• 제목/요약/키워드: risk reporting

Search Result 330, Processing Time 0.027 seconds

Chuna Manual Therapy for Adhesive Capsulitis : A Systematic Review and Meta Analysis (유착성 관절낭염에 대한 추나요법의 효과: 체계적 문헌고찰과 메타분석)

  • Cho, Ju-Chan;Heo, In;Park, Sun-Young;Shin, Byung-Cheul
    • The Journal of Churna Manual Medicine for Spine and Nerves
    • /
    • v.14 no.2
    • /
    • pp.1-14
    • /
    • 2019
  • Objectives : To evaluate the effectiveness of Chuna Manual Therapy for adhesive capsulitis by a systematic review manner. Methods : Five foreign electronic databases (Pubmed, Ovid-medline, Embase, Cochrane library, Chinese Academic Journals (CAJ)) and two Korean medical electronic databases (Oriental Medicine Advanced Searching Integrated System (OASIS) and Research Information Sharing Service (RISS)) were searched to find all randomized controlled trials (RCTs) using Chuna Manual Therapy as a treatment for adhesive capsulitis. The methodological quality of each RCT was assessed using the Cochrane risk of bias tool. Results : Twenty-one RCTs met our inclusion criteria. The meta-analysis showed positive results on the use of Chuna Manual Therapy combined with acupuncture or exercise therapy in terms of the efficacy rate and pain using the Visual Analogue Scale (VAS), compared to acupuncture or exercise alone [SMD-1.81 (95% CI & -2.54, -1.08), P<0.001, RR 1.19 (95% CI 1.14, 1.23), P<0.001)]. Positive results in terms of efficacy rate were also obtained comparing Chuna Manual Therapy to acupuncture alone [RR 1.10 (95% CI 1.02, 1.18), P=0.01]. Conclusions : Our systematic review found favorable results on the effectiveness of Chuna Manual Therapy for pain and efficacy rate of adhesive capsulitis. However, evidence was limited due to the lack of well-designed RCTs. More qualified clinical trials are needed to obtain stronger evidence.

Financial Disclosure and the Cost of Equity Capital: The Empirical Test of the Largest Listed Companies of Kazakhstan

  • Baimukhamedova, Aizhan;Baimukhamedova, Gulzada;Luchaninova, Albina
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.4 no.3
    • /
    • pp.5-17
    • /
    • 2017
  • This study extends research into whether disclosure of corporate and financial information is associated with firms' costs of equity capital. This study sets out to examine empirically the determinants of corporate disclosure in the annual reports of 37 largest and most liquid firms listed on Kazakhstan Stock Exchange (KASE) in Kazakhstan. It also reports the results of the association between company-specific characteristics and disclosure of the sample companies. Based on the analysis of existing empirical research, the disclosure index has been constructed and regression analysis of the influence of the disclosure index on the cost of equity capital has been conducted. The obtained results show that the received findings correlate with foreign empirical studies, and the disclosure index in this sample has a negative impact on the cost of equity capital. Using cost of equity capital estimates derived from capital asset pricing model, we find that firms with higher levels of financial transparency are associated with significantly lower costs of equity capital. Economic theory assumes that by increasing the level of corporate reporting, firms not only increase their stock market liquidity, but also decrease the investors' estimation risk, arising from uncertainty about future returns and payout distributions. The results show that firms on the Kazakhstan market can reduce their cost of equity capital by increasing the level of their voluntary corporate disclosures.

The Oncological Safety of Nipple-Sparing Mastectomy: A Systematic Review of the Literature with a Pooled Analysis of 12,358 Procedures

  • Headon, Hannah Louise;Kasem, Abdul;Mokbel, Kefah
    • Archives of Plastic Surgery
    • /
    • v.43 no.4
    • /
    • pp.328-338
    • /
    • 2016
  • Nipple-sparing mastectomy (NSM) is increasingly popular as a procedure for the treatment of breast cancer and as a prophylactic procedure for those at high risk of developing the disease. However, it remains a controversial option due to questions regarding its oncological safety and concerns regarding locoregional recurrence. This systematic review with a pooled analysis examines the current literature regarding NSM, including locoregional recurrence and complication rates. Systematic electronic searches were conducted using the PubMed database and the Ovid database for studies reporting the indications for NSM and the subsequent outcomes. Studies between January 1970 and January 2015 (inclusive) were analysed if they met the inclusion criteria. Pooled descriptive statistics were performed. Seventy-three studies that met the inclusion criteria were included in the analysis, yielding 12,358 procedures. After a mean follow up of 38 months (range, 7.4-156 months), the overall pooled locoregional recurrence rate was 2.38%, the overall complication rate was 22.3%, and the overall incidence of nipple necrosis, either partial or total, was 5.9%. Significant heterogeneity was found among the published studies and patient selection was affected by tumour characteristics. We concluded that NSM appears to be an oncologically safe option for appropriately selected patients, with low rates of locoregional recurrence. For NSM to be performed, tumours should be peripherally located, smaller than 5 cm in diameter, located more than 2 cm away from the nipple margin, and human epidermal growth factor 2-negative. A separate histopathological examination of the subareolar tissue and exclusion of malignancy at this site is essential for safe oncological practice. Long-term follow-up studies and prospective cohort studies are required in order to determine the best reconstructive methods.

