Objective To systematically review feedback from pharmacy users on their perceptions and experiences of health-related advice and services provided from community pharmacies.Methods The focus of the review was community pharmacy activities in relation to promoting health and well-being, preventing ill-health and maintaining health. Searches were conducted for peerreviewed (international) and non-peer-reviewed (UK) research. Electronic databases searched included MEDLINE, EMBASE, Cochrane Library and International Pharmaceutical Abstracts; hand searches of key journals and conference abstracts, key informants. Key informants in the UK were contacted to identify unpublished studies. The inclusion period was 1990 onwards.Data extraction and synthesis Data were abstracted into a matrix by one author with a sample checked by a second. The Health Development Agency's Evidence Base 2000 standards and the evidence categories used by the Department of Health in the National Service Frameworks were applied to each item.Main results Seven peer reviewed papers and 13 non-peer reviewed reports were identified for inclusion in the review. Consumer usage of pharmacies is almost universal with prescription supplies and purchase of over the counter medicines predominating. Evidence shows that not only is usage low for general health advice, but that pharmacists are perceived as Ôdrugs experts' rather than experts on health and illness. Emergency hormonal contraception and head lice management schemes have been well received. There is a need to consider privacy and confidentiality surrounding advice giving.
The peer-reviewed literature demonstrates the contribution of community pharmacy-based services to the reduction of risk behaviours and risk factors for CHD. The evidence supports the wider provision of smoking cessation and lipid management through community pharmacies. Health commissioners and planners can use the findings of this review to incorporate community pharmacy based health development activities into local health services. Further research is needed into the contribution of community pharmacy to disease detection and case finding as part of local public health strategies.
Objective To systematically review, summarise and evaluate the published evidence from 1990–2001 relating to pharmacists' attitudes towards and perceptions of their role in improving the public's health. Methods Electronic databases searched were MEDLINE, EMBASE, Cochrane Library and International Pharmaceutical Abstracts. Hand searches were undertaken of a number of relevant journals and conference abstracts. Studies on pharmacy and health education, health promotion, public health, smoking cessation, diet, body weight, and coronary heart disease were identified. All relevant studies with an English language abstract were included. Two of the authors separately examined the lists of titles and abstracts of papers from the searches and then compared inclusion/ exclusion lists and resolved any differences by discussion. Two approaches were used to assess the quality of the evidence and each study was allocated an evidence grade. Data were abstracted into a matrix and a narrative report constructed to synthesise the evidence. Key findings The search identified 12 studies (nine from the UK and three from other countries), all of which involved community pharmacists. Pharmacists attach a high degree of importance to health improvement activities. They are more comfortable with activities that are related to medicines and need support to extend their range of health‐related work. Pharmacists' advice is more likely to be reactive than proactive; their concerns about being “intrusive” in offering potentially unwelcome health advice predisposes to a reactive stance. While dispensing duties were widely reported by pharmacists as a key barrier to greater involvement in activities that improve the public's health, the review of the evidence showed that perceptions and attitudes are also key to pharmacists' behaviour in relation to these activities. Conclusion Community pharmacists' activities in improving the public's health centre around medicines. This is unsurprising, as dispensing and sale of medicines constitute a pharmacist's core business, and are the areas that they are perceived to be expert in and in which they have received the most training. If pharmacists are to contribute to wider public health activities, ways need to be found of extending their sphere of activity. The review findings have implications for those involved in education and training of pharmacists at undergraduate and postgraduate levels.
Our cybersecurity workforce needs surpass our ability to meet them. These needs could be mitigated by developing relevant curricula that prioritize the knowledge, skills, and abilities (KSAs) most important to cybersecurity jobs. To identify the KSAs needed for performing cybersecurity jobs, we administered survey interviews to 44 cyber professionals at the premier hacker conferences Black Hat 2016 and DEF CON 24. Questions concerned 32 KSAs related to cyber defense. Participants rated how important each KSA was to their job and indicated where they had learned that KSA. Fifteen of these KSAs were rated as being of higher-than-neutral importance. Participants also answered open-ended questions meant to uncover additional KSAs that are important to cyber-defense work. Overall, the data suggest that KSAs related to networks, vulnerabilities, programming, and interpersonal communication should be prioritized in cybersecurity curricula.
