33 resultados para An introduction to visual research methods in tourism
Resumo:
Introduction. If we are to promote more patient-centred approaches in care delivery, we have to better characterize the situations in which being patient-centred is difficult to achieve. Data from professionals in health and social care are important because they are the people charged with operationalizing patient-centred care (PCC) in their daily practice. However, empirical accounts from frontline care providers are still lacking, and it is important to gather experiences not only from doctors but also from the other care providers. Indeed, experiences from different professions can help inform our understanding of patient care, which is expected to be both patient-centred and collaborative. Methods. This study was based on the following research question: What factors make the provision of PCC difficult to achieve? Sample and setting. A purposeful sampling technique was used, allowing for a series of choices about the participants and their professional affiliation. Because patient-centredness is the focus, 3 professions appeared to be of special interest: general internists, nurses and social workers. The study was undertaken in the General Internal Medicine Division of a teaching hospital located in a North American context. Data Collection. To answer the research question, a methodological approach based on a theory called phenomenology was chosen. Accordingly, semi-structured interviews were used since they generate understanding of the meanings different individuals have of their lived world. Interviews with 8 physicians, 10 nurses and 10 social workers were eventually conducted. Data analysis. An inductive thematic analysis was employed to make sense of the interview data. Results. The thematic analysis allowed identifying various types of challenges to PCC. Although most of the challenges were perceived by all three groups of professionals, they were perceived to a different degree across the professions, which likely reflected the scope of practice of each profession. The challenges and their distribution across the professions are illustrated in Table 1. Examples of challenges are provided in Table 2. Discussion. There is a tension between what is supposed to be done - what stands in the philosophy of patient -centredness - and what is currently done - the real life with all the challenges to PCC. According to some participants' accounts, PCC clearly risks becoming a mere illusion for health care professionals on which too great pressures are imposed.
Resumo:
Fraud is as old as Mankind. There are an enormous number of historical documents which show the interaction between truth and untruth; therefore it is not really surprising that the prevalence of publication discrepancies is increasing. More surprising is that new cases especially in the medical field generate such a huge astonishment. In financial mathematics a statistical tool for detection of fraud is known which uses the knowledge of Newcomb and Benford regarding the distribution of natural numbers. This distribution is not equal and lower numbers are more likely to be detected compared to higher ones. In this investigation all numbers contained in the blinded abstracts of the 2009 annual meeting of the Swiss Society of Anesthesia and Resuscitation (SGAR) were recorded and analyzed regarding the distribution. A manipulated abstract was also included in the investigation. The χ(2)-test was used to determine statistical differences between expected and observed counts of numbers. There was also a faked abstract integrated in the investigation. A p<0.05 was considered significant. The distribution of the 1,800 numbers in the 77 submitted abstracts followed Benford's law. The manipulated abstract was detected by statistical means (difference in expected versus observed p<0.05). Statistics cannot prove whether the content is true or not but can give some serious hints to look into the details in such conspicuous material. These are the first results of a test for the distribution of numbers presented in medical research.
Resumo:
Background and Aims: To protect the population from environmental tobacco smoke (ETS) Switzerland introduced a nationwide rather heterogeneous smoking ban in May 2010. The exposure situation of non-smoking hospitality workers before and after implementation of the new law is being assessed in a prospective cohort study. Methods: Exposure to ETS was measured using a novel method developed by the Institute for Work and Health in Lausanne. It is a passive sampler called MoNIC (Monitor of NICotine). The nicotine of the ETS is fixed onto a filter and transformed into salt of not volatile nicotine. Subsequently the number of passively smoked cigarettes is calculated. Badges were placed at the workplace as well as distributed to the participants for personal measuring. Additionally a salivary sample was taken to determine nicotine concentration. Results: At baseline Spearman's correlation between workplace and personal badge was 0.47. The average cigarette equivalents per day at the workplace obtained by badge significantly dropped from 5.1 (95%- CI: 2.4 to 7.9) at baseline to 0.3 (0.2 to 0.4) at first follow-up (n=29) three months later (p<0.001). For personal badges the number of passively smoked cigarettes declined from 1.5 (2.7 to 0.4) per day to 0.5 (0.3 to 0.8) (n=16).Salivary nicotine concentration in a subset of 13 participants who had worked on the day prior to the examination was 2.63 ng/ml before and 1.53 ng/ml after the ban (p=0.04). Spearman's correlation of salivary nicotine was 0.56 with workplace badge and 0.79 with personal badge concentrations. Conclusions: Workplace measurements clearly reflect the smoking regulation in a venue. The MoNIC badge proves to be a sensitive measuring device to determine personal ETS exposure and it is a demonstrative measure for communication with lay audiences and study participants as the number of passively smoked cigarettes is an easily conceivable result.
