organisational controls is thought to be optimal, and how does this relate to organisational culture? How is IT strategy determined? How does organisational information technology strategy align with overall business strategy? Who are the main stakeholders in IT strategy and business planning, and how are they engaged with its ongoing development? What differing stakeholder perspectives are involved? How do these stakeholders understand requirements for information seeking? What presuppositions do they hold about the nature of information, and regarding what constitutes the “core business” of the NHS? What organisational values do these express, or imply? What input do LIS, professional education and training functions have?
  25. Integration – to produce richer, more complete picture Q-sort was used by Edwards et al (2013) in their study of IB of health managers Framework analysis: Developed for applied policy research – short timeframe, diagnostic in character; can be seen as an applied policy issue, i.e.. can generate recommendations for improved practice in the management of e-resources within the NHS Auditable - offers clear idea of how conclusions have been arrived at Supported by Nvivo! Rigour and quality of research – from systematic and self-conscious research design, data collection, analysis and interpretation - Pope and Mays 2006
  26.  NHS Research Ethics Committee approval via the Integrated Research Application System (IRAS: https://www.myresearchproject.org.uk) will not be required for this research, since it does not involve patients in any way; this has been established via the Health Research Authority decision tree (http://www.hra-decisiontools.org.uk/ethics/). However, local research governance processes and possible research governance approval will need to be negotiated for each participating trust, which are likely to vary in complexity and required lead time. Information security a sensitive subject – may be difficult to recruit interview subjects, or difficult to establish an adequate level of trust with interview subjects , possibility of social desirability bias in responses; possibility of restrictions being placed on the use of the information made available to the researcher; considerable skill in negotiation may be required on the researcher’s part to address these problems (Kotulic & Clark, 2004).
  27. Most of litrev has already been submitted and has received feedback