Journal articles on the topic 'Concealment of assets'

To see the other types of publications on this topic, follow the link: Concealment of assets.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Concealment of assets.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Keshetty, Rajeev, Marineni Tony Dylin, M. U. Anil Sagar, and Dr Rishi Sayal. "Secure Image Sharing: Innovating Encryption and Concealment Methods." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (May 31, 2024): 2578–87. http://dx.doi.org/10.22214/ijraset.2024.62138.

Full text
Abstract:
Abstract: Data security techniques, notably concealment of information in encrypted images, play a pivotal role in safeguarding digital assets. Nonetheless, many methods in this domain face challenges in effectively balancing security and embedding capacity. To tackle this issue, we propose a novel approach integrating hybrid coding and Chinese remainder theorem-based secret sharing (CRTSS). Our method employs hybrid coding for concealing data within images, ensuring a robust embedding capacity. Initially, an iterative encryption process encrypts blocks while preserving their spatial correlation. CRTSS is then utilized to distribute these encrypted blocks across multiple shares, ensuring robust security. Leveraging the high geographical correlation within each share, data embedding is performed using the hybrid coding technique, effectively increasing capacity. The proposed method allows for the restoration of the original image without loss, even if some shares are corrupted or missing, as long as enough uncorrupted shares are available. Experimental results indicate superior embedding capacity compared to state-of-the-art techniques, including those relying on secret sharing. We present four variations of the proposed model, comprising two coupled and two separable cases, leading to a high-capacity concealment approach. The efficacy of our approach is demonstrated through experimental validation.
APA, Harvard, Vancouver, ISO, and other styles
2

Kingston, Kato Gogo. "Concealment of Illegally Obtained Assets in Nigeria: Revisiting the Role of the Churches in Money Laundering." African Journal of International and Comparative Law 28, no. 1 (February 2020): 106–21. http://dx.doi.org/10.3366/ajicl.2020.0304.

Full text
Abstract:
Financial crime in Nigeria – including money laundering – is ravaging Nigeria's economic growth. In the past few years, the Nigerian government has made efforts to tackle money laundering by enacting laws and setting up several agencies to enforce the laws. However, there are substantial loopholes in the regulatory and enforcement regimes. This article seeks to unravel the involvement of the churches as key drivers in money laundering crimes in Nigeria. It concludes that the permissive secrecy which enables churches to conceal the names of their financiers and donors breeds criminality on an unimaginable scale.
APA, Harvard, Vancouver, ISO, and other styles
3

Kayshev, Andrey E. "Practical Issues of Collection of Tax Arrears of Organizations from Managers and Founders." Financial law 10 (October 8, 2020): 22–25. http://dx.doi.org/10.18572/1813-1220-2020-10-22-25.

Full text
Abstract:
The article analyzes the judicial practice of applying civil enforcement measures in the field of tax legal relations. The controversial issues concerning the powers of tax authorities to bring claims against authorized persons of organizations who have committed tax crimes, for compensation for harm caused to public law entities as a result of non-payment of taxes to the budget by the organization or as a result of concealment of the organization’s monetary assets are considered.
APA, Harvard, Vancouver, ISO, and other styles
4

Ляскало, Алексей Николаевич. "Financial Assets in Digital Form and How They Influence Classification of Crime." Legal Issues in the Digital Age 4, no. 4 (December 14, 2023): 48–67. http://dx.doi.org/10.17323/2713-2749.2023.4.48.67.

Full text
Abstract:
The approval of new legislative acts regulating the financial assets in digital form,including digital rights, digital currencies and the digital ruble, gives grounds forrethinking their legal status and influence on the sphere of criminal law enforcement.The purpose of the study is to identify the legal nature of financial assets in digitalform, taking into account the current state of legal regulation of their turnover, toassess the existing approaches and develop recommendations for the qualificationof crimes in which the subject or means of committing them are digital rights, digitalcurrency, digital ruble or electronic cash. From these perspective are considered theissues of qualification of crimes against property, drug crimes, corruption crimes,laundering of money or other property acquired by criminal means, bankruptcrimes, malicious evasion of repayment of accounts payable, concealment of fundsor property from the collection of taxes, fees, insurance premiums. The generalconclusion based on the results of the study is that financial assets in digital form,representing property rights, must be considered as a sign of these crimes, exceptwhen their actual involvement is beyond the scope of the crime. In order to determinethe dimensional characteristics of the relevant crimes, the issues of assessing thevalue of digital rights and digital currencies are considered.
APA, Harvard, Vancouver, ISO, and other styles
5

Gurdek, Magdalena. "THE OBLIGATION TO DISCLOSE THE SPOUSE’S SEPARATE PROPERTY IN A MAYOR’S FINANCIAL DISCLOSURE STATEMENT – CRITICAL COMMENTS ON THE DRAFT ACT." Roczniki Administracji i Prawa 2, no. XXIV (June 30, 2024): 79–90. http://dx.doi.org/10.5604/01.3001.0054.6729.

Full text
Abstract:
The transparency of the assets of persons performing key public functions is desired and expected by the public. However, the current regulations unfortunately do not guarantee it fully. Therefore, on 21 November 2023, a Draft Act Amending the Act on Restrictions on the Conduct of Business by Persons Performing Public Functions and Certain Other Acts was submitted by a group of Sejm members to the Speaker. This bill, commonly referred to as ‘clean hands’, provides for the principle under which the separate property of the spouses of state and local self-government officials will also have to be disclosed in the financial disclosure statements they submit. In the present study, the author analyses the proposed changes and assesses them through the prism of the principles and rights expressed in the Constitution. She also suggests adopting solutions that would effectively prevent the concealment of assets by persons obliged to submit financial disclosure statements.
APA, Harvard, Vancouver, ISO, and other styles
6

Saragih, Erwin Priyadi Hamonangan, M. Syukri Akub, Hamzah Halim, Hamzah Halim, and Amir Ilyas. "Efforts of The Prosecutor as State Attorney to Recovery Recovery of State Losses Through Replacement Money." Revista de Gestão Social e Ambiental 18, no. 6 (April 2, 2024): e05567. http://dx.doi.org/10.24857/rgsa.v18n6-079.

Full text
Abstract:
Purpose: The Corruption Law in Indonesia faces technical and normative challenges in collecting compensation for state losses. Technical obstacles include concealment of assets, inability of convicts or heirs to pay compensation, and rejection by heirs or third parties. In addition, corruptors often prefer to serve additional prison sentences as a substitute for compensation money. This law also lacks legal certainty and is disproportionate in regulating additional prison sentences. This research aims to find out the efforts of the Prosecutor as State Attorney in the effectiveness of returning compensation for State losses through the prosecution and execution of compensation for State losses resulting from criminal acts of corruption. Methode: This research is a normative-juridical type of research. Supported by 4 (four) approaches, philosophical approach, legislative approach, conceptual approach, and case approach. Result: The efforts of the State Attorney's Office in the field of prosecution by carrying out investigations, confiscation, prosecution, and confiscation of assets based on the judge's decision, auction, and execution, through the Prosecutor's Office's Asset Recovery Center (PPA) unit. Meanwhile, in the civil sector, by carrying out or facing a civil lawsuit by the suspect or a third party who objects to the action of confiscating property owned or under the control of the suspect. As in the investigation into the Jiwasraya and Asabri Corruption cases.
APA, Harvard, Vancouver, ISO, and other styles
7

Borsukovskyi, Yurii, and Victoria Borsukovska. "FINANCIAL CRIMES IN CYBER SPACE: RISKS AND THREATS OF LEGALIZATION OF ILLEGAL FINANCIAL ASSETS." Cybersecurity: Education, Science, Technique 4, no. 24 (2024): 150–60. http://dx.doi.org/10.28925/2663-4023.2024.24.150160.

Full text
Abstract:
The current Article covers the issues of counteraction to financial crimes in cyberspace. Cyberlaundering pose the significant threat to the world financial system as it assists criminals in concealing and further use of illicit assets. It also poses the challenge for law enforcement agencies which should adjust its methods in order not to fall behind the developing digital landscape. The Article considers the issue of modern technologies use for conduction of cybercrimes aimed at breach, destruction or creation threats to critical infrastructure and/or spreading of fears or panics with the ultimate goal in causing physical or economic damage to society or its population. The Article provides analysis of interaction between legalization of financial assets in cyberspace and cyberterrorism. It notes that the new type of terrorism uses the interconnectivity and vulnerability of digital systems and networks of modern society to reach it criminal goals. During last decade the cyberterrorism threat became more urgent problem for governments as well for businesses. Considering technologies continue to develop and more and more resources of critical infrastructure are connected to the world digital network the probability of cyberattacks to damage and failures became seriously real then ever before. The use of digital currencies significantly exacerbates and deepens these problems. The creation of digital currencies at the state level ensures direct trade procedures with countries which accept such payments without any converting at commonly used world currencies. It assists in concealment of source of financial transactions. Respectfully the world faces with issues for development of methods and algorithms of detection and proactive counteraction to financial crimes at cyberspace as an integral part of overall cybersecurity of information resources.
APA, Harvard, Vancouver, ISO, and other styles
8

Kantor, Natalia E. "Sham Owner: Issues of Legal Qualification." Zakon 21, no. 2 (February 2024): 37–52. http://dx.doi.org/10.37239/0869-4400-2024-21-2-37-52.

Full text
Abstract:
Sham holding of assets is a legal regime of the beneficiary’s property held by a fictitious owner for unfair purposes (such as concealment from its being recovered by creditors or divided in case of inheritance or divorce, etc.). The awareness by the sham owner of his status and the “incompleteness” of his rights are the key signs of this legal regime. Court action based on the appearance (pretense) is a primary way to protect interested parties in such circumstances, regardless of what the sham holding is based on — contractual obligation, corporate actions, trust relations, etc. The inclusion of concealed property into bankruptcy estate, inheritance, or common property of the spouses without challenging the underlying transactions on the grounds of the abuse of law may apply when special ways of protection (in particular, bringing the sham owner to joint and several liability) are not available.
APA, Harvard, Vancouver, ISO, and other styles
9

Kamensky, D. V., and S. S. Tytarenko. "Virtual assets as a tool for legalization of property obtained through criminal means: a comparative legal aspect." Uzhhorod National University Herald. Series: Law 2, no. 80 (January 20, 2024): 41–50. http://dx.doi.org/10.24144/2307-3322.2023.80.2.6.

