Systematic Literature Review Sample Clauses

Systematic Literature Review. 3.1.1 Research questions and PICO criteria‌ The key research questions for the evaluation of CI services relate to the potential benefits to consumers that are outlined in the PSA standard and guidelines for pharmacists performing CIs (PSA, 2011). • Is there evidence that a CI service provided by community pharmacies provides benefits to consumers, compared with no CI service provided by community pharmacies, in terms of: o improved symptom control and therapeutic response; o decreased incidence of adverse events related to medicines; o decreased emergency visits and hospitalisations due to DRPs; o improved adherence to and concordance with the prescribed medicine regimen; and o enhanced knowledge of medicines and disease states? • Is there evidence that a CI service provided by community pharmacies results in cost offsets or cost savings through rationalisation of medication therapy and avoidance of DRPs? Additional research questions of relevance to the evaluation relate to the costs and cost- effectiveness of the service: • What costs are associated with a CI service provided by community pharmacies? • Is there evidence that a CI service provided by community pharmacies is cost-effective, compared with no CI service provided by community pharmacies? Table 3.1 presents the selection criteria for evidence relating to CI services. Table 3.1 Selection criteria for evidence relating to CI services provided by community pharmacies Criteria Description Population Community patients taking one or more self-administered medications (prescribed or over-the- counter). ‘Self-administered’ refers to the administration of a medication without the active assistance of a health care professional. It allows for medication administered by a family member or carer. Intervention Any professional activity undertaken by a community pharmacist directed towards improving QUM and resulting in a recommendation for a change in a consumer’s medication therapy, means of administration or medication-taking behaviour. Note: The ‘professional activity’ may involve a recommendation for a change of therapy, referral, provision of information, or monitoring in relation to a drug-related problem. A drug-related problem may include: • drug selection (the choice of drug prescribed or taken) • over- or under-dosing (the prescribed dose or schedule of a drug) • compliance (the way the consumer takes the medication) • under-treatment (actual or potential conditions that require management or p...
AutoNDA by SimpleDocs
Systematic Literature Review. (b) Step 1: Use Cases Step 2: Litera- ture analysis Step 3: interview with subject experts. (c) Step 1: Describe Motivating Scenario, Step 2: Determine Competency Questions, Step 3: Derive Concepts and Re- lations, Step 4: Evaluate the Ontology. processing activities, performing a privacy impact assessment, and processing must be compliant with the regulation and additionally with codes of conduct, [14]. In the exercise, data security is divided into two major classes: measures and properties. Specifically, the class ‘measures’ is divided into ‘organisational’ (e.g access control, audits) and ‘technical’ (e.g. encryption). In security and privacy system design, privacy and security threat model- ing are the hot topics in the literature. Threat modelling is a process that aids understanding of the possible attacks to a secure system and its assets. From the Privacy-by-Design principles point of view and under this definition, threat modelling is focused on processes/actions that may harm the data owner’s pri- vacy. Unlike in security threat modelling, threat identification methodologies for privacy are not that well researched, since there are few threat modelling methods for privacy in the literature [40]. Nevertheless, both topics, privacy and security, share the same principles accepted by the industry, that is to identify and analyse potential attacks. Regarding threat modelling methodologies, there is not an established method, but rather categories of methods (e.g. theoretical, 12 X. Xxxxxxxx-Xxxxx et al. empirical, and not specified [40]) to achieve the same goal. Among these, and a suitable method for our goal is the LINDDUN methodology [41, 42]. It is a privacy threat modelling methodology which presents a breakdown of threats to privacy into categories and their relation to already categorised security threats, STRIDE ([41, 40]). XXXXXXX presents a novelty of privacy threat categories: Non-compliance, and Unawareness. However, its major drawback is automati- sation. The methodology for privacy threat modeling is entirely manual, and hard to automatise using machine-readable languages since it describes high level concepts for privacy threats. During the design process, understanding individual’s privacy expectations may be a complex task. Privacy-knowledge models have been modelled in the literature for different domains. In a non-exhaustive but insightful review done by Xxxxxx et al. about privacy-knowledge modeling for the IoT, they discussed th...
Systematic Literature Review. Apart from the growing interest businesses have in these technologies, another core reason that highlights the relevance of this PhD research is the fact that, despite the advanced age of some of these technologies, scholarly activity in the strategic management field has failed to produce any meaningful and comprehensive work on this subject. As a corresponding technology, email has been available since the 1970s (Xxxxxxx, 2012). Using his then innovative live-broadcasting TV technology, Scottish engineer Xxxx Xxxxx Xxxxx was able to have his image broadcast from London to Glasgow in May 1927. Supplemented by conventional phone lines to transmit sound, this was thus the world’s first video call. The first video call between two companies was in the 1930s in the US (Borth, 2011). While it was not until the late 1990s, through the widespread availability of ISDN lines, that video conferencing started to become a daily activity in businesses, this technology has also now been in use for almost 30 years (Borth, 2011). Another digital communication and social technology that has been in use for some time is cloud technology, an example of an aggregating technology. In principle, cloud computing has been around since the 1960s and 70s, however, our more contemporary understanding of it emerged in the late 2000s (Xxxx, 2009). Closely linked with the emergence of cloud computing is that of collaborating technologies. These, too, have been in use since the 1970s (Xxxxx et al., 2010). With the emergence of Web 2.0 technologies, social media emerged not only as a platform for individuals to engage and communicate with each other but also as a way for companies to develop their platforms or to engage in B2B and B2C communications (Flew, 2017). While some studies picked up on some aspect of digital communication and social technologies and the impact on strategy (x.x. Xxxxxxx and Xxxxxxxx, 2001; Xxxxx et al., 2016; Xxxxx et al., 2018; Gassemi, 2019; Xxxxxxxx and Vaast, 2017), to this date and the knowledge of the author, there has not been a study that systematically explores the use, impact and factors in adoption of different types of digital communication and social technologies. As a result, there is a gap in the literature in strategic management. Extant work already recognizes this gap regarding technology use. Xxxxxxxxx et al. (2016), for instance, note that there has been very little progress in developing our understanding of how Internet-based businesses int...
Systematic Literature Review. Is there a relationship between depressive symptoms and negative symptoms in people with non-affective psychosis? Supervised by: Xx. Xxx Xxxxx Second Supervisor: Xxxxxxxxx Xxxxxxxx Xxxxxx Abstract 6 Introduction 7 Method 11 Inclusion criteria 11 Exclusion criteria 11 Literature search 12 Quality assessment 13 Data extraction and analytic procedure 13 Results 16 Identification................................................................................................................................ Screening...................................................................................................................................... Eligibility ....................................................................................................................................... Included ....................................................................................................................................... Characteristics of studies 17 Quality Ratings of Studies 22 Measures of negative symptoms 26 Measures of depression 27 Meta-Analysis Findings 27
Systematic Literature Review 

