scholarly journals Safeguarding practice in England where access to an adult at risk is obstructed by a third party: findings from a survey

2017 ◽  
Vol 19 (6) ◽  
pp. 323-332 ◽  
Author(s):  
Jill Manthorpe ◽  
Martin Stevens ◽  
Stephen Martineau ◽  
Caroline Norrie

Purpose Being able to speak in private to an adult about whom there is a safeguarding concern is central to English local authorities’ duty under the Care Act 2014 to make enquiries in such cases. While there has been an on-going debate about whether social workers or others should have new powers to effect these enquiries, it has been unclear how common obstructive behaviour by third parties is and how often this causes serious problems or is unresolved. The purpose of this paper is to address this knowledge gap. Design/methodology/approach A survey of local authority adult safeguarding managers was conducted in 2016 and interviews were undertaken with managers and social workers in three local authorities. Data were analysed descriptively. Findings Estimates of numbers and frequency of cases of obstruction varied widely. Most survey respondents and interview participants described situations where there had been some problems in accessing an adult at risk. Those that were serious and long-standing problems of access were few in number, but were time consuming and often distressing for the professionals involved. Research limitations/implications Further survey research on the prevalence of obstructive behaviour of third parties may not command greater response rates unless there is a specific policy proposal or a case that has “hit the headlines”. Other forms of data collection and reporting may be worth considering. Interview data likewise potentially suffer from problems of recall and definition. Practical implications At times professionals will hear of, or encounter, difficulties in accessing an adult at risk about whom there is concern. Support from supervisors and managers is needed by practitioners as such cases can be distressing. Localities may wish to collect and reflect upon such cases so that there is learning from practice about possible resolution and outcomes. Social implications There is no evidence of large numbers of cases where access is denied or very difficult. Those cases where there are problems are memorable to practitioners. Small numbers of cases, however, do not necessarily mean that the problem of gaining access is insignificant. Originality/value This study addressed a question which is topical in England and provides evidence about the frequency of the problem of gaining access to adults at risk. There has been no comparable study in England.

2017 ◽  
Vol 19 (6) ◽  
pp. 312-322 ◽  
Author(s):  
Martin Stevens ◽  
Stephen Martineau ◽  
Jill Manthorpe ◽  
Caroline Norrie

Purpose The purpose of this paper is to explore debates about the powers social workers may need to undertake safeguarding enquiries where access to the adult is denied. Design/methodology/approach The paper takes as a starting point a scoping review of the literature undertaken as part of a study exploring social work responses to situations where they are prevented from speaking to an adult at risk by a third party. Findings A power of entry might be one solution to situations where social workers are prevented from accessing an adult at risk. The paper focuses on the Scottish approach to legal powers in adult safeguarding, established by the Adult Support and Protection Act (Scotland) 2007 and draws out messages for adult safeguarding in England and elsewhere. The literature review identified that debates over the Scottish approach are underpinned by differing conceptualisations of vulnerability, autonomy and privacy, and the paper relates these conceptualisations to different theoretical stances. Social implications The paper concludes that the literature suggests that a more socially mediated rather than an essentialist understanding of the concepts of vulnerability, autonomy and privacy allows for more nuanced approaches to social work practice in respect of using powers of entry and intervention with adults at risk who have capacity to make decisions. Originality/value This paper provides a novel perspective on debates over how to overcome challenges to accessing adults at risk in adult safeguarding through an exploration of understandings of vulnerability, privacy and autonomy.


2016 ◽  
Vol 18 (5) ◽  
pp. 256-265 ◽  
Author(s):  
Caroline Norrie ◽  
Jill Manthorpe ◽  
Stephen Martineau ◽  
Martin Stevens

Purpose Whether social workers should have a power of entry in cases where individuals seem to be hindering safeguarding enquiries for community-dwelling adults at risk is a topical question in England. The purpose of this paper is to present the findings of a re-examination of relevant sections of the 2012 Government Safeguarding Power of Entry Consultation. Design/methodology/approach Re-analysis of responses to question three of the 2012 Government’s Safeguarding Power of Entry Consultation was undertaken in late 2015-early 2016. The consultation submissions were located and searched for information on views of the prevalence of the situations where access to an adult at risk (with decision-making capacity) is being hindered by a third party and the nature of examples where a new power of entry might be considered appropriate by consultation respondents. Findings The majority of respondents to the consultation generally reported that situations when a new power of entry would be required were not encountered regularly; however a minority of respondents stated these situations occurred more frequently. Examples of situations where third parties appeared to be hindering access were given across the different categories of adults at risk and types of abuse and current practices were described. Respondents observed that the risks of excessive or inappropriate use of any new powers needed to be considered carefully. Originality/value This re-analysis sheds light on the prevalence and circumstances of the problems encountered about access to adults at risk. The legal framework of adult safeguarding continues to be of interest to policy makers, researchers and practitioners.