The Study on Corporate Information Security Governance Model for CEO (최고경영자를 위한 기업 정보보호 거버넌스 모델에 대한 연구)

  • Kim, Do Hyeong
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.39-44
    • /
    • 2017
  • The existing enterprise information security activities were centered on the information security organization, and the top management considers information security and enterprise management to be separate. However, various kinds of security incidents are constantly occurring. In order to cope with such incidents, it is necessary to protect information in terms of business management, not just information security organization. In this study, we examine the existing corporate governance and IT governance, and present an information security governance model that can reflect the business goals of the enterprise and the goals of the management. The information security governance model proposed in this paper induces the participation of top management from the planning stage and establishes information security goals. We can strengthen information security activities by establishing an information security plan, establishing and operating an information security system, and reporting the results to top management through compliance audit, vulnerability analysis and risk management.

An Overview of Using Serious Games for the Effective Development in Health and Medicine (보건 의료용 기능성 게임의 효과적 개발 방향 연구)

  • Lee, Hye Rim;Jeong, Eui Jun
    • Journal of Korea Game Society
    • /
    • v.13 no.4
    • /
    • pp.73-90
    • /
    • 2013
  • Serious games allow learners to experience situations that are impossible in the real world for various purposes. To date the major applications of serious games include military, government, education, corporate and healthcare applications. This paper aims to provide an overview of the applications of serious games for various health-related purposes, particularly for Health and Medicine education, health risk prevention, behavioral intervention, and disease self-management. These games identified numerous papers reporting empirical evidence about the impacts and outcomes. There is potential promise for serious games to improve health outcomes. We discuss implications of using serious games for health-related purposes and future direction for research in this area.

Challenges to Prevent in Practice for Effective Cost and Time Control of Construction Projects

  • Olawale, Yakubu A.
    • Journal of Construction Engineering and Project Management
    • /
    • v.10 no.1
    • /
    • pp.16-32
    • /
    • 2020
  • Cost and time control of projects is important in preventing project failure. However, achieving effective cost and time control in practice is often challenging. The challenges of project cost and time control in practice are investigated by carrying out a questionnaire survey on the top 150 construction contractors in the UK followed by in-depth semi-structured interviews of practitioners from 15 construction companies in the country. Quantitative analysis reveals that design change is the most important factor inhibiting the ability of UK contractors from effectively controlling both the cost and time of construction projects. Four of the top five factors inhibiting effective cost control are also the top factors inhibiting effective time control albeit in a different order. These top factors-design changes, inaccurate evaluation of project time/duration, risk and uncertainty, non-performance of subcontractors and nominated suppliers were also found to be endogenous factors to the project. Additionally, qualitative analysis of the interviews reveals 16 key challenges to prevent for effective project cost and time control in practice. These are classified into four categorised based on where they stem from as follows; from the organisation (1. Lack of integration of cost and time during project control, 2. lack of management buy-in, 3. complicated project control systems and processes, 4. lack of a project control training regime); from the construction management/project management approach (5. Lapses in integration of interfaces, 6. project control not being implemented from the early stages of a project, 7. inefficient utilisation and control of labour, 8. limited time devoted to planning how a project will be controlled at the outset); from the client; (9. Excessive authorisation gates, 10. use of adversarial and non-collaborative forms of contracts, 11. communication problems within client set-up, 12. obstructive client representatives) and; from the project team (13. Lack of detailed/complete design, 14. lack of trust among the project partners, 15. limited time devoted to project control on site, 16. non-factual reporting). The study posits that knowledge of these project control inhibiting factors and challenges is the first step at ensuring they are avoided and enable the implementation of a more effective project cost and time control process in practice.

Development of the Financial Account Pre-screening System for Corporate Credit Evaluation (분식 적발을 위한 재무이상치 분석시스템 개발)

  • Roh, Tae-Hyup
    • The Journal of Information Systems
    • /
    • v.18 no.4
    • /
    • pp.41-57
    • /
    • 2009
  • Although financial information is a great influence upon determining of the group which use them, detection of management fraud and earning manipulation is a difficult task using normal audit procedures and corporate credit evaluation processes, due to the shortage of knowledge concerning the characteristics of management fraud, and the limitation of time and cost. These limitations suggest the need of systemic process for !he effective risk of earning manipulation for credit evaluators, external auditors, financial analysts, and regulators. Moot researches on management fraud have examined how various characteristics of the company's management features affect the occurrence of corporate fraud. This study examines financial characteristics of companies engaged in fraudulent financial reporting and suggests a model and system for detecting GAAP violations to improve reliability of accounting information and transparency of their management. Since the detection of management fraud has limited proven theory, this study used the detecting method of outlier(upper, and lower bound) financial ratio, as a real-field application. The strength of outlier detecting method is its use of easiness and understandability. In the suggested model, 14 variables of the 7 useful variable categories among the 76 financial ratio variables are examined through the distribution analysis as possible indicators of fraudulent financial statements accounts. The developed model from these variables show a 80.82% of hit ratio for the holdout sample. This model was developed as a financial outlier detecting system for a financial institution. External auditors, financial analysts, regulators, and other users of financial statements might use this model to pre-screen potential earnings manipulators in the credit evaluation system. Especially, this model will be helpful for the loan evaluators of financial institutes to decide more objective and effective credit ratings and to improve the quality of financial statements.

