scholarly journals South Carolina Nonprofit Policies and Procedures: Achieving Best Practices for NPOs of Different Sizes

2013 ◽  
Vol 3 (3) ◽  
Author(s):  
Karen A. Maguire
2009 ◽  
Vol 9 (1) ◽  
pp. 1850158 ◽  
Author(s):  
Mirela Gheorghe ◽  
Pavel Nastase ◽  
Dana Boldeanu ◽  
Aleca Ofelia

Relatively new in Romania, IT governance is defined as procedures and policies established in order to assure that the IT system of an organization sustains its goals and strategies. This bundle of policies and procedures, following the best practices in the area, intends to guide and control the IT function in order to add value to the organization and to minimize IT risks. The purpose of the research is to identify the measure in which the IT governance practices are implemented to the level of the financial institutions in Romania. The goal of this paper is a comparative analysis for implementing IT governance using data offered by the IT Governance Institute. This institute makes every year a study (IT Governance Global Status Report – 2006) to determine a sense of priorities and to develop actions for implementing IT governance, using data which acknowledges once more the need for all organizations to have tools and services to assure an efficient IT governance. In this way, the research will analyze, in the field of Romanian financial institutions, the most serious IT problems pointed out by the respondents from the last year, the most efficient measures considered by top management for resolving problems pointed out, the best used practices in IT governance and the most used frameworks for implementing IT governance practices.


Author(s):  
Aiping Chen-Gaffey

The rapid growth of electronic resources continues to challenge traditional methods of cataloging library collections, forcing a cataloging department to reevaluate its policies and procedures and implement changes. This chapter presents a case study of integrating vendor-supplied bibliographic records into a library catalog in order to provide timely and accurate catalog access to the library digital collections. The chapter discusses the benefits, issues, and challenges of batch manipulating and loading large record sets for these e-resources supplied by their vendors. It also describes the strategies and tools the bibliographic services staff has employed to solve the identified problems and improve the process. Further, it examines the effectiveness of the current e-record management policies and procedures. The chapter concludes with recommendation of solutions and a quest for future best practices in managing vendor-supplied records for e-resources.


2018 ◽  
Vol 23 (1) ◽  
pp. 33-41 ◽  
Author(s):  
Cailee E. Welch Bacon ◽  
Gary W. Cohen ◽  
Melissa C. Kay ◽  
Dayna K. Tierney ◽  
Tamara C. Valovich McLeod

Available financial and personnel resources often dictate the specifics of concussion policies and procedures in the secondary school setting. The purpose of this qualitative study was to explore athletic trainers’ perceived challenges toward comprehensive concussion management in the secondary school setting. The findings indicate several challenges exist toward concussion management in the secondary school, including facility, personnel, and community resources, education levels of various stakeholders, and general perceptions of concussion and athletic trainers. It is important to identify challenges athletic trainers may face in order to develop strategies to align current concussion management procedures with current best practices.


10.28945/4147 ◽  
2018 ◽  
Vol 14 ◽  
pp. 159-175 ◽  
Author(s):  
Angelos Rodafinos

Aim/Purpose: This paper presents some of the issues that academia faces in both the detection of plagiarism and the aftermath. The focus is on the latter, how academics and educational institutions around the world can address the challenges that follow the identification of an incident. The scope is to identify the need for and describe specific strategies to efficiently manage plagiarism incidents. Background: Plagiarism is possibly one of the major academic misconduct offences. Yet, only a portion of Higher Education Institutes (HEIs) appear to have well developed policies and procedures aimed at dealing with this issue or to follow these when required. Students who plagiarize and are not caught pose challenges for academia. Students who are caught pose equal challenges. Methodology: Following a literature review that identifies and describes the extent and the seriousness of the problem, procedures and strategies to address the issue are recommended, based on the literature and best practices. Contribution: The paper alerts academics regarding the need for the establishment of rigorous and standardized procedures to address the challenges that follow the identification of a plagiarism incident. It then describes how to streamline the process to improve consistency and reduce the errors and the effort required by academic staff. Recommendations for Practitioners: To ensure that what is expected to happen takes place, HEIs should structure the process of managing suspected plagiarism cases. Operationalization, workflow automation, diagrams that map the processes involved, clear in-formation and examples to support and help academics make informed and consistent decisions, templates to communicate with the offenders, and data-bases to record incidents for future reference are strongly recommended. Future research: This paper provides a good basis for further research that will examine the plagiarism policy, the procedures, and the outcome of employing the procedures within the faculties of a single HEI, or an empirical comparison of these across a group of HEIs. Impact on Society: Considering its potential consequences, educational institutions should strive to prevent, detect, and deter plagiarism – and any type of student misconduct. Inaction can be harmful, as it is likely that some students will not gain the appropriate knowledge that their chosen profession requires, which could put in danger both their wellbeing and the people they will later serve in their careers.


