advisory groups
Recently Published Documents


TOTAL DOCUMENTS

190
(FIVE YEARS 58)

H-INDEX

14
(FIVE YEARS 3)

2021 ◽  
Vol 5 (Supplement_1) ◽  
pp. 151-151
Author(s):  
Rachel Lessem ◽  
Margaret Danilovich ◽  
Rebecca Berman

Abstract The Sage Resource Project aimed to broaden the pool of researchers who include the voice of older adults using long-term services and supports (LTSS) in research processes. We developed training to build researcher capacity to engage older adults through the development of Sage Model research advisory boards. Methods included training strategies for learning mode, design, duration, and emphasis of content that were informed by results of a researcher needs assessment and input from 2 older adult research advisory boards. Over 100 researchers registered for a 4-webinar series. All respondents to webinar evaluations (22) reported learning about topics that aligned with webinar objectives and had interest in engaging older adult stakeholders and/or developing an older adult research advisory board in the future. Representatives from five universities expressed interest attending online interactive workshops to build advisory boards. Lessons learned identify directions for research on best practices for developing older adult advisory groups.


2021 ◽  
pp. 168-181
Author(s):  
Deirdre Horgan ◽  
Shirley Martin
Keyword(s):  

2021 ◽  
Vol 16 (1) ◽  
Author(s):  
Jim McCambridge ◽  
Karl Atkin ◽  
Ranjita Dhital ◽  
Brent Foster ◽  
Brendan Gough ◽  
...  

Abstract Background Alcohol is challenging to discuss, and patients may be reluctant to disclose drinking partly because of concern about being judged. This report presents an overview of the development of a medications review intervention co-produced with the pharmacy profession and with patients, which breaks new ground by seeking to give appropriate attention to alcohol within these consultations. Methods This intervention was developed in a series of stages and refined through conceptual discussion, literature review, observational and interview studies, and consultations with advisory groups. In this study we reflect on this process, paying particular attention to the methods used, where lessons may inform innovations in other complex clinical consultations. Results Early work with patients and pharmacists infused the entire process with a heightened sense of the complexity of consultations in everyday practice, prompting careful deliberation on the implications for intervention development. This required the research team to be highly responsive to both co-production inputs and data gathered in formally conducted studies, and to be committed to working through the implications for intervention design. The intervention thus evolved significantly over time, with the greatest transformations resulting from patient and pharmacist co-design workshops in the second stage of the process, where pharmacists elaborated on the nature of the need for training in particular. The original research plans provided a helpful structure, and unanticipated issues for investigation emerged throughout the process. This underscored the need to engage dynamically with changing contexts and contents and to avoid rigid adherence to any early prescribed plan. Conclusions Alcohol interventions are complex and require careful developmental research. This can be a messy enterprise, which can nonetheless shed new insights into the challenges involved in optimising interventions, and how to meet them, if embraced with an attitude of openness to learning. We found that exposing our own research plans to scrutiny resulted in changes to the intervention design that gained the confidence of different stakeholders. Our understanding of the methods used, and their consequences, may be bounded by the person-centred nature of this particular intervention.


Author(s):  
Christopher Voegeli

An evaluation advisory group can be a vital resource, particularly for evaluations of collaboration-driven initiatives, but only if we apply skills and knowledge to use them effectively. In this paper, we will discuss the basics of evaluation advisory groups on four themes: purposes, structures, processes, and pitfalls. We will discuss insights from a review and synthesis of the evaluation advisory group literature and illustrate with our own real-world experiences of developing and implementing evaluation advisory groups on a national and state-wide scale, in a university setting, and within a localized health setting.


Author(s):  
Amanda Convery ◽  
Matt Kaufman ◽  
Terry D. Warfield

Successful standard-setting outcomes require some level of acceptance by diverse stakeholder groups. This study examines the evolution of FASB due process institutions since Enron, which have the potential to engender stakeholder acceptance. The prior literature on accounting standard-setting outcomes often focuses on the effects of individuals, organizations, or established due process institutions. Our study highlights the critical role played by recent due process institutions such as enhanced advisory groups, transition resource groups, field tests, and post-implementation reviews in contemporary standard-setting activity. Advisory groups, in particular, shift the balance of power within standard-setting to give a stronger voice to specific stakeholders (e.g., investors, not-for-profits, and private companies) and sometimes provide a recruiting network for future FASB members. We synthesize the growing importance these due process institutions have for effective standard-setting outcomes with the academic literature to identify areas for future research.


2021 ◽  
Vol 134 (17) ◽  

ABSTRACT Stephen Royle studied Biological Sciences at the University of Sheffield. He then pursued a PhD in the lab of Ruth Murrell-Lagnado at the University of Cambridge, UK, where he investigated the molecular mechanisms of P2X receptor trafficking. In 2002, he joined Leon Lagnado's group at the MRC Laboratory of Molecular Biology in Cambridge for his postdoc to work on synaptic vesicle endocytosis in neurons, and here he also discovered a novel mitotic function of clathrin. Steve set up his lab at the University of Liverpool in 2006, and in 2013 moved to the Centre for Mechanochemical Cell Biology, Warwick Medical School as a Senior Cancer Research UK Fellow; there he has been a Professor since 2019. The Royle lab is interested in understanding molecular mechanisms of membrane trafficking and mitosis. Steve is also on the Board of Directors of The Company of Biologists and the Advisory Groups of Journal of Cell Science and preLights. He is the recipient of the 2021 Hooke medal, established to recognize an emerging leader in cell biology.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1814
Author(s):  
Marta Chmiel ◽  
Mateusz Korona ◽  
Fryderyk Kozioł ◽  
Krzysztof Szczypiorski ◽  
Mariusz Rawski

The Internet of Things (IoT) is an emerging concept comprising a wide ecosystem of interconnected devices and services. These technologies collect, exchange and process data in order to dynamically adapt to a specific context. IoT is tightly bound to cyber-physical systems and, in this respect, has relevant security implications. A need for IoT security guidelines was identified by the industry in the early 2010s. While numerous institutions across the globe have proposed recommendations with a goal to help developers, distributors and users to ensure a secure IoT infrastructure, a strict set of regulations for IoT security is yet to be established. In this paper, we aim to provide an overview of security guidelines for IoT proposed by various organizations, and evaluate some of the existing technologies applied to ensure IoT security against these guidelines. We gathered recommendations proposed by selected government organizations, international associations and advisory groups, and compiled them into a set of the most common and important considerations, divided into eight categories. Then we chose a number of representative examples from IoT security technologies and evaluated them against these criteria. While none of the examined solutions fulfill all recommendations on their own, the existing technologies introduced by those solutions could be combined to create a design framework which satisfies all the requirements of a secure IoT device. Further research on this matter could be beneficial. To the best of our knowledge, this is the first comprehensive survey to evaluate different security technologies for IoT device security against the compilation of criteria based on existing guidelines.


2021 ◽  
Author(s):  
Michelle Chan ◽  
Shannon D. Scott ◽  
Alyson Campbell ◽  
Sarah A. Elliott ◽  
Hannah Brooks ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document