Full text
Abstract:
The article deals with separate issues of legal evaluation and ways to counter dangerous practices of using virtual currencies in the course of legalizing property obtained through criminal means. The research analysis is based on the principle of interdisciplinary research with an active appeal to international and separately foreign experience of combating the legalization of criminal income through the use of transactions with cryptocurrencies. The position is argued, referring to specific examples of large-scale “financial-virtual” abuses, that Ukraine also needs to develop its own clear action plan regarding the legal regulation of the circulation of virtual assets, in particular by implementing effective national mechanisms to prevent (or at least reduce) money laundering practices of money obtained by criminal methods, taking into account the immediate threats to the financial system of Ukraine from the actions of a country that carries out armed aggression against our state. It was stated that although legal scholars traditionally have different approaches to the interpretation of the phenomenon of legalization of criminal income, there is still no complete understanding and definition of it, since money laundering can be considered as a multi-level phenomenon (as a crime, action, process, technology, stage, method and procedure, type of business activity, etc.), in scientific and practical circles, a common, established approach is to distinguish three main stages in the laundering of criminal proceeds: location, concealment and integration. It is shown that these stages cannot be equally applied to legalization schemes implemented using fiat or virtual currencies. In the final part of the article, the authors emphasized that the improvement of the domestic model of combating practices of legalization of money obtained by criminal methods should be implemented primarily by improving the regulatory framework and the system of organizational and legal measures to combat such practices by national regulators and individual departments of law enforcement agencies; at the same time, the criminal law component in the process of introducing proposed changes should have a conditionally secondary, auxiliary value.
APA, Harvard, Vancouver, ISO, and other styles
10

El Siwi, Yara. "Mafia, money-laundering and the battle against criminal capital: the Italian case." Journal of Money Laundering Control 21, no. 2 (May 8, 2018): 124–33. http://dx.doi.org/10.1108/jmlc-02-2017-0009.

Full text
Abstract:
Purpose This paper aims to look at the case of Italy, which clearly stands out in its relationship with organised crime. The recognition that money is the “lifeblood” of OC has resulted in the implementation of what we can refer to as the anti-money laundering (AML) regime, which backs the systematic targeting of mafia assets and the application of severe obstacles to the concealment of dirty money through increased financial surveillance. This paper discusses the financialisation of counter-mafia strategies, with the purpose of questioning the extent to which this system has been delivering what it promised. Design/methodology/approach The paper is divided into three chapters. The first chapter looks at the relationship between Italian mafia and dirty money. The second chapter discusses the rationale and pillars of the AML regime. Finally, the last section examines and discusses recent evidence of the outcome of AML policies, by looking at figures as reported by relevant entities, such as the Financial Intelligence Unit (FIU), Europol, the Italian Ministry of Interior and the Direzione Investigativa Anti-Mafia (DIA). Findings Evidence suggests that financial surveillance, the first pillar of the AML regime, is much costlier than it is beneficial to society. Reporting of suspicions has rocketed in the past years, bringing very little change to yearly ML convictions, and being only marginally helpful in mafia-related investigations, confiscations and arrests. The confiscation of assets from mafia members, i.e. the second pillar of the AML regime, has proven to be effective in gaining control over large sums and goods. However, more research is needed around the question of confiscated asset-management and desirable re-investment opportunities. Originality/value As the AML regime gains in prominence internationally, it is of great value to assess its achievements so far. This is especially true of a country like Italy, which suffers from a long-standing mafia dominance. This paper represents a modest initial inquiry, which will hopefully be complemented by future research to come to an in-depth understanding of the value and limitations of an AML regime in fighting OC.
APA, Harvard, Vancouver, ISO, and other styles
11

PÎRJOL, Ph.D, Pătru. "The use of radar for object detection in vegetated regions." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 12, no. 3 (October 6, 2023): 95–107. http://dx.doi.org/10.53477/2284-9378-23-34.

Full text
Abstract:
The FOPEN radar uses frequencies at VHF and UHF to penetrate the foliage of trees or buildings and detect bodies and people hiding under their cover. FOPEN is an important technology, being located on airborne and ground-based platforms and designed to aid surveillance of very large areas, especially those areas rich in vegetation, which are unsuitable for detection and identification using other sensors. The information the FOPEN radar provides ensures the necessary support for civil or military activities. The civilian use of FOPEN ensures the fulfillment of surveillance and monitoring missions of the Earth’s surface. The data provided will ensure the study of biodiversity, forests, land surface, etc. through the potential of this radar to detect bodies under the canopy of trees.The military use of FOPEN ensures the detection of enemy forces and assets concealed under foliage, whether they are moving or not. The images generated by FOPEN ensure the detection of targets by electromagnetic waves penetrating foliage or buildings, countering adversary camouflage, concealment, or deception techniques. The data provided by FOPEN ensures the necessary information support for decision-making processes during mission planning and execution.
APA, Harvard, Vancouver, ISO, and other styles
12

McKenzie, Rex, and Rowland Atkinson. "Anchoring capital in place: The grounded impact of international wealth chains on housing markets in London." Urban Studies 57, no. 1 (April 30, 2019): 21–38. http://dx.doi.org/10.1177/0042098019839875.

Full text
Abstract:
Taking as our focus the city of London over the last decade, we use state-held records of house sales to consider the impact of competition for housing resources in the luxury property market. This data suggests that the use of offshore investment vehicles and the concealment of wealth from national tax agencies have become key mechanisms by which housing resources have been exploited by the wealthy and their capital deployed by agents of the rich. Using the concept of wealth chains, we consider these methods of capital accumulation as these extending flows of managed capital become ‘anchored’ within specific urban spaces, in this case the luxury housing market of inner West London. Our analysis of a selection of these chains shows that the prevailing political management of the property economy benefits those already winning the war of inequality while looking to augment their capital and shield it from tax and regulation. The ultra-wealthy, financial intermediaries and multinational corporations have created chains articulated across space, with the effect of undermining the value of dwellings as homes, and have replaced them with assets to be traded in pursuit of private and offshore wealth gains. The result is an urban context that favours already advantaged and powerful interests and enables the avoidance of tax obligations desperately needed at a time of austerity and intense housing need.
APA, Harvard, Vancouver, ISO, and other styles
13

Marushev, A. D. "THE QUESTIONS OF DETERMINING THE PURPOSE OF A SEARCH IN THE PROCESS OF CRIMINAL BANKRUTCY INVESTIGATION." Actual problems of native jurisprudence, no. 06 (March 2, 2020): 153–57. http://dx.doi.org/10.15421/3919115.

Full text
Abstract:
The article is devoted to the economic crime investigations, namely criminal bankruptcy. The urgency of the topic is also due to the fact that the problem of investigating of economic crimes, namely criminal bankruptcy, is one of the most complex in the fight against economic crime and is latent. On the basis of investigations of forensic tactics, the perfection of the application of the procedural order and the tactics of conducting investigative (search) actions, especially the search, and the use of their results in proving, was continued. Determining the purpose of a search in the pre-trial investigation of crimes related to criminal bankruptcy is one of the priorities of both criminal procedural law and criminalistics. It is argued that in the process of planning criminal investigations from criminal bankruptcy it is necessary to trace the relationship between the things (items) of the search and the objects in which they may be hidden. The article formulates and proposes the typical goals of searching documents in the course of a search for investigators in criminal bankruptcy investigations, which include: from the materials of the investigation of criminal bankruptcy it follows that the documents contain information that can be used as evidence of the fact of committing criminal bankruptcy; the materials of the criminal proceedings show that the documents contain factual data about the unlawful acts of someone; from the materials of criminal proceedings it is evident that for a number of business operations falsified accounting documents were issued and there is a need for judicial expert examination (handwriting, technical examination of documents, etc.); the materials of criminal proceedings indicate the need for judicial and economic expertise; the criminal proceedings show that the documents reflecting the economic activity of the debtor enterprise have factual data on the transfer of assets of the enterprise and it is possible to identify the places of their concealment and the persons who received this property; from the materials of criminal proceedings it is seen that in personal documents, persons involved in committing crimes of criminal bankruptcy are actual data on the transfer of tangible assets (assets of the enterprise) to individual citizens for safekeeping. It is proved that without determining the purpose of the search, it is impossible to purposefully carry out search actions of separate documents containing information about the circumstances of committing criminal bankruptcy, finding material and material values that were obtained as a result of its commitment.
APA, Harvard, Vancouver, ISO, and other styles
14

Zamakhin, A. L. "Characteristics of the subjective aspect of the non-submission of a declaration by a person authorized to perform state or local self-government functions." Uzhhorod National University Herald. Series: Law 2, no. 80 (January 20, 2024): 36–40. http://dx.doi.org/10.24144/2307-3322.2023.80.2.5.