2021 ◽  
Vol 6 (1) ◽  
Author(s):  
Calantha Tllotson ◽  
Amy Ward

In this column, the authors will examine an innovative approach to library employee training, as well as reflect on their shared experience through the planning, implementing, and revising process. They will articulate the steps taken in development of a training model that uses a social work simulation lab to provide library employees with the opportunity to practice de-escalation techniques instantaneously with actors demonstrating a spectrum of authentic patron interactions, and experienced professionals, spanning librarianship and social work, providing immediate constructive feedback. To this end, the authors will contribute contemplative best practices for application of techniques relevant across the library discipline, as well as offering evidence of the strategies discussed informing progressive modifications to library-specific safety policies and procedures. The authors will also integrate suggested next steps, including complementary training opportunities based on mental health awareness and self-care.


Author(s):  
Haley S. Friedler ◽  
Michelle B. Leavy ◽  
Eric Bickelman ◽  
Barbara Casanova ◽  
Diana Clarke ◽  
...  

Executive Summary Patient registries are important tools for advancing research, improving healthcare quality, and supporting health policy. Registries contain vast amounts of data that could be used for new purposes when linked with other sources or shared with researchers. This toolkit was developed to summarize current best practices and provide information to assist registries interested in sharing data. The contents of this toolkit were developed based on review of the literature, existing registry practices, interviews with registries, and input from key stakeholders involved in the sharing of registry data. While some information in this toolkit may be relevant in other countries, this toolkit focuses on best practices for sharing data within the United States. Considerations related to data sharing differ across registries depending on the type of registry, registry purpose, funding source(s), and other factors; as such, this toolkit describes general best practices and considerations rather than providing specific recommendations. Finally, data sharing raises complex legal, regulatory, operational, and technical questions, and none of the information contained herein should be substituted for legal advice. The toolkit is organized into three sections: “Preparing to Share Data,” “Governance,” and “Procedures for Reviewing and Responding to Data Requests.” The section on “Preparing to Share Data” discusses the role of appropriate legal rights to further share the data and the need to follow all applicable ethical regulations. Registries should also prepare for data sharing activities by ensuring data are maintained appropriately and developing policies and procedures for governance and data sharing. The “Governance” section describes the role of governance in data sharing and outlines key governance tasks, including defining and staffing relevant oversight bodies; developing a data request process; reviewing data requests; and overseeing access to data by the requesting party. Governance structures vary based on the scope of data shared and registry resources. Lastly, the section on “Procedures for Reviewing and Responding to Data Requests” discusses the operational steps involved in sharing data. Policies and procedures for sharing data may depend on what types of data are available for sharing and with whom the data can be shared. Many registries develop a data request form for external researchers interested in using registry data. When reviewing requests, registries may consider whether the request aligns with the registry’s mission/purpose, the feasibility and merit of the proposed research, the qualifications of the requestor, and the necessary ethical and regulatory approvals, as well as administrative factors such as costs and timelines. Registries may require researchers to sign a data use agreement or other such contract to clearly define the terms and conditions of data use before providing access to the data in a secure manner. The toolkit concludes with a list of resources and appendices with supporting materials that registries may find helpful.


2017 ◽  
Vol 8 (1) ◽  
pp. 26-37 ◽  
Author(s):  
Christina K. Dimitriou

AbstractEcotourism has been described as the ideal kind of tourism, as it aims to conserve the natural, cultural and other tourist resources for continuous use for future generations whilst still bringing benefits to the present societies. Theoretically, it sounds so promising and attractive, but when it comes to its actual implementation, significant constraints bar the way to success. Various countries that attempted to foster sustainable development in their communities, either partially achieved their goals or their implementation totally lapsed. These fruitless efforts clearly reflect the huge gap that still exists between the theory and practice of ecotourism. The purpose of this paper is to fill this gap that seems to have been growing in recent years by explaining what has been done wrong and what specific policies and procedures could help bring a positive change. This paper aims to move from theory to practice and concentrate on how the implementation of ecotourism can be achieved properly and lead to success. The key factors responsible for failure are addressed, so they can be avoided and mistakes of the past will not be repeated. It also serves as a guide to more effective strategies of promoting ecotourism successfully around the world.


Author(s):  
David S. Strong ◽  
Warren Stiver

The NSERC Chairs in Design Engineering have developed a white paper on Engineering Design Competency. The Engineering Design Competency document was created to stimulate activity in engineering schools and provide a recommended knowledge and skills guideline for engineering educators. However, engineering schools and individual faculty face a number of barriers in their efforts to excel in engineering design education. To make progress, these barriers must be recognized and understood. This paper will provide a brief review and discussion of five leading barriers to the advancement of engineering design education. The barriers covered are: tenure and promotion policies and procedures, hiring practices, academic structure, funding, and facilities. These barriers are mutually supportive which compounds the challenge. The paper and presentation will also provide some examples of best practices in overcoming these barriers. The goal of these examples is to provide evidence that none of these barriers are absolute, that all can be overcome, and that some engineering schools are succeeding.


Sign in / Sign up

Export Citation Format

Share Document