869 resultados para Risk model
Resumo:
Risk maps summarizing landscape suitability of novel areas for invading species can be valuable tools for preventing species' invasions or controlling their spread, but methods employed for development of such maps remain variable and unstandardized. We discuss several considerations in development of such models, including types of distributional information that should be used, the nature of explanatory variables that should be incorporated, and caveats regarding model testing and evaluation. We highlight that, in the case of invasive species, such distributional predictions should aim to derive the best hypothesis of the potential distribution of the species by using (1) all distributional information available, including information from both the native range and other invaded regions; (2) predictors linked as directly as is feasible to the physiological requirements of the species; and (3) modelling procedures that carefully avoid overfitting to the training data. Finally, model testing and evaluation should focus on well-predicted presences, and less on efficient prediction of absences; a k-fold regional cross-validation test is discussed.
Resumo:
BACKGROUND: Glutathione (GSH) is the major cellular redox-regulator and antioxidant. Redox-imbalance due to genetically impaired GSH synthesis is among the risk factors for schizophrenia. Here we used a mouse model with chronic GSH deficit induced by knockout (KO) of the key GSH-synthesizing enzyme, glutamate-cysteine ligase modulatory subunit (GCLM).¦METHODS: With high-resolution magnetic resonance spectroscopy at 14.1 T, we determined the neurochemical profile of GCLM-KO, heterozygous, and wild-type mice in anterior cortex throughout development in a longitudinal study design.¦RESULTS: Chronic GSH deficit was accompanied by an elevation of glutamine (Gln), glutamate (Glu), Gln/Glu, N-acetylaspartate, myo-Inositol, lactate, and alanine. Changes were predominantly present at prepubertal ages (postnatal days 20 and 30). Treatment with N-acetylcysteine from gestation on normalized most neurochemical alterations to wild-type level.¦CONCLUSIONS: Changes observed in GCLM-KO anterior cortex, notably the increase in Gln, Glu, and Gln/Glu, were similar to those reported in early schizophrenia, emphasizing the link between redox imbalance and the disease and validating the model. The data also highlight the prepubertal period as a sensitive time for redox-related neurochemical changes and demonstrate beneficial effects of early N-acetylcysteine treatment. Moreover, the data demonstrate the translational value of magnetic resonance spectroscopy to study brain disease in preclinical models.
Resumo:
CONTEXT: Mortality among human immunodeficiency virus (HIV)-infected individuals has decreased dramatically in countries with good access to treatment and may now be close to mortality in the general uninfected population. OBJECTIVE: To evaluate changes in the mortality gap between HIV-infected individuals and the general uninfected population. DESIGN, SETTING, AND POPULATION: Mortality following HIV seroconversion in a large multinational collaboration of HIV seroconverter cohorts (CASCADE) was compared with expected mortality, calculated by applying general population death rates matched on demographic factors. A Poisson-based model adjusted for duration of infection was constructed to assess changes over calendar time in the excess mortality among HIV-infected individuals. Data pooled in September 2007 were analyzed in March 2008, covering years at risk 1981-2006. MAIN OUTCOME MEASURE: Excess mortality among HIV-infected individuals compared with that of the general uninfected population. RESULTS: Of 16,534 individuals with median duration of follow-up of 6.3 years (range, 1 day to 23.8 years), 2571 died, compared with 235 deaths expected in an equivalent general population cohort. The excess mortality rate (per 1000 person-years) decreased from 40.8 (95% confidence interval [CI], 38.5-43.0; 1275.9 excess deaths in 31,302 person-years) before the introduction of highly active antiretroviral therapy (pre-1996) to 6.1 (95% CI, 4.8-7.4; 89.6 excess deaths in 14,703 person-years) in 2004-2006 (adjusted excess hazard ratio, 0.05 [95% CI, 0.03-0.09] for 2004-2006 vs pre-1996). By 2004-2006, no excess mortality was observed in the first 5 years following HIV seroconversion among those infected sexually, though a cumulative excess probability of death remained over the longer term (4.8% [95% CI, 2.5%-8.6%] in the first 10 years among those aged 15-24 years). CONCLUSIONS: Mortality rates for HIV-infected persons have become much closer to general mortality rates since the introduction of highly active antiretroviral therapy. In industrialized countries, persons infected sexually with HIV now appear to experience mortality rates similar to those of the general population in the first 5 years following infection, though a mortality excess remains as duration of HIV infection lengthens.