Full text
Abstract:
The article is dedicated to exploring the peculiarities of the subjective aspect of non-submission of declarations by subjects obliged to declare assets as persons authorized to perform the functions of the state or local self-government. The subjective aspect of a criminal offense is its internal side, reflecting the attitude of the consciousness and will of the person who committed the criminal offense towards their action and its consequences. Legal characteristics of the subjective aspect are guilt, motive, and purpose, which define its content. Guilt is the main and obligatory feature of every composition of a criminal offense. Article 3663 of the Criminal Code of Ukraine provides for a direct indication of the intentional form of guilt, but does not define the type of intent. Most scholars adhere to the point of view that this criminal offense can only be committed with direct intent, although some admit the possibility of indirect intent. Given that this criminal offense has a formal composition, the first point of view is more convincing. When failing to submit a declaration, the person must be aware of the social danger and unlawfulness of the action. The obligation of such awareness is also confirmed by judicial practice materials. The content of guilt is largely determined by the motive and purpose of the criminal offense. Purpose and motive are facultative characteristics of the subjective side of the general composition of a criminal offense. They are mandatory only when they are directly mentioned or unambiguously follow from the content of the article’s disposition. In establishing the subjective aspect of the criminal offense under Article 3663 of the Criminal Code, determining the motive with which the declarant acted is of great importance. The absence of evidence indicating a specific motive for non-submission of the declaration is a basis for concluding that the person did not actually realize the social danger and unlawfulness of their action, and thus, the absence of intent in their behavior. The Higher Anti-Corruption Court supports the same position. The usual purpose of non-submission of declarations by the subjects is considered to be the concealment of assets and funds previously obtained as a result of committing another criminal offense.
APA, Harvard, Vancouver, ISO, and other styles
15

Neklesa, Oleksandr, Elvira Sydorova, and Yana Paleshko. "Financial control as a tool in overcoming corruption." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 1, no. 1 (March 29, 2021): 326–32. http://dx.doi.org/10.31733/2078-3566-2021-1-326-332.

Full text
Abstract:
Corruption offenses nowadays remain a serious threat to the national security of a state. Persons empowered to perform state functions are the basic sources of corruption risks. The main document that outlines the basic principles of preventing and combating corruption in our country is the Law of Ukraine "On Principles of Preventing and Combating Corruption" and "On Amendments to Certain Legislative Acts of Ukraine on Liability for Corruption Offenses." Corruption in public finances is a threat that gives a momentum for the development of forgery of accounting and tax reporting documents, misappropriation of assets allocated for financial resources funds, concealment of financial transactions and falsification of business entities’ documents. State financial control should ensure the effective use of budgetary resources, extra-budgetary financial resources and state property. In order to combat corruption, it is necessary to introduce transparency at the stages of budget allocation and openness in the control system in this area. It is this transparency that will help not only to overcome corruption, but also to strengthen public confidence in the state and the fulfillment of its functional responsibilities. And also to ensure compliance with the supremacy of law in this area, i.e. to ensure the equality of all before the law and responsibility for violations. Financial control can be enhanced through effective audit. The essence of the audit is a real assessment of the feasibility of government programs on the criteria of economy, productivity and efficiency. It is an audit that is a separate and real source of data, as it does not belong to any political forces or institutions. Based on the above mentioned, it is advisable to adapt the existing audit system in Ukraine in accordance with the best foreign experience.
APA, Harvard, Vancouver, ISO, and other styles
16

Kamensky, D. V., and O. O. Dudorov. "Laundering of criminal proceeds through transactions with virtual currencies: a new threat to economic security." Analytical and Comparative Jurisprudence, no. 1 (March 20, 2024): 500–509. http://dx.doi.org/10.24144/2788-6018.2024.01.88.

Full text
Abstract:
The scientific article is devoted to certain aspects of legal (primarily criminal law) evaluation and countermeasures against dangerous practices of using virtual currencies for legalization of property obtained through criminal means. The basis of the author's research is an interdisciplinary approach to scientific knowledge, with the active use of international and separately foreign experience in countering the legalization of criminal income by using transactions with cryptocurrencies. The authors express a position, referring to specific examples of large-scale "financial-virtual" abuses, about the need for Ukraine to develop its own clear action plan regarding the legal regulation of the circulation of virtual assets, in particular by implementing effective national mechanisms to prevent (or at least reduce) the practice of laundering "dirty” funds taking into account the immediate threats to the financial system of Ukraine from the actions of a country that carries out armed aggression against our state. It is also emphasized that in criminal law science there is a plurality of approaches to determining legalization of criminal proceeds, because this type of illegal behavior is a complex phenomenon (crime, action, process, technology, stage, method and procedure, type of business activity, etc.). With reference to the scientifically and practically established approach to distinguish three main stages in the laundering of criminal proceeds (location, concealment and integration), the position is argued that these stages cannot be equally applied to legalization schemes combined with the use of fiat or virtual currencies. In the conclusions part of the article, it is emphasized that Ukraine, being integrated into the world economic community, must not only comply with special international standards, but also consider own priorities for the development of the national legal system and the current socio­economic situation in the country.
APA, Harvard, Vancouver, ISO, and other styles
17

Pacini, Carl, William Hopwood, George Young, and Joan Crain. "The role of shell entities in fraud and other financial crimes." Managerial Auditing Journal 34, no. 3 (March 4, 2019): 247–67. http://dx.doi.org/10.1108/maj-01-2018-1768.

Full text
Abstract:
Purpose The purpose of this paper is to review the use and application of shell entities, as they facilitate crime and terrorism, impede investigations and harm societies. Design/methodology/approach The study details the types and characteristics of shell entities, reviews actual cases to exhibit how shells are abused, outlines reasons shells disguise beneficial ownership and analyzes steps taken by countries and organizations to thwart the abuse of shell entities. Findings Many types of shell entities are used by white-collar criminals and are often layered in an intricate network which conceals the identity of beneficial owners. Nominees and bearer shares are used in tandem with shell entities to optimize concealment. Accountants, lawyers and trust and company service providers facilitate and promote the use and abuse of shell entities by lawbreakers. The G-8, Financial Action Task Force and G-20 have begun steps to improve ownership transparency, but the effort is moving at a modest pace. Research limitations/implications The analysis makes clear the reasons for and means by which the wealthy and powerful, along with criminals, conceal trillions of dollars of income and wealth that remain untaxed and may be used for nefarious purposes. The paper is limited by the paucity of data on concealed assets and their beneficial owners. Practical implications The findings clearly show the need for more concerted action by national governments, organizations, the United Nations and law enforcement and to improve ownership transparency and information exchange regarding shell entities. Social implications The findings demonstrate that shell entities used to conceal wealth prevent untold trillions in taxes from being collected by governments worldwide. This lack of revenue facilitates income inequality and skews national economic and fiscal policies. Also, more white-collar criminals and terrorist financiers could be brought to justice if ownership transparency is improved. Originality/value This study adds to the limited literature on shell entities, their characteristics and uses and abuses.
APA, Harvard, Vancouver, ISO, and other styles
18

Skidmore, Samuel J., Sydney A. Sorrell, and Kyrstin Lake. "A Relational-Cultural Approach to Examining Concealment among Latter-Day Saint Sexual Minorities." Religions 15, no. 2 (February 16, 2024): 227. http://dx.doi.org/10.3390/rel15020227.

Full text
Abstract:
Sexual minorities often conceal their sexual identity from others to avoid distal stressors. Such concealment efforts occur more frequently among sexual minorities in religious settings where rejection and discrimination are more likely. Using a sample of 392 Latter-day Saint (“Mormon”) sexual minorities, we assess (a) the effect of religious affiliation on concealment efforts, (b) the relationship between social support, authenticity, and religious commitment on concealment, and (c) the moderating effect of authenticity on religious commitment and concealment. Multi-level model analyses revealed that religious affiliation alone accounted for over half (51.7%) of the variation in concealment efforts for Latter-day Saint sexual minorities. Social support directly was related to less concealment, whereas religious commitment was related to more concealment, with authenticity moderating the impact of religious commitment on concealment efforts. The present study provides insight into how religious sexual minorities may approach relationships and inadvertently wound their chances to connect with others.
APA, Harvard, Vancouver, ISO, and other styles
19

Kim, Min Seong, and Eun Jung Kim. "The Effects of Internalized Shame on Suicidal Ideation Among College Students: Mediation Effects of Self-concealment and Entrapment." Korean Association For Learner-Centered Curriculum And Instruction 23, no. 5 (March 15, 2023): 217–30. http://dx.doi.org/10.22251/jlcci.2023.23.5.217.

Full text
Abstract:
Objectives The present study investigated whether self-concealment and Entrapment would mediate the relationship between Internalized shame and Suicidal ideation among college students. Methods Subjects were 325 college students who were asked to complete self-report questionnaires to assess internalized shame, self-concealment, entrapment and suicidal ideation. Structural Equation Modeling(SEM) analysis was performed using AMOS 22.0. Results First, entrapment mediated the relationship between internalized shame and suicidal ideation. Second, self-concealment has not mediated the relationship between internalized shame and suicidal ideation. Finally, the relationship between internalized shame and suicidal ideation was sequentially mediated by self-concealment and entrapment. Conclusions These results suggest that internalized shame can make more self-concealment and entrapment, and in turn it draws to more suicidal ideation.
APA, Harvard, Vancouver, ISO, and other styles
20

Senatorov, L. A., V. V. Khvorenkov, and A. V. Savelyev. "Assessment of Complex Signal Parameters Effect on the Energy Concealment Degree." Vestnik IzhGTU imeni M.T. Kalashnikova 25, no. 3 (September 25, 2022): 62–73. http://dx.doi.org/10.22213/2413-1172-2022-3-62-73.

Full text
Abstract:
The article deals with the problem of obtaining a qualitative assessment of the energy concealment degree of radio signals. Energy concealment is regarded as the most significant form of signal concealment, since a designer of radio transmitting devices has the most influence and the greatest freedom in defining these properties. The purpose of the article is to systematize the available knowledge about the methods of assessment of energy concealment in order to conduct a mutual comparison of the characteristics of various signals. The authors describe and analyze a number of methods for assessment of energy concealment of signals based on the number of necessary measurements of the signal level range of the signal reconnaissance, as well as probabilistic assessment of signal disclosure. The results of the analysis showed that described methods are not suitable for obtaining a comparative assessment. Based on the conclusions made in the study energy concealment assessment methods, the author's method for assessment the degree of energy concealment of signals in terms of transmitted symbol energy is proposed. The article clarifies the application of the method to assess the parameters of chirp signals, narrowband and wideband FM, BPSK, QPSK, as well as quadrature signals. A comparative assessment of the chirp, FM, BPSK, QPSK and QAM-16 signal parameters for the decimeter VHF band is obtained, taking into account the transmission speed and power. Assessment of energy concealment of signals were obtained at typical information transfer rates. On the basis of the results, some regularities were described that make it possible to evaluate the effect of changing individual parameters of a radio transmitting device on final energy concealment.
APA, Harvard, Vancouver, ISO, and other styles
21

Holovkin, Bohdan. "About corruption in the private sector." Law Review of Kyiv University of Law, no. 4 (December 30, 2020): 347–54. http://dx.doi.org/10.36695/2219-5521.4.2020.62.