Related to Systematic Literature Review

  • Literature Review A-E shall conduct a literature review to determine which species have been identified as special status by state, federal, and local resources agencies and organizations, and have a potential to occur on the project site or in the immediate vicinity. Sources to be reviewed include: (1) special status species lists from the California Department of Fish and Game (CDFG), United States Fish and Wildlife Service (USFWS), and California Native Plant Society (CNPS); (2) database searches of the California Natural Diversity Database (CNDDB) and the Electronic Inventory of the CNPS; (3) the most recent Federal Register listing package and critical habitat determination for each federally Endangered or Threatened species potentially occurring on the project site; (4) the CDFG Annual Report on the status of California’s listed Threatened and Endangered plants and animals; and (5) other biological studies conducted in the vicinity of the project site.

  • Literature Cited h) Appendix (Routine Wetland Determination Data Forms and, if required, Atypical Situation Data Forms).

  • Log Reviews All systems processing and/or storing PHI COUNTY discloses to 11 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 12 must have a routine procedure in place to review system logs for unauthorized access.

  • Personnel File Review a. A unit member has the right upon his/her own request to review the contents of his/her personnel file. The review will be conducted in the presence of the administrator, or his/her designee, responsible for the safekeeping of such file. The employee may have a committee person assist in said review. Such review shall be conducted at a mutually agreeable time. A copy of requested material will be provided.

  • Peer Review Dental Group, after consultation with the Joint ----------- Operations Committee, shall implement, regularly review, modify as necessary or appropriate and obtain the commitment of Providers to actively participate in peer review procedures for Providers. Dental Group shall assist Manager in the production of periodic reports describing the results of such procedures. Dental Group shall provide Manager with prompt notice of any information that raises a reasonable risk to the health and safety of Group Patients or Beneficiaries. In any event, after consultation with the Joint Operations Committee, Dental Group shall take such action as may be reasonably warranted under the facts and circumstances.

  • Training Materials Training Materials will be provided for each student. Training Materials may be used only for either (i) the individual student’s reference during Boeing provided training and for review thereafter or (ii) Customer’s provision of training to individuals directly employed by the Customer.

  • Project Review A. Programmatic Allowances

  • Literature The manufacturer/dealer shall furnish price lists, catalogs, and description literature upon request by any using entity, and at no cost to the entity.

  • Systems Review The Construction Administrator will conduct reviews of proposed roof, structural, mechanical, electrical, plumbing, conveyance, sprinkler, telecommunications, and life safety systems, and will consider initial cost, availability, impact on the overall program, comfort and convenience, long-term maintenance and operating costs, and impacts on schedule.

  • Ongoing Review and Revisions As set forth in Section 35.7, the Parties have agreed to the coordination and exchange of data and information under this Agreement to enhance system reliability and efficient market operations as systems exist and are contemplated as of the Effective Date. The Parties expect that these systems and the technology applicable to these systems and to the collection and exchange of data will change from time to time throughout the term of this Agreement. The Parties agree that the objectives of this Agreement can be fulfilled efficiently and economically only if the Parties, from time to time, review and, as appropriate, revise the requirements stated herein in response to such changes, including deleting, adding, or revising requirements and protocols. Each Party will negotiate in good faith in response to such revisions the other Party may propose from time to time. Nothing in this Agreement, however, shall require any Party to reach agreement with respect to any such changes, or to purchase, install, or otherwise implement new equipment, software, or devices, or functions, except as required to perform this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.