Resumo:
Introduction: Bioaerosols such as grain dust (GD) elicit direct immunological reactions within the human respiratory system. Workplace-dependent exposure to GD may induce asthma, chronic bronchitis, and hypersensitivity pneumonitis. Aims: To assess the clinical impact of occupational exposure to GD and to determine quantitative biological markers of bioaerosol exposure in grain workers. Methods: This longitudinal study has been conducted from summer 2012 to summer 2013, comprising 6 groups of 30 active workers with different GD exposure patterns (4 groups of grain workers, 2 control groups). Two evaluations at high- and low-exposing seasons take place, during which an occupational and a medical history are questionnaire-assessed, lung function is evaluated by spirometry, airway inflammation is measured by exhaled nitric oxide (eNO) and specific blood IgG and IgE are titrated. Results: The preliminary results are those of 2 of the 4 exposed groups, (harvesters and mill workers), compared to the control groups, at first assessment (n=100). Mean age is 38.4 [years]; 98% are male. Exposed groups differ from controls (p<0.05) in daily contact with animals (57% vs. 40%) and active smoking (39% vs. 11%). Grain workers have more respiratory (50%), nasal (57%), ocular (45%) and dermatologic (36%) occupational symptoms than controls (6.4%, 19%, 16%, 6.4% respectively, p<0.05). Lower mean peak-expiratory-flow (PEF) values (96.1 ± 18.9 vs. 108.2 ± 17.4 [% of predicted], p<0.05) and eNO values (13.9 ± 9.6 vs. 20.5 ± 14.7 [ppm], p<0.05) are observed in the exposed groups. Conclusion: Preliminary results show a higher prevalence of clinical symptoms and a lower mean PEF value in the groups exposed to GD.
Resumo:
Introduction: Bioaerosols such as grain dust, via biologically active agents, elicit local inflammation and direct immunological reactions within the human respiratory system. Workplace-dependent exposure to grain dust (GD) may thus induce asthma, chronic bronchitis, and hypersensitivity pneumonitis. The aim of this study is to assess the clinical impact of occupational exposure to GD and to determine quantitative biological markers of bioaerosol exposure in grain workers. Methods: This longitudinal study has been conducted from summer 2012, to summer 2013, comprising 6 groups of 30 active workers with different GD exposure patterns (4 groups of grain workers, 2 control groups). After obtaining informed consent, two evaluations at high- and low-exposing seasons take place, during which an occupational history and a detailed medical history are questionnaire-assessed, lung function is evaluated by spirometry, airway inflammation is measured by exhaled nitric oxide (eNO), and specific blood IgG and IgE are titrated. The preliminary results presented hereafter are those of two of the four exposed groups, namely harvesters and mill workers, compared to the control groups, at first assessment (n=100). Results: Mean age is 38.4 [years]; 98% are male. Exposed groups differ from controls (p<0.05) in daily contact with animals (57% vs. 40%) and active smoking (39% vs. 11%). Grain workers have more respiratory (50%), nasal (57%), ocular (45%), dermatologic (36%) and systemic (20%) occupational symptoms than controls (6.4%, 19%, 16%, 6.4%, 1.6% respectively, p<0.05). Lower mean peak-expiratory-flow (PEF) values (96.1 ± 18.9 vs. 108.2 ± 17.4 [% of predicted], p<0.05) and eNO values (13.9 ± 9.6 vs. 20.5 ± 14.7 [ppm], p<0.05) are observed in the exposed groups. Conclusion: Preliminary results show a higher prevalence of clinical symptoms and a lower mean PEF value in the exposed groups. Detailed supplementary analyses are pending.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