Full text
Abstract:
The article considers the problem of corruption in the private sector of Ukraine’s economy. According to the World Research ofEconomic Crimes and Fraud 2020, 47 % of Ukrainian companies have suffered from illegal misappropriation, bribery and corruptionin the last 24 months. Despite the serious damage from corruption to business and the national economy, this problem remains poorlyunderstood in Ukraine.Corruption in the private sector exists in two forms: 1) bribery in the commercial interests of officials and employees of privatesector entities, as well as civil servants or persons providing public services; 2) abuse of power by officials of a legal entity of privatelaw and persons who provide public services in order to obtain illicit benefit for themselves or third parties.For commercial bribery (bribery in commercial intersets) are characterized by the following features: a) commercial interest andeconomic purpose; b) various subjects of “active” and “passive” actions related to bribery; c) illicit benefit as a means to an end; d) thepurpose of bribery to incline a person to certain actions or omissions related to the use of the powers granted in the interests of others;e) intentional criminal acts in the form of providing / receiving illicit benefits in exchange for pre-determined actions or omissions;f) various ways of committing bribery for commercial purposes.Commercial bribery takes the form of an informal business agreement, the content of which is the mutual obligations of the parties,determining the type, amount of illicit gain and the specific conditions of its provision / receipt. The subject of bribery is an illicitbenefit. Subjects of commercial bribery are divided into two types: active (providers of illicit benefits) and passive (recipients of illicitbenefits). The appointment of commercial bribery is the legal or illegal promotion of entrepreneurial activity, or the creation of conditionsor concealment of criminal activity of businessmen. The purposes of commercial bribery are commercial or banking secrecy,insider information, documents, decisions, services, power influence. Commercial bribery is committed within two types ofrelationships: business-business and business-power.Abuse of power by leaders and managers of private firms is carried out for the purpose of theft or misappropriation of companyproperty, or seizure of assets.Corruption in business is used as a tool to gain access to material resources, increase business profitability and gain illegal economicbenefits. Through organized corruption, the control of the market of goods and services, management of shadow financial flows,redistribution of assets and revenues of large, small and medium-sized businesses, the impact on economic policy of state. Corruptionin the private sector is one of the main obstacles to sustainable development and economic growth and poses a threat to Ukraine’snational security.
APA, Harvard, Vancouver, ISO, and other styles
22

Kazak, Oksana O., and Mariana O. Sulyma. "THE IMPACT OF EVENTS AFTER THE REPORTING DATE ON THE FINANCIAL POSITION AND PERFORMANCE OF BANKS." Academic Review 1, no. 60 (January 2024): 80–92. http://dx.doi.org/10.32342/2074-5354-2024-1-60-6.

Full text
Abstract:
Banks maintain their accounting records and prepare financial statements in accordance with IFRS. Annual financial statements are a set of reports that characterize the financial position, results of the bank’s operations, cash flows and changes in equity for the year. It is interesting to note that the end of the reporting period is only the beginning of the stage of preparation and disclosure of financial statements. After all, in addition to the reporting date and the date of disclosure of the annual financial statements, which are known to the general public, there is a whole list of dates that are known only to managers, accountants and auditors. These are the date of completion of preparation, the date of submission to the Board of Directors, the date of partial disclosure of certain indicators, such as profit, the date of approval of the financial statements by shareholders, etc. As a rule, the reporting date is December 31 of the respective year, although it may be different in accordance with IFRS. Accordingly, the date of publication of the annual financial statements is April 30 of the year following the reporting year. At the same time, a certain period of time elapses between the reporting date and the date of approval of the financial statements. The Bank’s operations are ongoing, and therefore, there is a high probability that new events and circumstances may arise. IFRSs recommend disclosing information about events that occur between the reporting date and the date the financial statements are authorized for issue or the date the financial results or selective information is available. Such recommendations should not be ignored, as this may indicate the concealment of important information or even be classified as fraud. Events after the reporting period are any events, which may be positive or negative, favorable or unfavorable, that occur from the end of the reporting period until the financial statements are authorized for issue. The classification of these events depends on the date of their probable occurrence and, accordingly, their impact on the financial statements. In general, these are events that affect the financial statements and require adjustments or events that do not require adjustments. It is worth paying attention to events after the reporting period that may affect the going concern basis. IFRS prohibit banks from preparing financial statements on a going concern basis if events after the reporting period indicate that such an assumption is inappropriate. The decision to use the going concern basis is based on a checklist of going concern triggers and their detailed analysis. The checklist of triggers includes: economic and geopolitical situation; level of income and cash flows of the bank; liquidity and solvency of the bank, as well as current and future profitability; financial position of counterparties; external and internal factors affecting the work of employees. For the financial statements prepared for the year ending December 31, 2021, the war and its consequences are events that do not require adjustment, as they reflect conditions that arose after the reporting period. For example, the company’s assets were damaged as a result of hostilities between the end of the reporting period and the authorization of the financial statements for issue. In accordance with IFRS, any impairment losses will be recognized in the period in which they occur. Accordingly, information on significant losses from asset damage will not adjust the 2021 financial data, but should be disclosed in the notes to the financial statements. The study analyzed the notes to the annual financial statements of banks for 2019-2022.
APA, Harvard, Vancouver, ISO, and other styles
23

Boostani, R., and M. Sabeti. "MULTI-CHANNEL ECG-BASED STEGANOGRAPHY." Biomedical Engineering: Applications, Basis and Communications 30, no. 06 (November 29, 2018): 1850046. http://dx.doi.org/10.4015/s1016237218500461.

Full text
Abstract:
There is a growing tendency for the concealment of secure information into electrocardiogram (ECG) signals in a way that the embedded ECGs still remain diagnosable. The average length of ECG recording for a primary diagnosis takes no longer than 1[Formula: see text]min yielding to limit its concealment capacity. To overcome this drawback, we enhanced both concealment capacity and embedding quality by: (I) using 12-lead ECGs to span more embedding space, (II) shuffling input message bits via nonlinear feedback shift register (NLFSR) method, (III) inserting the selected bits of each channel into the high-frequency wavelet coefficients of non-QRS parts. Inserting the message bits into high frequency coefficients of less important ECG parts leads to preserve the quality watermarked ECGs. To assess the proposed method, a text containing different letters (changes with size of both non-QRS segments and high-frequency sub-band) was hidden through 12-lead ECG signals of 56 randomly selected subjects of PTB database, where each signal length is 10[Formula: see text]s. The performance was compared to state-of-the-art ECG-based steganography schemes in terms of the following criteria: percentage residual difference (PRD), peak signal to noise ratio (PSNR), structural similarity index measure (SSIM) and bit error rate (BER). Our results showed that the proposed scheme has benefits of fast computing along with secure embedding, providing high capacity of data hiding.
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Bo, Volodymyr Kharchenko, Alexander Kukush, and Nataliia Kuzmenko. "UNMANNED AERIAL VEHICLES TRAJECTORY ANALYSIS CONSIDERING MISSING DATA." Transport 34, no. 3 (February 22, 2019): 155–62. http://dx.doi.org/10.3846/transport.2019.8544.

Full text
Abstract:
Researches very often deal with the problem of missing data. This issue is caused by impossibility of data obtaining, its distortion or concealment. The goal of present paper is to recover missing data and to analyse Unmanned Aerial Vehicles (UAV) trajectory based on the degree of deviation from pre-planned trajectory. The range probability approach is used to assess flight situation. The results of trajectory analysis for real position data of UAV are demonstrated.
APA, Harvard, Vancouver, ISO, and other styles
25

Małecka, Joanna, and Radwan Kharabsheh. "Selective knowledge concealment – the influence of culture and mental models vs. the ability to share knowledge." Horyzonty Polityki 14, no. 49 (December 31, 2023): 73–91. http://dx.doi.org/10.35765/hp.2515.

Full text
Abstract:
RESEARCH OBJECTIVE: Knowledge management (KM) issues support the possibility of achieving competitive advantage. However, it is not a simple process, as knowledge sharing does not come naturally. Hence, there is a need for research on individual, team and organisational antecedents using a wider range of methods. Investigating the causes of selective knowledge concealment is the main objective of the article, as well as the impact of organisational culture and the determinants of knowledge concealment or sharing by employees. THE RESEARCH PROBLEM AND METHODS: Individual in-depth interviews were conducted with managers and employees to collect empirical data, while thematic content analysis was used to analyse the collected data and draw conclusions. THE PROCESS OF ARGUMENTATION: Perceptions of the world and of organisations are shared by people from a given environment. Mental models take into account the multifaceted nature of the phenomena under study: perception, focus and experience. The beliefs held by employees are important because they imply management actions at all levels: tactical, operational and strategic. RESEARCH RESULTS: Employees do not hide their knowledge automatically but selectively. They subliminally assess the value of the knowledge sought, the value of the seeker, the immediate situation and wider contextual and organisational factors. Interestingly, respondents surveyed were more likely to share knowledge with foreign colleagues from a different national culture than with colleagues of the same nationality and cultural background. CONCLUSIONS, INNOVATIONS AND RECOMMENDATIONS: A number of recommendations of an applied nature were presented in the article. It is important to create a common willingness to share knowledge among employees. A skilful increase in social capital should foster a decrease in the concealment of valuable knowledge and at the same time increase the extent of sharing. An efficient reward system, individually designed for the needs of the organisation, could support this process.
APA, Harvard, Vancouver, ISO, and other styles
26

Barbui, C., and A. Cipriani. "Cluster randomised trials." Epidemiology and Psychiatric Sciences 20, no. 4 (July 28, 2011): 307–9. http://dx.doi.org/10.1017/s2045796011000515.