Resumo:
One of the characteristics of the finite risk reinsurance is the existence of an found of experience, which is constituted by the premiums charged by the reinsurer, together with his financial incomes, and his objective is to finance the claims to be satisfied to the insurer in the specified period. The objective of this work is to design a model that allows us to determinate the reserve that the found of experience should have in every annual period in order to guarantee its dynamic solvency, taking into the experience of the claims of the reinsurer"s portfolio and of each insurance company.
Meta-analysis: subclinical thyroid dysfunction and the risk for coronary heart disease and mortality
Resumo:
BACKGROUND: Data on the association between subclinical thyroid dysfunction and coronary heart disease (CHD) and mortality are conflicting. PURPOSE: To summarize prospective evidence about the relationship between subclinical thyroid dysfunction and CHD and mortality. DATA SOURCES: MEDLINE (1950 to January 2008) without language restrictions and reference lists of retrieved articles were searched. STUDY SELECTION: Two reviewers screened and selected cohort studies that measured thyroid function and then followed persons prospectively to assess CHD or mortality. DATA EXTRACTION: By using a standardized protocol and forms, 2 reviewers independently abstracted and assessed studies. DATA SYNTHESIS: Ten of 12 identified studies involved population-based cohorts that included 14 449 participants. All 10 population-based cohort studies examined risks associated with subclinical hypothyroidism (2134 CHD events and 2822 deaths), whereas only 5 examined risks associated with subclinical hyperthyroidism (1392 CHD events and 1993 deaths). In a random-effects model, the relative risk (RR) for subclinical hypothyroidism for CHD was 1.20 (95% CI, 0.97 to 1.49; P for heterogeneity = 0.14; I(2 )= 33.4%). Risk estimates were lower when higher-quality studies were pooled (RR, 1.02 to 1.08) and were higher among participants younger than 65 years (RR, 1.51 [CI, 1.09 to 2.09] for studies with mean participant age <65 years and 1.05 [CI, 0.90 to 1.22] for studies with mean participant age > or =65 years). The RR was 1.18 (CI, 0.98 to 1.42) for cardiovascular mortality and 1.12 (CI, 0.99 to 1.26) for total mortality. For subclinical hyperthyroidism, the RR was 1.21 (CI, 0.88 to 1.68) for CHD, 1.19 (CI, 0.81 to 1.76) for cardiovascular mortality, and 1.12 (CI, 0.89 to 1.42) for total mortality (P for heterogeneity >0.50; I(2 )= 0% for all studies). LIMITATIONS: Individual studies adjusted for different potential confounders, and 1 study provided only unadjusted data. Publication bias or selective reporting of outcomes could not be excluded. CONCLUSION: Subclinical hypothyroidism and hyperthyroidism may be associated with a modest increased risk for CHD and mortality, with lower risk estimates when pooling higher-quality studies and larger CIs for subclinical hyperthyroidism
Resumo:
Background: Glutathione (GSH) is a major redox regulator and antioxidant and is decreased in cerebrospinal fluid and prefrontal cortex of schizophrenia patients [Do et al. (2000) Eur J Neurosci 12:3721]. The genes of the key GSH-synthesizing enzyme, glutamate- cysteine ligase catalytic (GCLC) and modifier (GCLM) subunits, are associated with schizophrenia, suggesting that the deficit in GSH synthesis is of genetic origin [Gysin et al. (2007) PNAS 104:16621]. GCLM knock-out (KO) mice, which display an 80% decrease in brain GSH levels, have abnormal brain morphology and function [Do et al. (2009) Curr Opin Neurobiol 19:220]. Developmental redox deregulation by impaired GSH synthesis and environmental risk factors generating oxidative stress may have a central role in schizophrenia. Here, we used GCLM KO mice to investigate the impact of a genetically dysregulated redox system on the neurochemical profile of the developing brain. Methods: The neurochemical profile of the anterior and posterior cortical areas of male and female GCLM KO and wild-type mice was determined by in vivo 1H NMR spectroscopy on postnatal days 10, 20, 30, 60 and 90, under 1 to 1.5% isoflurane anaesthesia. Localised 1H NMR spectroscopy was performed on a 14.1 T, 26 cm VNMRS spectrometer (Varian, Magnex) using a home-built 8 mm diameter quadrature surface coil (used both for RF excitation and signal reception). Spectra were acquired using SPECIAL with TE of 2.8 ms and TR of 4 s from VOIs placed in anterior or posterior regions of the cortex [Mlynárik et al. (2006) MRM 56:965]. LCModel analysis allowed in vivo quantification of a neurochemical profile composed of 18 metabolites. Results: GCLM KO mice displayed nearly undetectable GSH levels as compared to WT mice, demonstrating their drastic redox deregulation. Depletion of GSH triggered alteration of metabolites related to its synthesis, namely increase of glycine and glutamate levels during development (P20 and P30). Concentrations of glutamine and aspartate that are produced from glutamate were also increased in GCLM KO animals relative to WT. In addition, GCLM KO mice also showed higher levels of N-acetylaspartate that originates from the acetylation of aspartate. These metabolites are particularly implicated in neurotransmission processes and in mitochondrial oxidative metabolism. Their increase may indicate impaired mitochondrial metabolism with concomitant accumulation of lactate in the adult mice (P60 and P90). In addition, the GSH depletion triggers reduction of GABA concentration in anterior cortex of the P60 mice, which is in accordance with known impairment of GABAergic interneurons in that area. Changes were generally more pronounced in males than in females at P60, which is consistent with earlier disease onset in male patients. Discussion: In conclusion, the observed metabolic alterations in the cortex of a mouse model of redox deregulation suggest impaired mitochondrial metabolism and altered neurotransmission. The results also highlight the age between P20 and P30 as a sensitive period during the development for these alterations.