Effects of Breastfeeding Interventions on Breastfeeding Rates at 1, 3 and 6 Months Postpartum: A Systematic Review and Meta-Analysis (모유수유중재의 산후 1, 3, 6개월 모유수유율에 대한 효과: 체계적 문헌고찰 및 메타분석)

  • Park, Seol Hui;Ryu, Seang
    • Journal of Korean Academy of Nursing
    • /
    • v.47 no.6
    • /
    • pp.713-730
    • /
    • 2017
  • Purpose: This study was a systematic review and meta-analysis designed to evaluate the effects of breastfeeding intervention on breastfeeding rates. Methods: Based on the guidelines of the Preferred Reporting Items for Systematic Reviews and Meta-analyses (PRISMA), a systematic search was conducted using eight core electronic databases and other sources including gray literature from January 9 to 19, 2017. Two reviewers independently select the studies and assessed methodological risk of bias of studies using the Cochrane criteria. The topics of breastfeeding interventions were analyzed using descriptive analysis and the effects of intervention were meta-analyzed using the Review Manager 5.2 software. Results: A total of 16 studies were included in the review and 15 were included for meta-analysis. The most frequently used intervention topics were the importance of good latch-on and frequency of feeding and determining adequate intake followed. The pooled total effect of breastfeeding intervention was 1.08 (95% CI 1.03~1.13). In the subgroup analysis, neither pre-nor post-childbirth intervention was effective on the breastfeeding rates at 1, 3, and 6 months, and neither group nor individual interventions had an effect. Only the 1 month breastfeeding rate was found to be affected by the individual intervention with the persistent strategies 1.21 (95% CI 1.04~1.40). Conclusion: Effective breastfeeding interventions are needed to help the mother to start breastfeeding after childbirth and continue for at least six months. It should be programmed such that individuals can acquire information and specific breastfeeding skills. After returning home, there should be continuous support strategies for breastfeeding as well as managing various difficulties related to childcare.

Real-Time Ransomware Infection Detection System Based on Social Big Data Mining (소셜 빅데이터 마이닝 기반 실시간 랜섬웨어 전파 감지 시스템)

  • Kim, Mihui;Yun, Junhyeok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.10
    • /
    • pp.251-258
    • /
    • 2018
  • Ransomware, a malicious software that requires a ransom by encrypting a file, is becoming more threatening with its rapid propagation and intelligence. Rapid detection and risk analysis are required, but real-time analysis and reporting are lacking. In this paper, we propose a ransomware infection detection system using social big data mining technology to enable real-time analysis. The system analyzes the twitter stream in real time and crawls tweets with keywords related to ransomware. It also extracts keywords related to ransomware by crawling the news server through the news feed parser and extracts news or statistical data on the servers of the security company or search engine. The collected data is analyzed by data mining algorithms. By comparing the number of related tweets, google trends (statistical information), and articles related wannacry and locky ransomware infection spreading in 2017, we show that our system has the possibility of ransomware infection detection using tweets. Moreover, the performance of proposed system is shown through entropy and chi-square analysis.

Needle Stick Injuries and their Related Safety Measures among Nurses in a University Hospital, Shiraz, Iran

  • Jahangiri, Mehdi;Rostamabadi, Akbar;Hoboubi, Naser;Tadayon, Neda;Soleimani, Ali
    • Safety and Health at Work
    • /
    • v.7 no.1
    • /
    • pp.72-77
    • /
    • 2016
  • Background: This study aimed to determine the prevalence and factors related to needle stick injuries (NSIs) and to assess related safety measures among a sample of Iranian nurses. Methods: In this cross-sectional study, a random sample of 168 registered active nurses was selected from different wards of one of the hospitals of Shiraz University of Medical Sciences (SUMS). Data were collected by an anonymous questionnaire and a checklist based observational method among the 168 registered active nurses. Results: The prevalence of NSIs in the total of work experience and the last year was 76% and 54%, respectively. Hollow-bore needles were the most common devices involved in the injuries (85.5%). The majority of NSIs occurred in the morning shift (57.8%) and the most common activity leading to NSIs was recapping needles (41.4%). The rate of underreporting NSIs was 60.2% and the major reasons for not reporting the NSIs were heavy clinical schedule (46.7%) and perception of low risk of infection (37.7%). A statistically significant relationship was found between the occurrence of NSIs and sex, hours worked/week, and frequency of shifts/month. Conclusion: The study showed a high prevalence of NSIs among nurses. Supportive measures such as improving injection practices, modification of working schedule, planning training programs targeted at using personal protective equipment, and providing an adequate number of safety facilities such as puncture resistant disposal containers and engineered safe devices are essential for the effective prevention of NSI incidents among the studied nurses.