Full text
Abstract:
Although randomised controlled trials are the reference methodology to assess the effects of therapeutic interventions, for interventions that naturally occur in groups of individuals random allocation of participants may be inappropriate. In these cases, the unit of random allocation may be the group or cluster, rather than the individual. Clinical trials that randomly allocate groups or clusters of individuals are called cluster randomised trials. This article briefly presents the main implications of cluster randomisation with respect to the following methodological aspects: generalisability, concealment of allocation, comparability at baseline, blindness, loss of clusters and intra-class correlation.
APA, Harvard, Vancouver, ISO, and other styles
27

Frick, Nicholas RJ, Felix Brünker, Björn Ross, and Stefan Stieglitz. "Comparison of disclosure/concealment of medical information given to conversational agents or to physicians." Health Informatics Journal 27, no. 1 (January 2021): 146045822199486. http://dx.doi.org/10.1177/1460458221994861.

Full text
Abstract:
Within the anamnesis, medical information is frequently withheld, incomplete, or incorrect, potentially causing negative consequences for the patient. The use of conversational agents (CAs), computer-based systems using natural language to interact with humans, may mitigate this problem. The present research examines whether CAs differ from physicians in their ability to elicit truthful disclosure and discourage concealment of medical information. We conducted an online questionnaire with German participants ( N = 148) to assess their willingness to reveal medical information. The results indicate that patients would rather disclose medical information to a physician than to a CA; there was no difference in the tendency to conceal information. This research offers a frame of reference for future research on applying CAs during the anamnesis to support physicians. From a practical view, physicians might gain better understanding of how the use of CAs can facilitate the anamnesis.
APA, Harvard, Vancouver, ISO, and other styles
28

Radieva, Maryna. "INSTITUTIONAL MODERNIZATION OF THE GLOBAL ECONOMY." Baltic Journal of Economic Studies 4, no. 5 (February 11, 2019): 283. http://dx.doi.org/10.30525/2256-0742/2018-4-5-283-290.

Full text
Abstract:
The aim of the research is the improvement of the concept of the institutional structure of the economy in the conditions of corporatization on the basis of researching the international experience of development of stable basic institutions of the institutional environment. Methodology. The methodological basis of the study is the provisions of the institutional theory using the analysis methodology “institutional matrix”. Historical-logical and dialectical methods were also used to study the contradictions in the processes of formation and development of the international institutional environment. Results. Institutional dynamics is the result of the functioning of a global international and specific national institutional environment, a formed subclass, ideological, economic, nationalhistorical factors, essential values, ethnic characteristics and characteristics of the nation’s mentality that are formed under the influence of long-term cultural influence and as a result of social interaction. Forced creation of new structures and private-property relations, supported by a massive import of market institutions in the absence of adequate national formal institutions and informal corporate culture, has led to non-fulfilment of contracts, a low business culture, opportunistic behaviour and informal contracts. In the process of introducing economic agents to institutional changes, invent quasi-market mechanisms: the predatory use of all types of resources, barter, income concealment, shadow schemes of tax evasion, offshore, “under-the-counter” wages, raiding, corruption at all levels of government, wide scale and versatility opportunism, violation of contracts, and the consumption of fixed assets. These manifestations intensified the structural deformations of the market and the transformational risks of the national economy. It is revealed that the development of the corporate economy on an innovative basis under the influence of globalization and monopolization, changes the individual institutions of the basic Y- and X- matrices. A new concept is proposed for constructing an institutional matrix using two principles of economic distribution: the market economy and the distribution economy; on the corporate and individual sectors of the economy. Two types of institutional matrices – corporate K-matrices and individual I-matrices – function in basic X- and Y-matrices, dividing each of the economies into two unequal parts (in terms of effectiveness, influence and significance of consequences). Corporate transformations turn individual complementary institutions of the market economy into the basic institutions of the corporate part of the Y-economy. Continuing institutional displacement requires finding the optimal balance between basic and complementary institutions in the corporate and unincorporated sectors of the Ukrainian economy, based on the use of specific institutional matrices, which will allow for institutional construction and minimize the social costs of the country’s evolutionary development. The concept of the institutional-matrix structure of the economy has been improved taking into account the modern tendencies of corporatization. The economy is defined as a set of basic institutions of two types of matrices that are unequal in efficiency, influence and significance of consequences: the corporate K-matrix and the individual private ownership of the I-matrix. Practical implications. The distribution of the economy into the corporate and individualprivate ownership sectors was the result of institutional transformations of certain complementary institutions of the market economy into basic ones, reveals the ways and sustainable mechanisms of institutionalization for the effective transformation of local institutional environments. The creation of an effective institutional environment will be ensured through the cultivation of institutional changes. Value/originality. The ongoing institutional displacement due to the intensification of the processes of monopolization and internationalization requires the search for an optimal balance of basic and complementary institutions in the corporate and unincorporated sectors of the Ukrainian economy, based on the use of specific institutional matrices, which will allow for institutional construction and minimize the social costs of the country’s evolutionary development.
APA, Harvard, Vancouver, ISO, and other styles
29

Al-Qadhi, Gamilah, Iman Aboushady, and Niyaz Al-Sharabi. "The Gingiva from the Tissue Surrounding the Bone to the Tissue Regenerating the Bone: A Systematic Review of the Osteogenic Capacity of Gingival Mesenchymal Stem Cells in Preclinical Studies." Stem Cells International 2021 (June 12, 2021): 1–26. http://dx.doi.org/10.1155/2021/6698100.

Full text
Abstract:
The current review aims to systematically assess the osteogenic capacity of gingiva-derived mesenchymal stem cells (GMSCs) in preclinical studies. A comprehensive electronic search of PubMed, Embase, Web of Science, and Scopus databases, as well as a manual search of relevant references, was performed in June 2020 without date or language restrictions. Eligibility criteria were the following: studies that compared mesenchymal stem cells (MSCs) derived from the gingiva with other MSC sources (in vitro or in vivo) or cell-free scaffold (in vivo) and studies that reported at least one of the following outcomes: osteogenic potential and new bone formation for in vitro and in vivo, respectively. Moreover, the assessment of included studies was conducted using appropriate guidelines. From 646 initial retrieved studies, 35 full-text articles were subjected to further screening and 26 studies were selected (20 in vitro studies and 6 in vivo studies). GMSCs showed great proliferation capacity and expressed recognized mesenchymal stem cell markers, particularly CD90. In vitro, MSC sources including GMSCs were capable of undergoing osteogenic differentiation with less ability in GMSCs, while most in vivo studies confirmed the capacity of GMSCs to regenerate bony defects. Concerning the assessment of methodological quality, in vitro studies met the relevant guideline except in five areas: the sample size calculation, randomization, allocation concealment, implementation, and blinding, and in vivo publications had probably low risk of bias in most domains except in three areas: allocation concealment, attrition, and blinding items.
APA, Harvard, Vancouver, ISO, and other styles
30

Fraser, Fiona J., and Peter J. Whitehead. "Predation of artificial ground nests in Australian tropical savannas: inverse edge effects." Wildlife Research 32, no. 4 (2005): 313. http://dx.doi.org/10.1071/wr04021.

Full text
Abstract:
Depredation of artificial ground nests was examined in tropical savanna in northern Australia to assess potential predation pressures on nests of the partridge pigeon (Geophaps smithii), a declining tropical granivore. Predation rates were examined at two sites, Kakadu National Park (which supported a relatively high density of partridge pigeons) and Berry Springs (which had greater habitat fragmentation and comparatively low partridge pigeon density). The effects of distance from road, understorey structure, topography and nest-microsite concealment on nest predation rates were examined. Artificial-nest predation rates were greater at 150 m from roads than <1 m from the roadside. Predation rates did not vary with understorey structure, topography, or level of nest concealment. There was marked variation between sites, with predation levels at Kakadu more than double those recorded for Berry Springs. Discerning predator identity, or even the size of a predator, from marks left in clay eggs proved difficult and was possible for ~35% of predation events. Of these, 42% of predation events involved predators of a size we considered too small to take a natural partridge pigeon nest. We suggest that extrapolation from artificial to natural ground-nest predation rates be undertaken with caution for landscapes such as Australia’s tropical savanna, which supports a high diversity and abundance of small potential predators of artificial nests. There was no evidence of predation by birds, and the methodology proved inadequate for identifying predation by feral cats (Felis catus).
APA, Harvard, Vancouver, ISO, and other styles
31

Toulmonde, Maud, Carine Bellera, Simone Mathoulin-Pelissier, Marc Debled, Binh Bui, and Antoine Italiano. "Quality of Randomized Controlled Trials Reporting in the Treatment of Sarcomas." Journal of Clinical Oncology 29, no. 9 (March 20, 2011): 1204–9. http://dx.doi.org/10.1200/jco.2010.30.9369.