In less than half a century, allergy, originally perceived as a rare disease, has become a major public health threat, today affecting the lives of more than 60 million people in Europe, and probably close to one billion worldwide, thereby heavily impacting the budgets of public health systems. More disturbingly, its prevalence and impact are on the rise, a development that has been associated with environmental and lifestyle changes accompanying the continuous process of urbanization and globalization. Therefore, there is an urgent need to prioritize and concert research efforts in the field of allergy, in order to achieve sustainable results on prevention, diagnosis and treatment of this most prevalent chronic disease of the 21st century.The European Academy of Allergy and Clinical Immunology (EAACI) is the leading professional organization in the field of allergy, promoting excellence in clinical care, education, training and basic and translational research, all with the ultimate goal of improving the health of allergic patients. The European Federation of Allergy and Airways Diseases Patients' Associations (EFA) is a non-profit network of allergy, asthma and Chronic Obstructive Pulmonary Disorder (COPD) patients' organizations. In support of their missions, the present EAACI Position Paper, in collaboration with EFA, highlights the most important research needs in the field of allergy to serve as key recommendations for future research funding at the national and European levels.Although allergies may involve almost every organ of the body and an array of diverse external factors act as triggers, there are several common themes that need to be prioritized in research efforts. As in many other chronic diseases, effective prevention, curative treatment and accurate, rapid diagnosis represent major unmet needs. Detailed phenotyping/endotyping stands out as widely required in order to arrange or re-categorize clinical syndromes into more coherent, uniform and treatment-responsive groups. Research efforts to unveil the basic pathophysiologic pathways and mechanisms, thus leading to the comprehension and resolution of the pathophysiologic complexity of allergies will allow for the design of novel patient-oriented diagnostic and treatment protocols. Several allergic diseases require well-controlled epidemiological description and surveillance, using disease registries, pharmacoeconomic evaluation, as well as large biobanks. Additionally, there is a need for extensive studies to bring promising new biotechnological innovations, such as biological agents, vaccines of modified allergen molecules and engineered components for allergy diagnosis, closer to clinical practice. Finally, particular attention should be paid to the difficult-to-manage, precarious and costly severe disease forms and/or exacerbations. Nonetheless, currently arising treatments, mainly in the fields of immunotherapy and biologicals, hold great promise for targeted and causal management of allergic conditions. Active involvement of all stakeholders, including Patient Organizations and policy makers are necessary to achieve the aims emphasized herein.
Resumo:
Visual backward masking is a reliable and widely used tool in schizophrenia research. Whereas many studies have shown masking deficits in adult patients, there are only very few studies with adolescents with psychosis-and with controversial results. Masking deficits of adolescents are of primary interest because they are not caused by long-term suffering from the disease and severe medication. We investigated 15 adolescents with psychosis and 19 age-matched controls in the shine-through backward masking paradigm for which strong performance deficits were shown previously in adult schizophrenic patients and their relatives. Adolescents with psychosis were strongly impaired in the shine-through effect compared to controls. This result adds further evidence that backward masking is an endophenotype of schizophrenia.
Resumo:
This paper addresses the issue of double counting of health impacts in the context of cost of illness valuation. Double counting occurs when estimates are jointly used, which rely on valuation techniques that overlap. As a solution, we propose to limit the scope of each of the valuation method to a specific range of impacts. In order to limit the contingentvaluation method to the exclusive valuation of intangible costs, we propose a three steps approach : (1) leave the respondents free to valuate the consequences which matter to them, (2) elicit respondent's motivations, (3) control for the influence motivations have on elicited values. This procedure was applied in a Swiss contingent-valuation. An econometric treatment was applied in order to limit the scope of the estimates of the contingent valuation method to intangibles,therefore the possibility to a combination of methods with the risk of double-counting and underestimating costs being kept to a minimum.
