Maintenance Notice

Due to necessary scheduled maintenance, the JMIR Publications website will be unavailable from Wednesday, July 01, 2020 at 8:00 PM to 10:00 PM EST. We apologize in advance for any inconvenience this may cause you.

Who will be affected?

Accepted for/Published in: JMIR Research Protocols

Date Submitted: Mar 6, 2018
Open Peer Review Period: Mar 8, 2018 - Apr 26, 2018
Date Accepted: Apr 26, 2018
(closed for review but you can still tweet)

The final, peer-reviewed published version of this preprint can be found here:

Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study

Nielsen B, Slinning K, Weie Oddli H, Drozd F

Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study

JMIR Res Protoc 2018;7(6):e10312

DOI: 10.2196/10312

PMID: 29903703

PMCID: 6024106

Warning: This is an author submission that is not peer-reviewed or edited. Preprints - unless they show as "accepted" - should not be relied on to guide clinical practice or health-related behavior and should not be reported in news media as established information.

Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study

  • Bettina Nielsen; 
  • Kari Slinning; 
  • Hanne Weie Oddli; 
  • Filip Drozd

Background:

A reoccurring finding from health and clinical services is the failure to implement theory and research into practice and policy in appropriate and efficient ways, which is why it is essential to develop and identify implementation strategies, as they constitute the how-to component of translating and changing health practices.

Objective:

The aim of this study was to provide a systematic and comprehensive review of the implementation strategies that have been applied for the Circle of Security-Virginia Family (COS-VF) model by developing an implementation protocol.

Methods:

First, informal interviews and documents were analyzed using concept mapping to identify implementation strategies. All documentation from the Network for Infant Mental Health’s work with COS-VF was made available and included for analysis, and the participants were interviewed to validate the findings and add information not present in the archives. To avoid lack of clarity, an existing taxonomy of implementation strategies, the Expert Recommendations for Implementing Change, was used to conceptualize (ie, name and define) strategies. Second, the identified strategies were specified according to Proctor and colleagues’ recommendations for reporting in terms of seven dimensions: actor, the action, action targets, temporality, dose, implementation outcomes, and theoretical justification. This ensures a full description of the implementation strategies and how these should be used in practice.

Results:

Ten implementation strategies were identified: (1) develop educational materials, (2) conduct ongoing training, (3) audit and feedback, (4) make training dynamic, (5) distribute educational materials, (6) mandate change, (7) obtain formal commitments, (8) centralize technical assistance, (9) create or change credentialing and licensure standards, and (10) organize clinician implementation team meetings.

Conclusions:

This protocol provides a systematic and comprehensive overview of the implementation of the COS-VF in health services. It constitutes a blueprint for the implementation of COS-VF that supports the interpretation of subsequent evaluation studies, facilitates knowledge transfer and reproducibility of research results in practice, and eases the replication and comparison of implementation strategies in COS-VF and other interventions.


 Citation

Please cite as:

Nielsen B, Slinning K, Weie Oddli H, Drozd F

Identification of Implementation Strategies Used for the Circle of Security-Virginia Family Model Intervention: Concept Mapping Study

JMIR Res Protoc 2018;7(6):e10312

DOI: 10.2196/10312

PMID: 29903703

PMCID: 6024106

Per the author's request the PDF is not available.

© The authors. All rights reserved. This is a privileged document currently under peer-review/community review (or an accepted/rejected manuscript). Authors have provided JMIR Publications with an exclusive license to publish this preprint on it's website for review and ahead-of-print citation purposes only. While the final peer-reviewed paper may be licensed under a cc-by license on publication, at this stage authors and publisher expressively prohibit redistribution of this draft paper other than for review purposes.