Kybernetes ◽  
2018 ◽  
Vol 47 (5) ◽  
pp. 854-872 ◽  
Author(s):  
Kaiying Cao ◽  
Qiushi Bo ◽  
Yi He

Purpose This paper aims to study whether the recycling of a third party competes with the trade-in service of a manufacturer, and explores the optimal trade-in and third-party collection authorization strategies for the manufacturer. Design/methodology/approach According to whether to authorize a third party to collect its used products, the manufacturer has two choices: one is not authorization (NA); the other is authorization (A). This paper uses profit-maximization model to investigate the optimal decisions of the manufacturer and the third party under NA and A, respectively, and then explores which choice is better for the manufacturer. Findings It is observed that there is a competition between trade-in service and third-party recycling when the durability parameter of the used product is relatively small. Moreover, when the durability parameter of the used product is relatively large, A is always better choice for the manufacturer; otherwise, NA is a better choice except for the case that the unit trade-in subsidy is low and the salvage of the used product is high. Practical implications These results provide managerial insights for the manufacturer and the third party to make decisions in the field of recycling. Originality/value This paper is among the first papers to study the competition between trade-in program and third party’s collecting program under government’s trade-in subsidy policy. Moreover, this paper presents the conditions under which the manufacturer should authorize or not authorize the third party to collect its used products.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Lita – Dharmayuni ◽  
Lita – Dharmayuni

Purpose This study aims to look at how the intention of a person when facing a dilemma to choose a good outcome (utilitarian) or a good and ethical process regardless of the outcome (deontological) by raising the case of PT. Asuransi Jiwasraya (Jiwasraya). Design/methodology/approach This study was conducted using a literature study method where researchers will analyze through previous research and news related to ethics, psychology and Jiwasraya cases. Findings In the Jiwasraya case, it can be said that the deontology principle has been violated, but the utilitarian principle also cannot provide benefits to the parties who should benefit, namely, the premium payers and the owners of third parties funds. In terms of intentions, at first, Jiwasraya’s management may intend to save and provide benefits to customers and the public who deposit funds at Jiwasraya (utilitarian principle). However, over time, managers choose to “allow” conditions to occur and even begin to engage in activities to take advantage of certain parties and groups by taking policies that are not by the rules (violating deontological principles) for personal gain. Research limitations/implications This study only discusses the Jiwasraya case through financial and accounting reports. Future studies can continue this research by looking at the Jiwasraya case through the law and legislation to obtain a complete picture. Practical implications With this research, it is hoped that the authors can better understand that the dilemma the author faces is rooted in the limitations of the abilities as humans; the ethics will influence all intentions for the choices the authors make. Originality/value This research uses case studies that occurred in Indonesia, the discussion is carried out using a utilitarian and deontological approach that has never been discussed regarding the Jiwasraya case before.


2019 ◽  
Vol 74 (4) ◽  
pp. 915-929 ◽  
Author(s):  
Pramod Sharma ◽  
Jogendra Kumar Nayak

PurposeThis paper aims to examine the direct and indirect effects of tourists’ value on satisfaction and loyalty intentions in dark tourism.Design/methodology/approachThis research was conducted using the data collected through a questionnaire survey from 403 tourists visiting a dark tourism destination in India. Data were analyzed using CFA and SPSS macro (Process).FindingsThe findings confirmed that tourists’ values have significant direct and indirect effects on loyalty intentions via satisfaction in dark tourism. Among specific value, the strongest direct and indirect influence of emotional value in dark tourism is the unique finding of this research.Practical implicationsThis study would help the marketers, government, local authorities and relevant stakeholders operating in dark tourism to formulate policies and strategies to better serve this niche tourism.Originality/valueThis research is the first-known attempt to reveal the uniqueness of tourists’ perception of value in dark tourism. It could significantly add to the literature and practice of dark tourism.


2017 ◽  
Vol 19 (2) ◽  
pp. 78-91 ◽  
Author(s):  
Sarah P. Lonbay ◽  
Toby Brandon

Purpose The increased involvement of adults at risk in the safeguarding process has become a prominent issue within English safeguarding policy. However, there is evidence to suggest that actual levels of involvement are still low. The purpose of this paper is to present findings from a PhD study in relation to the benefits of advocacy in supporting this involvement in adult safeguarding for older people. Design/methodology/approach Participants in the study included advocates and social workers who had experience of working with older people through the safeguarding process within two North East England local authorities. A critical realist approach through in-depth interviews was taken with all the participants. Findings The research findings in relation to the benefits of advocacy in supporting older people going through safeguarding processes are reported. The practical limitations and factors which help and hinder advocacy support within the process are also considered. The theoretical implications for power, empowerment, and advocacy are also explored. Research limitations/implications A key limitation of this research is that it did not include older people who had been through safeguarding amongst the participants. Practical implications Key implications for practice and policy are discussed. Originality/value The paper provides an overview and critique of empowerment in adult safeguarding and the role that advocates play in promoting this key principle.