Resumo:
Risk theory has been a very active research area over the last decades. The main objectives of the theory are to find adequate stochastic processes which can model the surplus of a (non-life) insurance company and to analyze the risk related quantities such as ruin time, ruin probability, expected discounted penalty function and expected discounted dividend/tax payments. The study of these ruin related quantities provides crucial information for actuaries and decision makers. This thesis consists of the study of four different insurance risk models which are essentially related. The ruin and related quantities are investigated by using different techniques, resulting in explicit or asymptotic expressions for the ruin time, the ruin probability, the expected discounted penalty function and the expected discounted tax payments. - La recherche en théorie du risque a été très dynamique au cours des dernières décennies. D'un point de vue théorique, les principaux objectifs sont de trouver des processus stochastiques adéquats permettant de modéliser le surplus d'une compagnie d'assurance non vie et d'analyser les mesures de risque, notamment le temps de ruine, la probabilité de ruine, l'espérance de la valeur actuelle de la fonction de pénalité et l'espérance de la valeur actuelle des dividendes et taxes. L'étude de ces mesures associées à la ruine fournit des informations cruciales pour les actuaires et les décideurs. Cette thèse consiste en l'étude des quatre différents modèles de risque d'assurance qui sont essentiellement liés. La ruine et les mesures qui y sont associées sont examinées à l'aide de différentes techniques, ce qui permet d'induire des expressions explicites ou asymptotiques du temps de ruine, de la probabilité de ruine, de l'espérance de la valeur actuelle de la fonction de pénalité et l'espérance de la valeur actuelle des dividendes et taxes.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
AIMS/HYPOTHESIS: To assist in the development of preventive strategies, we studied whether the neighbourhood environment or modifiable behavioural parameters, including cardiorespiratory fitness (CRF) and physical activity (PA), are independently associated with obesity and metabolic risk markers in children. METHODS: We carried out a cross-sectional analysis of 502 randomly selected first and fifth grade urban and rural Swiss schoolchildren with regard to CRF, PA and the neighbourhood (rural vs urban) environment. Outcome measures included BMI, sum of four skinfold thicknesses, homeostasis model assessment of insulin resistance (HOMA-IR) and a standardised clustered metabolic risk score. RESULTS: CRF and PA (especially total PA, but also the time spent engaged in light and in moderate and vigorous intensity PA) were inversely associated with measures of obesity, HOMA-IR and the metabolic risk score, independently of each other, and of sociodemographic and nutritional parameters, media use, sleep duration, BMI and the neighbourhood environment (all p < 0.05). Children living in a rural environment were more physically active and had higher CRF values and reduced HOMA-IR and metabolic risk scores compared with children living in an urban environment (all p < 0.05). These differences in cardiovascular risk factors persisted after adjustment for CRF, total PA and BMI. CONCLUSIONS/INTERPRETATION: Reduced CRF, low PA and an urban environment are independently associated with an increase in metabolic risk markers in children.