There is a growing need for cybersecurity professionals with the knowledge, skills and abilities (KSAs) necessary for risk and vulnerability analysis of security incidents. Currently, little is known about the relative importance of KSAs or tools used in vulnerability assessment and management, which leads to inefficiencies in education, personnel selection, and research. We interviewed 38 cybersecurity professionals to determine which KSAs are most important in Vulnerability Assessment and Management work. Of the 31 KSAs, 12 were rated as being significantly important to Vulnerability Assessment and Management work and indicate that four key areas should be prioritized in education, recruitment, and research: 1) knowledge of and skills in identifying vulnerabilities and robustness of systems and applications; 2) conceptual familiarity with classes of attacks and attack stages; 3) knowledge of and skills in penetration testing principles and tools; and 4) knowledge of network traffic and network protocols.
Purpose This study aims to examine how social engineers use persuasion principles during vishing attacks. Design/methodology/approach In total, 86 examples of real-world vishing attacks were found in articles and videos. Each example was coded to determine which persuasion principles were present in that attack and how they were implemented, i.e. what specific elements of the attack contributed to the presence of each persuasion principle. Findings Authority (A), social proof (S) and distraction (D) were the most widely used persuasion principles in vishing attacks, followed by liking, similarity and deception (L). These four persuasion principles occurred in a majority of vishing attacks, while commitment, reciprocation and consistency (C) did not. Further, certain sets of persuasion principles (i.e. authority, distraction, liking, similarity, and deception and social proof; , authority, commitment, reciprocation, and consistency, distraction, liking, similarity and deception, and social proof; and authority, distraction and social proof) were used more than others. It was noteworthy that despite their similarities, those sets of persuasion principles were implemented in different ways, and certain specific ways of implementing certain persuasion principles (e.g. vishers claiming to have authority over the victim) were quite rare. Originality/value To the best of authors’ knowledge, this study is the first to investigate how social engineers use persuasion principles during vishing attacks. As such, it provides important insight into how social engineers implement vishing attacks and lays a critical foundation for future research investigating the psychological aspects of vishing attacks. The present results have important implications for vishing countermeasures and education.
Objective To understand how aspects of vishing calls (phishing phone calls) influence perceived visher honesty. Background Little is understood about how targeted individuals behave during vishing attacks. According to truth-default theory, people assume others are being honest until something triggers their suspicion. We investigated whether that was true during vishing attacks. Methods Twenty-four participants read written descriptions of eight real-world vishing calls. Half included highly sensitive requests; the remainder included seemingly innocuous requests. Participants rated visher honesty at multiple points during conversations. Results Participants initially perceived vishers to be honest. Honesty ratings decreased before requests occurred. Honesty ratings decreased further in response to highly sensitive requests, but not seemingly innocuous requests. Honesty ratings recovered somewhat, but only after highly sensitive requests. Conclusions The present results revealed five important insights: (1) people begin vishing conversations in the truth-default state, (2) certain aspects of vishing conversations serve as triggers, (3) other aspects of vishing conversations do not serve as triggers, (4) in certain situations, people’s perceptions of visher honesty improve, and, more generally, (5) truth-default theory may be a useful tool for understanding how targeted individuals behave during vishing attacks. Application Those developing systems that help users deal with suspected vishing attacks or penetration testing plans should consider (1) targeted individuals’ truth-bias, (2) the influence of visher demeanor on the likelihood of deception detection, (3) the influence of fabricated situations surrounding vishing requests on the likelihood of deception detection, and (4) targeted individuals’ lack of concern about seemingly innocuous requests.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.