Full text
Abstract:
PurposeRandomized controlled trials (RCTs) represent the best evidence in oncology practice. The aim of this study was to assess the reporting quality of sarcoma RCTs and to identify significant predictors of quality.Patients and MethodsTwo investigators searched MEDLINE for pediatric and adult bone and soft tissue sarcoma RCTs published between January 1988 and December 2008. The quality of each report was assessed by using a 15-point overall reporting quality score based on 15 items from the revised Consolidated Standards of Reporting Trials (CONSORT) statement (overall quality score [OQS] range, 0 to 15 points). Concealment of allocation, appropriate blinding, and analysis according to intention-to-treat principle were assessed separately because of their crucial methodologic importance by using a 3-point key methodologic index score (MIS; range, 0 to 3).ResultsWe retrieved 72 relevant RCTs that included 16,029 patients. The median OQS was 9.5. Allocation concealment, blinding, and analysis by intent to treat were reported only in 21 (29%), nine (12.5%), and 23 (32%) of the 72 RCTs, respectively. The median MIS was 1 with a minimum of 0 and a maximum of 2. On multivariate analysis, publication after 1996 and high impact factor remained independent and significant predictors of improved OQS. The sole variable associated with improved MIS was the publication of chemotherapy-only trials.ConclusionAlthough the overall quality of sarcoma RCTs reporting has improved over time, reporting of key methodologic issues remains poor. This may lead to biased interpretation of sarcoma trial results.
APA, Harvard, Vancouver, ISO, and other styles
32

Applegate, Jason R., and Jim Steinman. "A Comparison of Tree Health Among Forest Types and Conditions at Fort A.P. Hill, Virginia." Southern Journal of Applied Forestry 29, no. 3 (August 1, 2005): 143–47. http://dx.doi.org/10.1093/sjaf/29.3.143.

Full text
Abstract:
Abstract Fort A.P. Hill's Range and Training Land Assessments (RTLA) program initiated long-term monitoring of installation forests to assess forest health and ensure optimal sustainability of forest resources for military training activities. A subset of forest health indicators developed by the USDA Forest Service Forest Health Monitoring (FHM) and Forest Inventory and Analysis programs were used to assess forest health on Army training lands at Fort A.P. Hill, Virginia. Indicators of tree crown condition and tree damage condition were taken in forested areas where military training occurs, “tactical concealment areas (TCAs),” and on continuous forest monitoring (CFM) plots established in control stands where military training is absent. A higher percent of trees with high crown dieback, low crown density, and multiple types of stem damage were observed within TCAs than on CFM plots. The results are indicative of possible long-term changes to forest health from military training activities. The FHM forest health indicators proved to be an effective and useful approach to assess tree conditions. South. J. Appl. For. 29(3):143–147.
APA, Harvard, Vancouver, ISO, and other styles
33

Lai, Rose, Rong Chu, Michael Fraumeni, and Lehana Thabane. "Quality of Randomized Controlled Trials Reporting in the Primary Treatment of Brain Tumors." Journal of Clinical Oncology 24, no. 7 (March 1, 2006): 1136–44. http://dx.doi.org/10.1200/jco.2005.03.1179.

Full text
Abstract:
Purpose To assess the reporting quality of randomized controlled trials (RCTs) in the primary treatment of brain tumors and to identify significant predictors of quality. Patients and Methods Two investigators searched MEDLINE, EMBASE, and bibliographies of retrieved articles for RCTs in the primary treatment of brain tumors published between January 1990 and December 2004. We assessed the quality of overall reporting and key methodologic factors reporting (allocation concealment, blinding, and intention to treat [ITT]). Two investigators also rated articles independently using items from the revised Consolidated Standards of Reporting Trials statement. A generalized estimated equation was used to generate regression models that identified significant factors associated with quality of reporting. Results We retrieved 74 relevant RCTs that randomly assigned 14,498 brain tumor patients. The quality of overall reporting has improved during the last 15 years, but eight of the 15 methodologic items were reported in less than 50% of trials. In the appraisal of the reporting quality of key methodologies, allocation concealment, blinding, and adherence to the ITT principle were reported in less than 30% of articles. Multivariable regression models revealed that an impact factor more than 1.66, publication after 1995, and sample size more than 280 were significant factors associated with better overall reporting, whereas complete industrial funding, impact factors more than 2.64, and positive primary outcomes were predictors of higher ratings of the three most important methodologic qualities. Conclusion Despite improvement in general reporting quality, key methodologies that safeguard against biases may still benefit from better description. Significant factors associated with better reporting may act as surrogates for other characteristics.
APA, Harvard, Vancouver, ISO, and other styles
34

Scherer, Frank F. "UFA Orientalism. The “Orient” in Early German Film: Lubitsch and May." CINEJ Cinema Journal 1 (October 6, 2011): 89–98. http://dx.doi.org/10.5195/cinej.2011.24.

Full text
Abstract:
Fantastic images of the exotic pervade many early German films which resort to constructions of “Oriental” scenes. Stereotypical representations of China, India, Babylon, and Egypt dominate the Kino-screens of Weimar Germany. These films were produced in the UFA studios outside Berlin by directors such as Ernst Lubitsch (Sumurum/ One Arabian Night, 1920; Das Weib des Pharaos/The Love of Pharaoas 1922) and John May (Das Indische Grabmal/ The Indian Tomb, 1921). Yet, where recent observers resist the use of a postcolonial perspective it becomes difficult to assess the cinematographic exoticism of post-WWI Germany.This essay, therefore, offers both a discussion of Edward Said’s ‘Orientalism’and a psychoanalytical thesis on the concealment and supposed healing of post-1918 Germany’s national narcissistic wounds by emphasizing Eurocentric difference in its filmic representations of the Orient.
APA, Harvard, Vancouver, ISO, and other styles
35

McBride, Maranda, and Lemuria Carter. "Teen Texting While Driving." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 1647–51. http://dx.doi.org/10.1177/1541931213601379.

Full text
Abstract:
This study was designed to identify key components that affect teenagers’ intent to text while driving by developing and administering a survey to identify psychological profiles of teenagers who are more or less likely to comply with TWD laws. Such profiles may be used to create unique TWD law compliance training protocols designed to address specific teenager characteristics. The method included the administration of a 108-item Likert-scale survey to young drivers age 15 through 21. The survey consisted of a set of demographic questions; a Big Five personality assessment; and items to assess attitudes, norms, and perceptions associated with TWD. The results of the regression analysis performed on the data indicate the following factors potentially impact teenager TWD behavior: perceived behavioral control, subjective norm, and TWD concealment attitude.
APA, Harvard, Vancouver, ISO, and other styles
36

Brinkman, Nolan, and Laura Jacobi. "The Projection of Racial Identity on Social Network." Journal of Intercultural Communication 20, no. 1 (March 30, 2020): 52–64. http://dx.doi.org/10.36923/jicc.v20i1.297.

Full text
Abstract:
This quantitative study examined the projection of racial identity on social networks. A survey was distributed to 347 college students from a medium sized Midwestern university to assess ways in which participants depicted their racial identity on Facebook, Twitter, and Instagram. More specifically, scales were used to examine the use of photos and text, concealment of racial identity, and interactions with race related content. Results suggest that although participants do not intentionally hide or filter out their racial identity on social networks, they do not intentionally display racial identity on social networks either. In addition, independent samples t tests reveal that non-Caucasian participants are significantly more likely to post photos, communicate with others about their racial identity, and interact with racial content on social networks than Caucasian participants. Implications of the findings are discussed.
APA, Harvard, Vancouver, ISO, and other styles
37

Mansouri, A., B. Cooper, S. Shin, and D. Kondziolka. "Deficiencies in the reporting quality of RCTs in neurosurgery: How can we do better?" Canadian Journal of Neurological Sciences / Journal Canadien des Sciences Neurologiques 42, S1 (May 2015): S12. http://dx.doi.org/10.1017/cjn.2015.80.

Full text
Abstract:
Background: Deficiencies in design and reporting of randomized controlled trials (RCTs) limit their validity. The quality of recent RCTs in neurosurgery was analyzed to assess adequacy of design and reporting. Methods: A high-yield search of the MEDLINE and EMBASE databases (2000-present) was conducted. The CONSORT and Jadad scales were used to assess the quality of design/reporting. A PRECIS-based scale was used to designate studies on the pragmatic-explanatory continuum. Spearman’s test was used to assess correlations. Regression analysis was used to assess associations. Results: Sixty-one articles were identified. Vascular was the most common sub-specialty (37%). The median CONSORT and Jadad scores were 36 (IQR 27.5-39) and 3 (IQR 2-3). Blinding, sample size calculation and allocation concealment were most deficiently reported. The quality of reporting did not correlate with the study impact. The majority of studies (83%) had pragmatic objectives; while pragmatic studies had compatible design factors, trials with explanatory objectives were less successful. Conclusions: The prevalence and quality of neurosurgical RCTs is low. Many study designs are not compatible with stated objectives. Given the role of RCTs as one of the highest levels of evidence, it is critical to improve on their methodology and reporting. Alternative methodologies merit discussion.
APA, Harvard, Vancouver, ISO, and other styles
38

Sousa, António C., Diogo L. Marques, Daniel A. Marinho, Henrique P. Neiva, and Mário C. Marques. "Assessing and Monitoring Physical Performance Using Wearable Technologies in Volleyball Players: A Systematic Review." Applied Sciences 13, no. 7 (March 23, 2023): 4102. http://dx.doi.org/10.3390/app13074102.

Full text
Abstract:
Wearable devices have been used to assess and monitor volleyball performance. Given the diversity of technologies used and the variables measured, this study aimed to synthesize and review the wearable technology used to assess and monitor physical performance in volleyball players. A comprehensive search of published articles was performed in the following databases: Web of Science, PubMed, and Scopus, up to 23 October 2022. Studies with volleyball players of any age that used a wearable device to assess or monitor physical performance (e.g., jump height) were included. Nine studies conducted with male or female volleyball players were included. The participants’ age ranged between 16 and 32 years. Eight studies used Triaxial IMU, and one study used Vertec IMU. The performance analysis was based on vertical jump ability (n = 7) and overall volleyball performance (n = 2). Of the nine studies analyzed, 75% of the studies revealed blinding at the participant level and allocation concealment, and 95% reported a low risk of bias in the outcome assessment. This study shows that monitoring and assessing vertical jump ability through wearable devices is an increasing procedure in volleyball. Therefore, as jump height is a critical variable in athletic performance in volleyball, coaches and researchers might consider using wearable devices to assess and monitor physical performance changes in volleyball players.
APA, Harvard, Vancouver, ISO, and other styles
39

Hall, Jenny. "With Criminal Intent? Forgers at Work in Roman London." Britannia 45 (April 16, 2014): 165–94. http://dx.doi.org/10.1017/s0068113x14000191.