Resumo:
Rapport de synthèse : Description : ce travail de thèse évalue de façon systématique les études sur l'association entre les dysfonctions thyroïdiennes infracliniques d'une part, et la maladie coronarienne et la mortalité d'autre part. Les hypothyroïdies infracliniques affectent environ 4-5% de la population adulte alors que la prévalence de l'hyperthyroïdie infraclinique est inférieure (environ 1%). L'éventuelle association entre elles pourrait justifier un dépistage systématique des dysfonctions thyroïdiennes infracliniques. Les précédentes études sur l'association entre l'hypothyroïdie infraclinique et la maladie coronarienne ont donné des résultats conflictuels. La parution de nouveaux articles récents basés sur de grandes cohortes prospectives nous a permis d'effectuer une méta-analyse basée uniquement sur des études de cohorte prospectives, augmentant ainsi la validité des résultats. Résultats: 10 des 12 études identifiées pour notre revue systématique sont basées sur des cohortes issues de la population générale («population-based »), regroupant en tout 14 449 participants. Ces 10 études examinent toutes le risque associé à l'hypothyroïdie infraclinique (avec 2134 événements coronariens et 2822 décès), alors que 5 étudient également le risque associé à l'hyperthyroïdie infraclinique (avec 1392 événements coronariens et 1993 décès). En utilisant un modèle statistique de type random-effect model, le risque relatif [RR] lié à l'hypothyroïdie infraclinique pour la maladie coronarienne est de 1.20 (intervalle de confiance [IC] de 95%, 0.97 à 1.49). Le risque diminue lorsque l'on regroupe uniquement les études de meilleure qualité (RR compris entre 1.02 et 1.08). Il est plus élevé parmi les participants de moins de 65 ans (RR, 1.51 [IC, 1.09 à 2.09] et 1.05 [IC, 0.90 à 1.22] pour les études dont l'âge moyen des participants est >_ 65 ans). Le RR de la mortalité cardiovasculaire est de 1.18 (IC, 0.98 à 1.42) et de 1.12 (IC, 0.99 à 1.26) pour la mortalité totale. En cas d'hyperthyroïdie infraclinique, les RR de la maladie coronarienne sont de 1.21 (IC, 0.88 à 1.68), de 1.19 (IC, 0.81 à 1.76) pour la mortalité cardiovasculaire, et de 1.12 (IC, 0.89 à 1.42) pour la mortalité totale. Conclusions et perspectives : nos résultats montrent que les dysfonctions thyroïdiennes infracliniques (hypothyroïdie et hyperthyroïdie infracliniques) représentent un facteur de risque modifiable, bien que modéré, de la maladie coronarienne et de la mortalité. L'efficacité du traitement de ces dysfonctions thyroïdiennes infracliniques doit encore être prouvée du point de vue cardiovasculaire et de la mortalité. Il est nécessaire d'effectuer des études contrôlées contre placebo avec le risque cardiovasculaire et la mortalité comme critères d'efficacité, avant de pouvoir proposer des recommandations sur le dépistage des ces dysfonctions thyroïdiennes dans la population adulte.
Resumo:
The purpose of this study was to explore the frequency of risk behaviours among Swiss adolescents and their links with risk perception, impulsivity and emotion regulation abilities, operationalized with the concepts of alexithymia and emo- tional openness. We recruited 144 subjects (aged 14-20), who completed the Risk Involvement and Perception Scale (RIPS-R), the UPPS Impulsive Behavior Scale, the 20-item Toronto Alexithymia Scale (TAS-20), and the 20-item Dimensions of Openness to Emotional Experiences (DOE-20) questionnaire. Findings revealed that a greater perception of benefits and a higher level of sensation seeking were associated with more involvement in risk behaviours, which are essentially socially accepted behaviours. Notably, the path model indicated that the perception of benefits was a mediator in the relationship between sensation seeking and risk behaviours. The results add to the psychological understanding of factors associated with risk behaviours in adolescence. The limitations and implications of these results for developmental theories, research, and prevention are stated.
