Cargando…

Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study

BACKGROUND: A reoccurring finding from health and clinical services is the failure to implement theory and research into practice and policy in appropriate and efficient ways, which is why it is essential to develop and identify implementation strategies, as they constitute the how-to component of t...

Descripción completa

Detalles Bibliográficos
Autores principales: Nielsen, Bettina, Slinning, Kari, Weie Oddli, Hanne, Drozd, Filip
Formato: Online Artículo Texto
Lenguaje:English
Publicado: JMIR Publications 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6024106/
https://www.ncbi.nlm.nih.gov/pubmed/29903703
http://dx.doi.org/10.2196/10312
_version_ 1783335996489728000
author Nielsen, Bettina
Slinning, Kari
Weie Oddli, Hanne
Drozd, Filip
author_facet Nielsen, Bettina
Slinning, Kari
Weie Oddli, Hanne
Drozd, Filip
author_sort Nielsen, Bettina
collection PubMed
description BACKGROUND: A reoccurring finding from health and clinical services is the failure to implement theory and research into practice and policy in appropriate and efficient ways, which is why it is essential to develop and identify implementation strategies, as they constitute the how-to component of translating and changing health practices. OBJECTIVE: The aim of this study was to provide a systematic and comprehensive review of the implementation strategies that have been applied for the Circle of Security-Virginia Family (COS-VF) model by developing an implementation protocol. METHODS: First, informal interviews and documents were analyzed using concept mapping to identify implementation strategies. All documentation from the Network for Infant Mental Health’s work with COS-VF was made available and included for analysis, and the participants were interviewed to validate the findings and add information not present in the archives. To avoid lack of clarity, an existing taxonomy of implementation strategies, the Expert Recommendations for Implementing Change, was used to conceptualize (ie, name and define) strategies. Second, the identified strategies were specified according to Proctor and colleagues’ recommendations for reporting in terms of seven dimensions: actor, the action, action targets, temporality, dose, implementation outcomes, and theoretical justification. This ensures a full description of the implementation strategies and how these should be used in practice. RESULTS: Ten implementation strategies were identified: (1) develop educational materials, (2) conduct ongoing training, (3) audit and feedback, (4) make training dynamic, (5) distribute educational materials, (6) mandate change, (7) obtain formal commitments, (8) centralize technical assistance, (9) create or change credentialing and licensure standards, and (10) organize clinician implementation team meetings. CONCLUSIONS: This protocol provides a systematic and comprehensive overview of the implementation of the COS-VF in health services. It constitutes a blueprint for the implementation of COS-VF that supports the interpretation of subsequent evaluation studies, facilitates knowledge transfer and reproducibility of research results in practice, and eases the replication and comparison of implementation strategies in COS-VF and other interventions.
format Online
Article
Text
id pubmed-6024106
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher JMIR Publications
record_format MEDLINE/PubMed
spelling pubmed-60241062018-07-05 Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study Nielsen, Bettina Slinning, Kari Weie Oddli, Hanne Drozd, Filip JMIR Res Protoc Original Paper BACKGROUND: A reoccurring finding from health and clinical services is the failure to implement theory and research into practice and policy in appropriate and efficient ways, which is why it is essential to develop and identify implementation strategies, as they constitute the how-to component of translating and changing health practices. OBJECTIVE: The aim of this study was to provide a systematic and comprehensive review of the implementation strategies that have been applied for the Circle of Security-Virginia Family (COS-VF) model by developing an implementation protocol. METHODS: First, informal interviews and documents were analyzed using concept mapping to identify implementation strategies. All documentation from the Network for Infant Mental Health’s work with COS-VF was made available and included for analysis, and the participants were interviewed to validate the findings and add information not present in the archives. To avoid lack of clarity, an existing taxonomy of implementation strategies, the Expert Recommendations for Implementing Change, was used to conceptualize (ie, name and define) strategies. Second, the identified strategies were specified according to Proctor and colleagues’ recommendations for reporting in terms of seven dimensions: actor, the action, action targets, temporality, dose, implementation outcomes, and theoretical justification. This ensures a full description of the implementation strategies and how these should be used in practice. RESULTS: Ten implementation strategies were identified: (1) develop educational materials, (2) conduct ongoing training, (3) audit and feedback, (4) make training dynamic, (5) distribute educational materials, (6) mandate change, (7) obtain formal commitments, (8) centralize technical assistance, (9) create or change credentialing and licensure standards, and (10) organize clinician implementation team meetings. CONCLUSIONS: This protocol provides a systematic and comprehensive overview of the implementation of the COS-VF in health services. It constitutes a blueprint for the implementation of COS-VF that supports the interpretation of subsequent evaluation studies, facilitates knowledge transfer and reproducibility of research results in practice, and eases the replication and comparison of implementation strategies in COS-VF and other interventions. JMIR Publications 2018-06-14 /pmc/articles/PMC6024106/ /pubmed/29903703 http://dx.doi.org/10.2196/10312 Text en ©Bettina Nielsen, Kari Slinning, Hanne Weie Oddli, Filip Drozd. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 14.06.2018. https://creativecommons.org/licenses/by/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Research Protocols, is properly cited. The complete bibliographic information, a link to the original publication on http://www.researchprotocols.org, as well as this copyright and license information must be included.
spellingShingle Original Paper
Nielsen, Bettina
Slinning, Kari
Weie Oddli, Hanne
Drozd, Filip
Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study
title Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study
title_full Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study
title_fullStr Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study
title_full_unstemmed Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study
title_short Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study
title_sort identification of implementation strategies used for the circle of security-virginia family model intervention: concept mapping study
topic Original Paper
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6024106/
https://www.ncbi.nlm.nih.gov/pubmed/29903703
http://dx.doi.org/10.2196/10312
work_keys_str_mv AT nielsenbettina identificationofimplementationstrategiesusedforthecircleofsecurityvirginiafamilymodelinterventionconceptmappingstudy
AT slinningkari identificationofimplementationstrategiesusedforthecircleofsecurityvirginiafamilymodelinterventionconceptmappingstudy
AT weieoddlihanne identificationofimplementationstrategiesusedforthecircleofsecurityvirginiafamilymodelinterventionconceptmappingstudy
AT drozdfilip identificationofimplementationstrategiesusedforthecircleofsecurityvirginiafamilymodelinterventionconceptmappingstudy