Full text
Abstract:
AbstractOver 800 clay coin moulds, excavated from 85 London Wall in 1988, had been used for casting copies of silver denarii and copper-alloy dupondii and asses which dated from Trajan to Trebonianus Gallus. The discovery of the moulds in the ditch ofLondinium's defensive wall led initially to thoughts that this was the concealment of incriminating evidence, but it is now recognised that counterfeiting coins was rife and perhaps even uncontrollable. The wide variety of moulds made it a complicated task to identify the numbers and types of coins used to make the moulds. This article describes the types of moulds found, examines how the moulds were produced, and discusses the prevalence of coin moulds at differing periods and on differing sites in Roman Britain and on the Continent.
APA, Harvard, Vancouver, ISO, and other styles
40

Gao, Zhenyi, Jiayang Sun, Haotian Yang, Jiarui Tan, Bin Zhou, Qi Wei, and Rong Zhang. "Exploration and Research of Human Identification Scheme Based on Inertial Data." Sensors 20, no. 12 (June 18, 2020): 3444. http://dx.doi.org/10.3390/s20123444.

Full text
Abstract:
The identification work based on inertial data is not limited by space, and has high flexibility and concealment. Previous research has shown that inertial data contains information related to behavior categories. This article discusses whether inertial data contains information related to human identity. The classification experiment, based on the neural network feature fitting function, achieves 98.17% accuracy on the test set, confirming that the inertial data can be used for human identification. The accuracy of the classification method without feature extraction on the test set is only 63.84%, which further indicates the need for extracting features related to human identity from the changes in inertial data. In addition, the research on classification accuracy based on statistical features discusses the effect of different feature extraction functions on the results. The article also discusses the dimensionality reduction processing and visualization results of the collected data and the extracted features, which helps to intuitively assess the existence of features and the quality of different feature extraction effects.
APA, Harvard, Vancouver, ISO, and other styles
41

Tu, Xiang, Gaomin Huang, and Shengkui Tan. "Chinese Herbal Medicine for Dysfunctional Uterine Bleeding: A Meta-Analysis." Evidence-Based Complementary and Alternative Medicine 6, no. 1 (2009): 99–105. http://dx.doi.org/10.1093/ecam/nem063.

Full text
Abstract:
We conducted a systematic review to evaluate the efficacy and safety of Chinese herbal medicine (CHM) for dysfunctional uterine bleeding (DUB) by performing a meta-analysis. Randomized controlled trials (RCTs) or quasi-RCTs comparing CHM vs no treatment, placebo, conventional western medicine (CWM), or general non-specific surgical treatment for DUB were identified by electronic and manual searches. Trials of CHM treatments with CWM treatments were compared with CWM treatments alone. Jadad scale and allocation concealment were used to assess the quality of included studies. Four RCTs or quasi-RCTs involving 525 patients were included. The methodological quality was poor in all trials except one trial. No serious adverse events were reported in the included studies. With the lack of trials comparing CHM with no treatment or placebo, it is impossible to accurately evaluate the efficacy of CHM. However, CHM in these studies seem to show an encouraging comparative effectiveness with CWM. More RCTs with a higher quality are required.
APA, Harvard, Vancouver, ISO, and other styles
42

Liu, Liang, Xiao Yue, Yu Xiao, and Qiang Wang. "Safety and efficacy of enhanced recovery after surgery among patients undergoing percutaneous nephrolithotomy: protocol for a systematic review and meta-analysis." BMJ Open 13, no. 10 (October 2023): e074455. http://dx.doi.org/10.1136/bmjopen-2023-074455.

Full text
Abstract:
IntroductionEnhanced recovery after surgery is widely used in the perioperative period in the field of urology; however, it lacks comprehensive and systematic evidence supporting its efficacy and safety after percutaneous nephrolithotomy. This meta-analysis aimed to assess the safety and efficacy of enhanced recovery after percutaneous nephrolithotomy.Methods and analysisRelevant databases, including PubMed, Web of Science, Embase, The Cochrane Library, China Knowledge Resource Integrated Database, Wanfang Database, Chinese Biomedical Document Service System, and Chinese Science and Technology Journal Database, will be searched from their inception to 19 September 2022. Two researchers will independently screen the literature, extract data and evaluate the included studies. The Grading of Recommendations, Assessment, Development, and Evaluation will be used to assess the degree of certainty of the evidence. Based on the Cochrane Handbook V.5.1.0, the risk of bias assessment of the included randomised controlled trials will be assessed. Based on their randomisation method, allocation generation, concealment, blinding and follow-up, we will assess randomised controlled trials. Random-effects and fixed-effects models and subgroup analyses will be used for meta-analysis. RevMan V.5.4.1 will be used for data collection and meta-analysis.Ethics and disseminationDue to the nature of this systematic review, ethics approval is not required for this study. We will publish the results of this review in a peer-reviewed journal.PROSPERO registration numberCRD42023411520.
APA, Harvard, Vancouver, ISO, and other styles
43

Capraş, Roxana-Denisa, Andrada Elena Urda-Cîmpean, and Sorana D. Bolboacă. "Is Scientific Medical Literature Related to Endometriosis Treatment Evidence-Based? A Systematic Review on Methodological Quality of Randomized Clinical Trials." Medicina 55, no. 7 (July 15, 2019): 372. http://dx.doi.org/10.3390/medicina55070372.

Full text
Abstract:
Background and objectives: Informed decision-making requires the ability to identify and integrate high-quality scientific evidence in daily practice. We aimed to assess whether randomized controlled trials (RCTs) on endometriosis therapy follow methodological criteria corresponding to the RCTs’ specific level in the hierarchy of evidence in such details to allow the reproduction and replication of the study. Materials and Methods: Using the keywords “therapy” and “endometriosis” and “efficacy” three bibliographic databases were searched for English written scientific articles published from 1 January 2008 to 3 March 2018. Only the randomized clinical trials (RCTs) were evaluated in terms of whether they provided the appropriate level of scientific evidence, equivalent to level 1, degree 1b in the hierarchy of evidence. A list of criteria to ensure study replication and reproduction, considering CONSORT guideline and MECIR standards, was developed and used to evaluate RCTs’ methodological soundness, and scores were granted. Three types of bias, namely selection bias (random sequence generation and allocation concealment), detection bias (blinding of outcome assessment), and attrition bias (incomplete outcome data) were also evaluated. Results: We found 387 articles on endometriosis therapy, of which 38 were RCTs: 30 double-blinded RCTs and 8 open-label RCTs. No article achieved the maximum score according to the evaluated methodological criteria. Even though 73.3% of the double-blinded RCTs had clear title, abstract, introduction, and objectives, only 13.3% provided precise information regarding experimental design and randomization, and also showed a low risk of bias. The blinding method was poorly reported in 43.3% of the double-blinded RCTs, while allocation concealment and random sequence generation were inadequate in 33.3% of them. Conclusions: None of the evaluated RCTs met all the methodological criteria, none had only a low risk of bias and provided sufficient details on methods and randomization to allow for the reproduction and replication of the study. Consequently, the appropriate level of scientific evidence (level 1, degree 1b) could not be granted. On endometriosis therapy, this study evaluated the quality of reporting in RCTs and not the quality of how the studies were performed.
APA, Harvard, Vancouver, ISO, and other styles
44

Wanderley, Débora, Andrea Lemos, Larissa de Andrade Carvalho, and Daniella Araújo de Oliveira. "Manual therapies for pain relief in patients with headache." Revista Neurociências 23, no. 1 (March 31, 2015): 89–96. http://dx.doi.org/10.34024/rnc.2015.v23.8053.

Full text
Abstract:
Objective. This systematic review aimed to assess the efficacy of manual therapies for headache relief. Method. A systematic search in MEDLINE, LILACS, Cochrane, CINAHL, Scopus and Web of Sci­ence databases was conducted for randomized and quasi-randomized trials, with no restrictions for language or year of publication. The de­scriptors were ‘Headache’, ‘Headache disorders’ and ‘Musculoskeletal manipulations’, in addition to the keyword ‘Manual therapy’ and its equivalents in Portuguese. We included studies that compared mas­sage, chiropractic manipulation, osteopathic manipulation and other spinal manipulation to groups with no intervention, other physiother­apeutic modalities or to a sham group. Results. Seven of the 567 ar­ticles initially screened were selected, including patients with tension type headache, cervicogenic headache or migraine. It was not possible to assess the magnitude of the treatment effect on the findings of this review. The main limitations were the absence of randomization and adequate allocation concealment, the lack of blinded evaluators and intention-to-treat analysis and inadequate statistical analysis. Conclu­sions. We were unable to determine the size of the treatment effect due to the selective description of findings. Owing to the high risk of bias in the articles included, the available evidence regarding the ef­ficacy of manual therapies for headache relief is insufficient.
APA, Harvard, Vancouver, ISO, and other styles
45

Sabatini, Silvia, Carolina Maiorani, Jessica Bassignani, Silvia Cotellessa, Giuseppe Di Trani, Elisa Fulgenzi, Roberta Iacono, Ilaria Mercogliano, and Andrea Butera. "Effectiveness of Ultrasonic and Manual Instrumentation in Nonsurgical Periodontal Therapy: Are Additional Therapies More Effective? A Systematic Review." Applied Sciences 14, no. 5 (February 27, 2024): 1950. http://dx.doi.org/10.3390/app14051950.