Resumo:
Background:Type 2 diabetes (T2D) is associated with increased fracture risk but paradoxically greater BMD. TBS (trabecular bone score), a novel grey-level texture measurement extracted from DXA images, correlates with 3D parameters of bone micro-architecture. We evaluated the ability of lumbar spine (LS) TBS to account for the increased fracture risk in diabetes. Methods:29,407 women ≥50 years at the time of baseline hip and spine DXA were identified from a database containing all clinical BMD results for the Province of Manitoba, Canada. 2,356 of the women satisfied a well-validated definition for diabetes, the vast majority of whom (>90%) would have T2D. LS L14 TBS was derived for each spine DXA examination blinded to clinical parameters and outcomes. Health service records were assessed for incident non-traumatic major osteoporotic fracture codes (mean follow-up 4.7 years). Results:In linear regression adjusted for FRAX risk factors (age,BMI, glucocorticoids, prior major fracture, rheumatoid arthritis, COPD as a smoking proxy, alcohol abuse) and osteoporosis therapy, diabetes was associated with higher BMD for LS, femoral neck and total hip but lower LS TBS (all p<0.001). Similar results were seen after excluding obese subjects withBMI>30. In logistic regression (Figure), the adjusted odds ratio (OR) for a skeletal measurement in the lowest vs highest tertile was less than 1 for all BMD measurements but increased for LS TBS (adjusted OR 2.61, 95%CI 2.30-2.97). Major osteoporotic fractures were identified in 175 (7.4%) with and 1,493 (5.5%) without diabetes (p < 0.001). LS TBS predicted fractures in those with diabetes (adjusted HR 1.27, 95%CI 1.10-1.46) and without diabetes (HR 1.31, 95%CI 1.24-1.38). LS TBS was an independent predictor of fracture (p<0.05) when further adjusted for BMD (LS, femoral neck or total hip). The explanatory effect of diabetes in the fracture prediction model was greatly reduced when LS TBS was added to the model (indicating that TBS captured a large portion of the diabetes-associated risk), but was paradoxically increased from adding any of the BMD measurements. Conclusions:Lumbar spine TBS is sensitive to skeletal deterioration in postmenopausal women with diabetes, whereas BMD is paradoxically greater. LS TBS predicts osteoporotic fractures in those with diabetes, and captures a large portion of the diabetes-associated fracture risk. Combining LS TBS with BMD incrementally improves fracture prediction.
Resumo:
We present the most comprehensive comparison to date of the predictive benefit of genetics in addition to currently used clinical variables, using genotype data for 33 single-nucleotide polymorphisms (SNPs) in 1,547 Caucasian men from the placebo arm of the REduction by DUtasteride of prostate Cancer Events (REDUCE®) trial. Moreover, we conducted a detailed comparison of three techniques for incorporating genetics into clinical risk prediction. The first method was a standard logistic regression model, which included separate terms for the clinical covariates and for each of the genetic markers. This approach ignores a substantial amount of external information concerning effect sizes for these Genome Wide Association Study (GWAS)-replicated SNPs. The second and third methods investigated two possible approaches to incorporating meta-analysed external SNP effect estimates - one via a weighted PCa 'risk' score based solely on the meta analysis estimates, and the other incorporating both the current and prior data via informative priors in a Bayesian logistic regression model. All methods demonstrated a slight improvement in predictive performance upon incorporation of genetics. The two methods that incorporated external information showed the greatest receiver-operating-characteristic AUCs increase from 0.61 to 0.64. The value of our methods comparison is likely to lie in observations of performance similarities, rather than difference, between three approaches of very different resource requirements. The two methods that included external information performed best, but only marginally despite substantial differences in complexity.
Resumo:
We analyse the impact of working and contractual conditions, particularly exposure to job risks, on the probability of acquiring a permanent disability, controlling for other personal and firm characteristics. We postulate a model in which this impact is mediated by the choice of occupation, with a level of risk associated with it. We assume this choice is endogenous, and that it depends on preferences and opportunities in the labour market, both of which may differ between immigrants and natives. To test this hypothesis we apply a bivariate probit model to data for 2006 from the Continuous Sample of Working Lives provided by the Spanish Social Security system, containing records for over a million workers. We find that risk exposure increases the probability of permanent disability arising from any cause - by almost 5%.
Resumo:
AIMS: To validate a model for quantifying the prognosis of patients with pulmonary embolism (PE). The model was previously derived from 10 534 US patients. METHODS AND RESULTS: We validated the model in 367 patients prospectively diagnosed with PE at 117 European emergency departments. We used baseline data for the model's 11 prognostic variables to stratify patients into five risk classes (I-V). We compared 90-day mortality within each risk class and the area under the receiver operating characteristic curve between the validation and the original derivation samples. We also assessed the rate of recurrent venous thrombo-embolism and major bleeding within each risk class. Mortality was 0% in Risk Class I, 1.0% in Class II, 3.1% in Class III, 10.4% in Class IV, and 24.4% in Class V and did not differ between the validation and the original derivation samples. The area under the curve was larger in the validation sample (0.87 vs. 0.78, P=0.01). No patients in Classes I and II developed recurrent thrombo-embolism or major bleeding. CONCLUSION: The model accurately stratifies patients with PE into categories of increasing risk of mortality and other relevant complications. Patients in Risk Classes I and II are at low risk of adverse outcomes and are potential candidates for outpatient treatment.