Hide metadata

dc.date.accessioned2019-12-19T20:21:02Z
dc.date.available2019-12-19T20:21:02Z
dc.date.created2018-06-15T06:44:01Z
dc.date.issued2018
dc.identifier.citationNielsen, Bettina Slinning, Kari Oddli, Hanne Drozd, Filip . Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study. JMIR Research Protocols. 2018, 7(6), 1-13
dc.identifier.urihttp://hdl.handle.net/10852/71790
dc.description.abstractBackground: A reoccurring finding from health and clinical services is the failure to implement theory and research into practice and policy in appropriate and efficient ways, which is why it is essential to develop and identify implementation strategies, as they constitute the how-to component of translating and changing health practices. Objective: The aim of this study was to provide a systematic and comprehensive review of the implementation strategies that have been applied for the Circle of Security-Virginia Family (COS-VF) model by developing an implementation protocol. Methods: First, informal interviews and documents were analyzed using concept mapping to identify implementation strategies. All documentation from the Network for Infant Mental Health’s work with COS-VF was made available and included for analysis, and the participants were interviewed to validate the findings and add information not present in the archives. To avoid lack of clarity, an existing taxonomy of implementation strategies, the Expert Recommendations for Implementing Change, was used to conceptualize (ie, name and define) strategies. Second, the identified strategies were specified according to Proctor and colleagues’ recommendations for reporting in terms of seven dimensions: actor, the action, action targets, temporality, dose, implementation outcomes, and theoretical justification. This ensures a full description of the implementation strategies and how these should be used in practice. Results: Ten implementation strategies were identified: (1) develop educational materials, (2) conduct ongoing training, (3) audit and feedback, (4) make training dynamic, (5) distribute educational materials, (6) mandate change, (7) obtain formal commitments, (8) centralize technical assistance, (9) create or change credentialing and licensure standards, and (10) organize clinician implementation team meetings. Conclusions: This protocol provides a systematic and comprehensive overview of the implementation of the COS-VF in health services. It constitutes a blueprint for the implementation of COS-VF that supports the interpretation of subsequent evaluation studies, facilitates knowledge transfer and reproducibility of research results in practice, and eases the replication and comparison of implementation strategies in COS-VF and other interventions.
dc.description.abstractIdentification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study
dc.languageEN
dc.rightsAttribution 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.titleIdentification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study
dc.typeJournal article
dc.creator.authorNielsen, Bettina
dc.creator.authorSlinning, Kari
dc.creator.authorOddli, Hanne
dc.creator.authorDrozd, Filip
cristin.unitcode185,17,5,0
cristin.unitnamePsykologisk institutt
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1
dc.identifier.cristin1591347
dc.identifier.bibliographiccitationinfo:ofi/fmt:kev:mtx:ctx&ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.jtitle=JMIR Research Protocols&rft.volume=7&rft.spage=1&rft.date=2018
dc.identifier.jtitleJMIR Research Protocols
dc.identifier.volume7
dc.identifier.issue6
dc.identifier.startpage1
dc.identifier.endpage13
dc.identifier.doihttps://doi.org/10.2196/10312
dc.identifier.urnURN:NBN:no-74906
dc.type.documentTidsskriftartikkel
dc.type.peerreviewedPeer reviewed
dc.source.issn1929-0748
dc.identifier.fulltextFulltext https://www.duo.uio.no/bitstream/handle/10852/71790/1/fdf11de3-7d69-4071-8b87-e84b5a5cec22.pdf
dc.type.versionPublishedVersion
cristin.articleide10312


Files in this item

Appears in the following Collection

Hide metadata

Attribution 4.0 International
This item's license is: Attribution 4.0 International