Resumo:
Rapport de synthèse: Les rendez-vous manqués représentent un problème important, tant du point de vue de la santé des patients que du point de vue économique. Pourtant peu d'études se sont penchées sur le sujet, particulièrement dans une population d'adolescents. Les buts de cette étude étaient de caractériser les adolescents qui sont à risque de manquer ou d'annuler leurs rendez-vous dans une clinique ambulatoire de santé pour adolescents, de comparer les taux des rendez-vous manqués et annulés entre les différents intervenants et d'estimer l'efficacité d'une politique de taxation des rendez-vous manqués non excusés. Finalement, un modèle multi-niveau markovien a été utilisé afin de prédire le risque de manquer un rendez-vous. Ce modèle tient compte du passé de l'adolescent en matière de rendez-vous manqués et d'autres covariables et permet de grouper les individus ayant un comportement semblable. On peut ensuite prédire pour chaque groupe le risque de manquer ou annuler et les covariables influençant significativement ce risque. Entre 1999 et 2006, 32816 rendez-vous fixés pour 3577 patients âgés de 12 à 20 ans ont été analysés. Le taux de rendez-vous manqués était de 11.8%, alors que 10.9% avaient été annulés. Soixante pour cent des patients n'ont pas manqué un seul de leur rendezvous et 14% en ont manqué plus de 25%. Nous avons pu mettre en évidence plusieurs variables associées de manière statistiquement significative avec les taux de rendez-vous manqués et d'annulations (genre, âge, heure, jour de la semaine, intervenant thérapeutique). Le comportement des filles peut être catégorisé en 2 groupes. Le premier groupe inclut les diagnostiques psychiatriques et de trouble du comportement alimentaire, le risque de manquer dans ce groupe étant faible et associé au fait d'avoir précédemment manqué un rendez-vous et au délai du rendez-vous. Les autres diagnostiques chez les filles sont associés à un second groupe qui montre un risque plus élevé de manquer un rendez-vous et qui est associé à l'intervenant, au fait d'avoir précédemment manqué ou annulé le dernier rendez-vous et au délai du rendez-vous. Les garçons ont tous globalement un comportement similaire concernant les rendez-vous manqués. Le diagnostic au sein de ce groupe influence le risque de manquer, tout comme le fait d'avoir précédemment manqué ou annulé un rendez-vous, le délai du rendez-vous et l'âge du patient. L'introduction de la politique de taxation des rendez-vous non excusés n'a pas montré de différence significative des tàux de rendez-vous manqués, cependant cette mesure a permis une augmentation du taux d'annulations. En conclusion, les taux de présence des adolescents à leurs rendez-vous sont dépendants de facteurs divers. Et, même si les adolescents sont une population à risque concernant les rendez-vous manqués, la majorité d'entre eux ne manquent aucun de leurs rendez-vous, ceci étant vrai pour les deux sexes. Etudier les rendez-vous manqués et les adolescents qui sont à risque de rater leur rendez-vous est un pas nécessaire vers le contrôle de ce phénomène. Par ailleurs, les moyens de contrôle concernant les rendez-vous manqués devraient cibler les patients ayant déjà manqué un rendez-vous. La taxation des rendez-vous manqués permet d'augmenter les rendez-vous annulés, ce qui a l'avantage de permettre de fixer un nouveau rendez-vous et, de ce fait, d'améliorer la continuité des soins.
Resumo:
General introductionThe Human Immunodeficiency/Acquired Immunodeficiency Syndrome (HIV/AIDS) epidemic, despite recent encouraging announcements by the World Health Organization (WHO) is still today one of the world's major health care challenges.The present work lies in the field of health care management, in particular, we aim to evaluate the behavioural and non-behavioural interventions against HIV/AIDS in developing countries through a deterministic simulation model, both in human and economic terms. We will focus on assessing the effectiveness of the antiretroviral therapies (ART) in heterosexual populations living in lesser developed countries where the epidemic has generalized (formerly defined by the WHO as type II countries). The model is calibrated using Botswana as a case study, however our model can be adapted to other countries with similar transmission dynamics.The first part of this thesis consists of reviewing the main mathematical concepts describing the transmission of infectious agents in general but with a focus on human immunodeficiency virus (HIV) transmission. We also review deterministic models assessing HIV interventions with a focus on models aimed at African countries. This review helps us to recognize the need for a generic model and allows us to define a typical structure of such a generic deterministic model.The second part describes the main feed-back loops underlying the dynamics of HIV transmission. These loops represent the foundation of our model. This part also provides a detailed description of the model, including the various infected and non-infected population groups, the type of sexual relationships, the infection matrices, important factors impacting HIV transmission such as condom use, other sexually transmitted diseases (STD) and male circumcision. We also included in the model a dynamic life expectancy calculator which, to our knowledge, is a unique feature allowing more realistic cost-efficiency calculations. Various intervention scenarios are evaluated using the model, each of them including ART in combination with other interventions, namely: circumcision, campaigns aimed at behavioral change (Abstain, Be faithful or use Condoms also named ABC campaigns), and treatment of other STD. A cost efficiency analysis (CEA) is performed for each scenario. The CEA consists of measuring the cost per disability-adjusted life year (DALY) averted. This part also describes the model calibration and validation, including a sensitivity analysis.The third part reports the results and discusses the model limitations. In particular, we argue that the combination of ART and ABC campaigns and ART and treatment of other STDs are the most cost-efficient interventions through 2020. The main model limitations include modeling the complexity of sexual relationships, omission of international migration and ignoring variability in infectiousness according to the AIDS stage.The fourth part reviews the major contributions of the thesis and discusses model generalizability and flexibility. Finally, we conclude that by selecting the adequate interventions mix, policy makers can significantly reduce the adult prevalence in Botswana in the coming twenty years providing the country and its donors can bear the cost involved.Part I: Context and literature reviewIn this section, after a brief introduction to the general literature we focus in section two on the key mathematical concepts describing the transmission of infectious agents in general with a focus on HIV transmission. Section three provides a description of HIV policy models, with a focus on deterministic models. This leads us in section four to envision the need for a generic deterministic HIV policy model and briefly describe the structure of such a generic model applicable to countries with generalized HIV/AIDS epidemic, also defined as pattern II countries by the WHO.
Resumo:
To create an instrument to be used in an outpatient clinic to detect adolescents prone to risk-taking behaviours. Based on previous research, five identified variables (relationship with parents and teachers, liking going to school, average grades, and level of religiosity) were used to create a screening tool to detect at least one of ten risky behaviours (tobacco, alcohol, cannabis and other illegal drugs use; sexual intercourse and sexual risky behaviour; driving while intoxicated, riding with an intoxicated driver, not always using a seat belt, and not always using a helmet). The instrument was tested using the Barcelona Adolescent Health Survey 1993. A Receiver Operating Characteristics curve was used to find the best cut-off point between high and low risk score. Odds ratios and 95% confidence intervals were calculated to detect at least one risky behaviour and for each individual behaviour. In order to assess its predictive value, the analysis was repeated using the Barcelona Adolescent Health Survey 1999. In both cases, analyses were conducted for the whole sample and for younger and older adolescents. Adolescents with a high-risk score were more likely to take at least one risky behaviour both when the whole sample was analysed and by age groups. With very few exceptions, the Behaviour Evaluation for Risk-Taking Adolescents showed significant odds ratios for each individual variable. CONCLUSION: The Behaviour Evaluation for Risk-Taking Adolescents has shown its potential as an easy to use instrument to screen for risk-taking behaviours. Future research must aim towards assessing this instrument's predictive value in the clinical setting and it's application to other populations.
Resumo:
Purpose: to assess among current smokers in Switzerland the willingness to quit and the preferred methods to help quitting smoking. Methods: cross-sectional study including 1265 current smokers (607 women and 658 men). Difficulty quitting smoking and the preferred methods to help quitting smoking were assessed by questionnaire. Results: 89% of women and 84% of men reported being "very difficult" or "difficult" to quit smoking. Almost three quarters of smokers (73% of women and 70% of men) reported some willingness to quit smoking, but less than 25% of them wanted to do so within the next 30 days, and only 64% within the next 6 months. Willingness to quit was stronger among younger smokers while no differences were found for gender, physical activity or education al Javel. The preferred methods to help quitting smoking were personalized counselling by a doctor (51.4%), acupuncture (35.9%); nicotine replacement therapy (37.6%); hypnosis (28.8%); information flyers (24.9%); autogenic training (15.3%); bupropion (15.2%); personalized counselling by a non-doctor (14.7%) and group interventions (13.2%). Acupuncture and hypnosis were more favoured by women, and autogenic training by younger smokers. Still, a sizable fraction (between 19 and 51%) of smokers did not know some of the methods to help quitting smoking. Conclusion: although more than two thirds of Swiss smokers want to quit, only a small fraction wishes to do so in the short term. Setter information regarding the different methods to help quitting is also necessary.
Resumo:
Purpose - This editorial aims to introduce the special issue on employment discrimination against immigrants. Design/methodology/approach - The first part is a commentary on key issues in the study of employment discrimination against immigrants. The second part presents the five articles in the special issue. Findings - The papers in this special issue focus on a variety of issues associated with employment discrimination against immigrants. For example, they consider: discrimination based on accents; differences among justice perceptions among immigrants and non-immigrants; the effects of negative stereotypes on workplace outcomes; the treatment of Hispanic immigrants; and the reasons for the lack of research on Hispanic immigrants. Research limitations/implications - The author comments on key issues that researchers of employment discrimination against immigrants have to take into account. These issues include: the appreciation of the diversity among immigrants; an understanding of the complexity of employment discrimination research; openness to cross-disciplinary approaches; and the consideration of employment discrimination within the context of the immigrant experience. The five articles that make up the special issues vary in their nature (empirical, critical), methodologies (quantitative, qualitative), locations (United States, Germany, and Canada), and implications. Practical implications - The issues discussed in the papers have important implications for understanding and overcoming employment discrimination against immigrants. Originality/value - The Journal of Managerial Psychology invited this special issue to initiate psychological research on employment discrimination against immigrants. The intent is to draw the attention of organizational scholars to the large, yet under-studied immigrant segment of the workforce.
Resumo:
Background: Excessive exposure to solar Ultra-Violet (UV) light is the main cause of most skin cancers in humans. Factors such as the increase of solar irradiation at ground level (anthropic pollution), the rise in standard of living (vacation in sunny areas), and (mostly) the development of outdoor activities have contributed to increase exposure. Thus, unsurprisingly, incidence of skin cancers has increased over the last decades more than that of any other cancer. Melanoma is the most lethal cutaneous cancer, while cutaneous carcinomas are the most common cancer type worldwide. UV exposure depends on environmental as well as individual factors related to activity. The influence of individual factors on exposure among building workers was investigated in a previous study. Posture and orientation were found to account for at least 38% of the total variance of relative individual exposure. A high variance of short-term exposure was observed between different body locations, indicating the occurrence of intense, subacute exposures. It was also found that effective short-term exposure ranged between 0 and 200% of ambient irradiation, suggesting that ambient irradiation is a poor predictor of effective exposure. Various dosimetric techniques enable to assess individual effective exposure, but dosimetric measurements remain tedious and tend to be situation-specific. As a matter of facts, individual factors (exposure time, body posture and orientation in the sun) often limit the extrapolation of exposure results to similar activities conducted in other conditions. Objective: The research presented in this paper aims at developing and validating a predictive tool of effective individual exposure to solar UV. Methods: Existing computer graphic techniques (3D rendering) were adapted to reflect solar exposure conditions and calculate short-term anatomical doses. A numerical model, represented as a 3D triangular mesh, is used to represent the exposed body. The amount of solar energy received by each "triangle is calculated, taking into account irradiation intensity, incidence angle and possible shadowing from other body parts. The model take into account the three components of the solar irradiation (direct, diffuse and albedo) as well as the orientation and posture of the body. Field measurements were carried out using a forensic mannequin at the Payerne MeteoSwiss station. Short-term dosimetric measurements were performed in 7 anatomical locations for 5 body postures. Field results were compared to the model prediction obtained from the numerical model. Results: The best match between prediction and measurements was obtained for upper body parts such as shoulders (Ratio Modelled/Measured; Mean = 1.21, SD = 0.34) and neck (Mean = 0.81, SD = 0.32). Small curved body parts such as forehead (Mean = 6.48, SD = 9.61) exhibited a lower matching. The prediction is less accurate for complex postures such as kneeling (Mean = 4.13, SD = 8.38) compared to standing up (Mean = 0.85, SD = 0.48). The values obtained from the dosimeters and the ones computed from the model are globally consistent. Conclusion: Although further development and validation are required, these results suggest that effective exposure could be predicted for a given activity (work or leisure) in various ambient irradiation conditions. Using a generic modelling approach is of high interest in terms of implementation costs as well as predictive and retrospective capabilities.