2020 ◽  
Vol 123 (1) ◽  
pp. 159-175
Author(s):  
Alberto Mazzoleni ◽  
Enrica Pollonini

PurposeWe developed a model to demonstrate how multiple interrelated aspects of a firm influence its recourse to third-party financing, which frequently depends on the characteristics of each food production chain.Design/methodology/approachWe conducted an empirical research on a relevant sample of small- and medium-sized Italian dairy firms. Our research methodology is inspired by the grounded theory (Glaser and Strauss, 1967).FindingsOur findings illustrated that firm indebtedness is the result of intertwined variables, linked to different firm dimensions, including growth, financial structure and economic dynamics.Research limitations/implicationsA portion of the analysed phenomenon is not explained using the sample and econometric tools.Practical implicationsThere are practical implications for the decision-makers in a firm (in particular, the managers and the shareholders) as the model allows to evaluate the influence of a set of mutually interdependent firm variables for the indebtedness level.Originality/valueFirst, we considered the recourse to third-party financing within the context of the systems theory (Millová and Blatný, 2015) and from the perspective of linked causes and mutually connected variables. Second, our research focussed on a well-defined food chain and on features of firms operating in this context. Last, our model considered the impact of the recent economic crisis, which motivated us to review the existing models.


2015 ◽  
Vol 31 (2) ◽  
pp. 13-15

Purpose – This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies. Design/methodology/approach – This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context. Findings – The justification of the super wealthy for being, well, super wealthy, is that there is a “trickle down effect” that benefits us mere mortals. This effect supposedly sees the rich and famous spend their hard-earned cash on goods and services supplied by the great unwashed, and invest in companies and projects that require large numbers of people to be gainfully employed. If it was not for such benevolence, presumably the authors would see long lines of people snaking round the block from job centres like the darkest days of the 1980s. Practical implications – This paper provides strategic insights and practical thinking that have influenced some of the world’s leading organizations. Originality/value – This briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.


2019 ◽  
Vol 6 (1) ◽  
pp. 35-48
Author(s):  
Cassandra Cross

Purpose The purpose of this paper is to examine the discourses surrounding accountability as it relates to fraud victimisation. Design/methodology/approach This paper is based upon interviews with 31 professionals across the fraud justice network (FJN) in the UK and Canada. Findings The paper highlights the complexities that surround participant’s perspectives of liability when it comes to fraud. Professionals articulated responsibility falling across the spectrum of victims, offenders and third parties. Further, it is evident that perspectives of accountability are largely influenced by the various types of frauds that exist and the ways in which victims incur losses. Research limitations/implications Interviews with selected FJN professionals may not be representative of those across the broader sector in each country. Despite this, there was still a diversity in views which highlights the tensions that currently exist as to where accountability is positioned. Practical implications The findings clearly indicate that accountability is not directed at any one party, rather there appears to be an interplay across offenders, victims and third parties. While the offender is arguably the one who should be held most accountable for their actions, a lack of official responses to fraud offending means that the offender is largely invisible. For those who place accountability on the victim, there is evidence of neoliberal discourses that argue for prudential citizens, or those who take responsibility for their own actions. This is in contrast to those who believed that victims could not be held accountable for actions beyond their control, and instead third parties were accountable, and should increase their role in education and awareness. Originality/value This paper articulates the discourses of accountability that exist for fraud, and how the current thinking can contribute to interactions with victims, as well as current responses to victimisation. Further work is required to better identify the criteria against which victims are being held accountable, as well as better understand who bears responsibility with responses to fraud victimisation.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Hedaia-t-Allah Nabil Abd Al Ghaffar

Purpose The purpose of this paper is to try to reach the main factors that could put national security at risk as a result of government cloud computing programs. Design/methodology/approach The paper adopts the analytical approach to first lay foundations of the relation between national security, cybersecurity and cloud computing, then it moves to analyze the main vulnerabilities that could affect national security in cases of government cloud computing usage. Findings The paper reached several findings such as the relation between cybersecurity and national security as well as a group of factors that may affect national security when governments shift to cloud computing mainly pertaining to storing data over the internet, the involvement of a third party, the lack of clear regulatory frameworks inside and between countries. Practical implications Governments are continuously working on developing their digital capacities to meet citizens’ demands. One of the most trending technologies adopted by governments is “cloud computing”, because of the tremendous advantages that the technology provides; such as huge cost-cutting, huge storage and computing capabilities. However, shifting to cloud computing raises a lot of security concerns. Originality/value The value of the paper resides in the novelty of the topic, which is a new contribution to the theoretical literature on relations between new technologies and national security. It is empirically important as well to help governments stay safe while enjoying the advantages of cloud computing.


Sign in / Sign up

Export Citation Format

Share Document