Cargando…
Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study
BACKGROUND: A reoccurring finding from health and clinical services is the failure to implement theory and research into practice and policy in appropriate and efficient ways, which is why it is essential to develop and identify implementation strategies, as they constitute the how-to component of t...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
JMIR Publications
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6024106/ https://www.ncbi.nlm.nih.gov/pubmed/29903703 http://dx.doi.org/10.2196/10312 |
_version_ | 1783335996489728000 |
---|---|
author | Nielsen, Bettina Slinning, Kari Weie Oddli, Hanne Drozd, Filip |
author_facet | Nielsen, Bettina Slinning, Kari Weie Oddli, Hanne Drozd, Filip |
author_sort | Nielsen, Bettina |
collection | PubMed |
description | BACKGROUND: A reoccurring finding from health and clinical services is the failure to implement theory and research into practice and policy in appropriate and efficient ways, which is why it is essential to develop and identify implementation strategies, as they constitute the how-to component of translating and changing health practices. OBJECTIVE: The aim of this study was to provide a systematic and comprehensive review of the implementation strategies that have been applied for the Circle of Security-Virginia Family (COS-VF) model by developing an implementation protocol. METHODS: First, informal interviews and documents were analyzed using concept mapping to identify implementation strategies. All documentation from the Network for Infant Mental Health’s work with COS-VF was made available and included for analysis, and the participants were interviewed to validate the findings and add information not present in the archives. To avoid lack of clarity, an existing taxonomy of implementation strategies, the Expert Recommendations for Implementing Change, was used to conceptualize (ie, name and define) strategies. Second, the identified strategies were specified according to Proctor and colleagues’ recommendations for reporting in terms of seven dimensions: actor, the action, action targets, temporality, dose, implementation outcomes, and theoretical justification. This ensures a full description of the implementation strategies and how these should be used in practice. RESULTS: Ten implementation strategies were identified: (1) develop educational materials, (2) conduct ongoing training, (3) audit and feedback, (4) make training dynamic, (5) distribute educational materials, (6) mandate change, (7) obtain formal commitments, (8) centralize technical assistance, (9) create or change credentialing and licensure standards, and (10) organize clinician implementation team meetings. CONCLUSIONS: This protocol provides a systematic and comprehensive overview of the implementation of the COS-VF in health services. It constitutes a blueprint for the implementation of COS-VF that supports the interpretation of subsequent evaluation studies, facilitates knowledge transfer and reproducibility of research results in practice, and eases the replication and comparison of implementation strategies in COS-VF and other interventions. |
format | Online Article Text |
id | pubmed-6024106 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | JMIR Publications |
record_format | MEDLINE/PubMed |
spelling | pubmed-60241062018-07-05 Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study Nielsen, Bettina Slinning, Kari Weie Oddli, Hanne Drozd, Filip JMIR Res Protoc Original Paper BACKGROUND: A reoccurring finding from health and clinical services is the failure to implement theory and research into practice and policy in appropriate and efficient ways, which is why it is essential to develop and identify implementation strategies, as they constitute the how-to component of translating and changing health practices. OBJECTIVE: The aim of this study was to provide a systematic and comprehensive review of the implementation strategies that have been applied for the Circle of Security-Virginia Family (COS-VF) model by developing an implementation protocol. METHODS: First, informal interviews and documents were analyzed using concept mapping to identify implementation strategies. All documentation from the Network for Infant Mental Health’s work with COS-VF was made available and included for analysis, and the participants were interviewed to validate the findings and add information not present in the archives. To avoid lack of clarity, an existing taxonomy of implementation strategies, the Expert Recommendations for Implementing Change, was used to conceptualize (ie, name and define) strategies. Second, the identified strategies were specified according to Proctor and colleagues’ recommendations for reporting in terms of seven dimensions: actor, the action, action targets, temporality, dose, implementation outcomes, and theoretical justification. This ensures a full description of the implementation strategies and how these should be used in practice. RESULTS: Ten implementation strategies were identified: (1) develop educational materials, (2) conduct ongoing training, (3) audit and feedback, (4) make training dynamic, (5) distribute educational materials, (6) mandate change, (7) obtain formal commitments, (8) centralize technical assistance, (9) create or change credentialing and licensure standards, and (10) organize clinician implementation team meetings. CONCLUSIONS: This protocol provides a systematic and comprehensive overview of the implementation of the COS-VF in health services. It constitutes a blueprint for the implementation of COS-VF that supports the interpretation of subsequent evaluation studies, facilitates knowledge transfer and reproducibility of research results in practice, and eases the replication and comparison of implementation strategies in COS-VF and other interventions. JMIR Publications 2018-06-14 /pmc/articles/PMC6024106/ /pubmed/29903703 http://dx.doi.org/10.2196/10312 Text en ©Bettina Nielsen, Kari Slinning, Hanne Weie Oddli, Filip Drozd. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 14.06.2018. https://creativecommons.org/licenses/by/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Research Protocols, is properly cited. The complete bibliographic information, a link to the original publication on http://www.researchprotocols.org, as well as this copyright and license information must be included. |
spellingShingle | Original Paper Nielsen, Bettina Slinning, Kari Weie Oddli, Hanne Drozd, Filip Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study |
title | Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study |
title_full | Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study |
title_fullStr | Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study |
title_full_unstemmed | Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study |
title_short | Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study |
title_sort | identification of implementation strategies used for the circle of security-virginia family model intervention: concept mapping study |
topic | Original Paper |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6024106/ https://www.ncbi.nlm.nih.gov/pubmed/29903703 http://dx.doi.org/10.2196/10312 |
work_keys_str_mv | AT nielsenbettina identificationofimplementationstrategiesusedforthecircleofsecurityvirginiafamilymodelinterventionconceptmappingstudy AT slinningkari identificationofimplementationstrategiesusedforthecircleofsecurityvirginiafamilymodelinterventionconceptmappingstudy AT weieoddlihanne identificationofimplementationstrategiesusedforthecircleofsecurityvirginiafamilymodelinterventionconceptmappingstudy AT drozdfilip identificationofimplementationstrategiesusedforthecircleofsecurityvirginiafamilymodelinterventionconceptmappingstudy |