Full text
Abstract:
Nonsurgical periodontal therapy aims to remove supragingival and subgingival biofilm to restore periodontal health. This systematic review aims to assess the clinical effectiveness of manual and/or ultrasonic instruments and to determine whether other therapies can improve periodontal clinical outcomes. Case-control, cross-sectional and cohort studies and clinical trials of patients undergoing nonsurgical periodontal therapy with ultrasonic and/or manual instruments (and any adjunctive therapies, such as glycine, erythritol, ozone, laser and glycine) from 2013 to 2023 were analyzed using Pub-med/MEDLINE, Scopus and Google Scholar. To assess the risk of bias in this review, blinding, randomization, allocation concealment, outcome data and outcome recording were assessed. No differences between treatments were found; all methods, including manual and ultrasound, were helpful in improving clinical parameters (primary outcome). Although the results were mixed, adjunctive therapies seemed to be helpful in the treatment of periodontal disease. The results of this systematic review are consistent with the previous scientific literature and have shown that both manual and ultrasonic instruments are effective in nonsurgical periodontal therapy. This review could not show how complementary therapies could further improve nonsurgical periodontal therapy. For future research, it would be good to standardize the sample with regard to the degree and stage of periodontal disease and to evaluate the risks and benefits of the instruments (manual and ultrasonic scalers).
APA, Harvard, Vancouver, ISO, and other styles
46

Harrison, Samantha L., Noelle Robertson, Roger S. Goldstein, and Dina Brooks. "Exploring self-conscious emotions in individuals with chronic obstructive pulmonary disease." Chronic Respiratory Disease 14, no. 1 (July 8, 2016): 22–32. http://dx.doi.org/10.1177/1479972316654284.

Full text
Abstract:
This study aimed to explore the extent to which self-conscious emotions are expressed, to explore any associations with adverse health outcomes, and to compare self-conscious emotions in individuals with chronic obstructive pulmonary disease (COPD) to healthy controls. A two-stage mixed-methods study design was employed. Interviews with 15 individuals with COPD informed the choice of questionnaires to assess self-conscious emotions which were completed by individuals with COPD and healthy controls. Five overarching themes were abstracted: grief, spectrum of blame, concern about the view of others, concealment, and worry about the future. The questionnaires were completed by 70 patients (mean( SD) age 70.8(9.4) years, forced expiratory volume in one second predicted 40.5(18.8), 44% male) and 61 healthy controls (mean( SD) age 62.2(12.9) years, 34% male]. Self-conscious emotions were associated with reduced mastery, heightened emotions, and elevated anxiety and depression (all p < 0.001). Individuals with COPD reported lower self-compassion, higher shame, and less pride than healthy controls (all p ≤ 0.01). There is a need to increase awareness of self-conscious emotions in individuals with COPD. Therapies to target such emotions may improve mastery, emotions, and psychological symptoms.
APA, Harvard, Vancouver, ISO, and other styles
47

Giraldo-O’Meara, Martha, and Amparo Belloch. "The Appearance Intrusions Questionnaire." European Journal of Psychological Assessment 35, no. 3 (May 2019): 423–35. http://dx.doi.org/10.1027/1015-5759/a000406.

Full text
Abstract:
Abstract. This study aims to examine whether Body Dysmorphic Disorder (BDD) related preoccupations might consist of unwanted intrusive cognitions, and if so, their degree of universality, its dimensionality from normality to BDD psychopathology, and their associations with symptom measures. The Appearance Intrusions Questionnaire (AIQ) was designed to assess intrusive thoughts related to appearance defects (AITs). A sample of 410 undergraduate university students completed a former 54-item version of the AIQ. Principal Components Analyses (PCA) and Parallel Analysis yielded a five-factor structure and a reduction to 27 items. The 27-items AIQ was examined in a new sample of 583 non-clinical community participants. Confirmatory Factor Analyses (CFAs) grouped the AITs in five factors: Defect-related, Others-related, Concealment, Bodily functions, and Urge to do something. Up to 90% of the participants experienced AITs. The AIQ scores were more associated with BDD, Obsessive-Compulsive Disorder (OCD), and body image measures than with worry, suggesting that AITs are closer to obsessional intrusions than to worries. The new AIQ might be a valid and reliable measure of AITs and would help to reliably detect individuals at risk for BDD in nonclinical populations using a brief self-report.
APA, Harvard, Vancouver, ISO, and other styles
48

Bo, Liu, and Peng Yating. "Long-Term Impact of Domestic Violence on Individuals—An Empirical Study Based on Education, Health and Life Satisfaction." Behavioral Sciences 13, no. 2 (February 7, 2023): 137. http://dx.doi.org/10.3390/bs13020137.

Full text
Abstract:
This paper takes the China Health and Retirement Longitudinal Survey (CHARLS) as a sample to assess the long-term impacts of domestic violence experienced in childhood on individuals. First, from the four dimensions of injury from violence, negligent care, emotional abuse and witness to domestic violence, an indicator system for quantifying domestic violence is constructed. Second, the simultaneous equation of self-evaluation health and life satisfaction is estimated by the seemingly unrelated regression model. Starting with education, health and life satisfaction, the long-term impact of domestic violence experiences on individuals is quantitatively assessed, providing empirical evidence for preventing and curing domestic violence and healing trauma. The empirical research shows the following: (1) An experience of domestic violence significantly reduces educational achievements. Compared with the three dimensions of injury from violence, negligent care and witnessing domestic violence, emotional abuse has the greatest negative impact on educational achievements. (2) Domestic violence significantly reduces the self-assessed health level and life satisfaction and increases the subjective mental health risk. Based on the complexity and concealment of domestic violence, combined with empirical research conclusions, this paper proposes countermeasures to prevent and control domestic violence.
APA, Harvard, Vancouver, ISO, and other styles
49

Duan, Yurong, Jing Li, Changlin Ai, Yaolong Chen, Peixian Chen, Mingming Zhang, and Sally Hopewell. "Quality of trials reported as conference abstracts in China: How well are they reported?" International Journal of Technology Assessment in Health Care 25, no. 4 (October 2009): 479–84. http://dx.doi.org/10.1017/s0266462309990365.

Full text
Abstract:
Objectives: Clear, transparent, and sufficiently detailed abstracts of journal articles and conference abstracts are important because readers often base their assessment of a trial on such information. There are concerns over the reliability and quality of trials published only in the proceedings of scientific meetings. This study aims to assess the reporting quality of abstracts of randomized trials published in Chinese medical conference abstracts.Methods: Conference abstracts reporting randomized trials included in the China National Knowledge Infrastructure (CNKI) in 2007 were identified. A revised checklist (based on the CONSORT extension for reporting randomized controlled trials in journal and conference abstracts) was used to assess the reporting quality of these conference abstracts.Results: A total of 567 conference abstracts of randomized trials were identified. Some aspects were well reported, including 94 percent of authors contact details, 83 percent of trial interventions and 78 percent of control interventions, 62 percent of participant eligibility criteria, and 66 percent the number of participants randomized to each group. Other areas were very poorly reported: only 1 percent identified the study as randomized in the abstract title, 2 percent reported the trial design, and only 7 percent reported on blinding. No details of allocation concealment, trial registration, or funding were reported.Conclusion: The information given for trials in conference proceedings in China is very poor, especially in some aspects of methodological quality, trial registration, and funding source. The quality of conference abstracts for trials should be improved to further facilitate understanding of their conduct and validity.
APA, Harvard, Vancouver, ISO, and other styles
50

Seo, See Yoon, Ki-Beom Lee, Joon-Shik Shin, Jinho Lee, Me-Riong Kim, In-Hyuk Ha, Youme Ko, and Yoon Jae Lee. "Effectiveness of Acupuncture and Electroacupuncture for Chronic Neck Pain: A Systematic Review and Meta-Analysis." American Journal of Chinese Medicine 45, no. 08 (January 2017): 1573–95. http://dx.doi.org/10.1142/s0192415x17500859.

Full text
Abstract:
The aim of this systematic review was to assess evidence from randomized controlled trials (RCTs) on the effectiveness and safety of acupuncture and electroacupuncture in patients with chronic neck pain. We searched nine databases including Chinese, Japanese and Korean databases through 30 July 2016. The participants were adults with chronic neck pain and were treated with acupuncture or electroacupuncture. Eligible trials were those with intervention groups receiving acupuncture and electroacupuncture with or without active control, and control groups receiving other conventional treatments such as physical therapy or medication. Outcomes included pain intensity, disability, quality of life (QoL) and adverse effects. For statistical pooling, the standardized mean difference (SMD) and its 95% confidence interval (CI) were calculated using a fixed-effects model. Sixteen RCTs were selected. The comparison of the sole acupuncture group and the active control group did not come out with a significant difference in pain (SMD 0.24, 95% CI [Formula: see text]0.27–0.75), disability (SMD 0.51, 95% CI [Formula: see text]0.01–1.02), or QoL (SMD [Formula: see text]0.37, 95% CI [Formula: see text]1.09–0.35), showing a similar effectiveness of acupuncture with active control. When acupuncture was added into the control group, the acupuncture add-on group showed significantly higher relief of pain in studies with unclear allocation concealment (SMD [Formula: see text]1.78, 95% CI [Formula: see text]2.08–[Formula: see text]1.48), but did not show significant relief of pain in studies with good allocation concealment (SMD [Formula: see text]0.07, 95% CI [Formula: see text]0.26–0.12). Significant relief of pain was observed when the sole electroacupuncture group was compared to the control group or electroacupuncture was added onto the active control group, but a lot of the results were evaluated to have low level of evidence, making it difficult to draw clear conclusions. In the result reporting adverse effects, no serious outcome of adverse event was confirmed. Acupuncture and conventional medicine for chronic neck pain have similar effectiveness on pain and disability when compared solely between the two of them. When acupuncture was added onto conventional treatment it relieved pain better, and electroacupuncture relieved pain even more. It is difficult to draw conclusion because the included studies have a high risk of bias and imprecision. Therefore better designed large-scale studies are needed in the future.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography