3 resultados para Evidence synthesis

em Digital Commons at Florida International University


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Context The internet is gaining popularity as a means of delivering employee-based cardiovascular (CV) wellness interventions though little is known about the cardiovascular health outcomes of these programs. In this review, we examined the effectiveness of internet-based employee cardiovascular wellness and prevention programs. Evidence Acquisition We conducted a systematic review by searching PubMed, Web of Science and Cochrane library for all published studies on internet-based programs aimed at improving CV health among employees up to November 2012. We grouped the outcomes according to the American Heart Association (AHA) indicators of cardiovascular wellbeing – weight, BP, lipids, smoking, physical activity, diet, and blood glucose. Evidence Synthesis A total of 18 randomized trials and 11 follow-up studies met our inclusion/exclusion criteria. Follow-up duration ranged from 6 – 24 months. There were significant differences in intervention types and number of components in each intervention. Modest improvements were observed in more than half of the studies with weight related outcomes while no improvement was seen in virtually all the studies with physical activity outcome. In general, internet-based programs were more successful if the interventions also included some physical contact and environmental modification, and if they were targeted at specific disease entities such as hypertension. Only a few of the studies were conducted in persons at-risk for CVD, none in blue-collar workers or low-income earners. Conclusion Internet based programs hold promise for improving the cardiovascular wellness among employees however much work is required to fully understand its utility and long term impact especially in special/at-risk populations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.