Data Sources for Bias Analysis

Author(s):  
Timothy L. Lash ◽  
Aliza K. Fink ◽  
Matthew P. Fox
Keyword(s):  
2019 ◽  
Vol 26 (12) ◽  
pp. 1664-1674 ◽  
Author(s):  
Sophia R Newcomer ◽  
Stan Xu ◽  
Martin Kulldorff ◽  
Matthew F Daley ◽  
Bruce Fireman ◽  
...  

Abstract Objective In health informatics, there have been concerns with reuse of electronic health data for research, including potential bias from incorrect or incomplete outcome ascertainment. In this tutorial, we provide a concise review of predictive value–based quantitative bias analysis (QBA), which comprises epidemiologic methods that use estimates of data quality accuracy to quantify the bias caused by outcome misclassification. Target Audience Health informaticians and investigators reusing large, electronic health data sources for research. Scope When electronic health data are reused for research, validation of outcome case definitions is recommended, and positive predictive values (PPVs) are the most commonly reported measure. Typically, case definitions with high PPVs are considered to be appropriate for use in research. However, in some studies, even small amounts of misclassification can cause bias. In this tutorial, we introduce methods for quantifying this bias that use predictive values as inputs. Using epidemiologic principles and examples, we first describe how multiple factors influence misclassification bias, including outcome misclassification levels, outcome prevalence, and whether outcome misclassification levels are the same or different by exposure. We then review 2 predictive value–based QBA methods and why outcome PPVs should be stratified by exposure for bias assessment. Using simulations, we apply and evaluate the methods in hypothetical electronic health record–based immunization schedule safety studies. By providing an overview of predictive value–based QBA, we hope to bridge the disciplines of health informatics and epidemiology to inform how the impact of data quality issues can be quantified in research using electronic health data sources.


2011 ◽  
Vol 27 (1) ◽  
pp. 65-70 ◽  
Author(s):  
Marleen M. Rijkeboer ◽  
Huub van den Bergh ◽  
Jan van den Bout

This study examines the construct validity of the Young Schema-Questionnaire at the item level in a Dutch population. Possible bias of items in relation to the presence or absence of psychopathology, gender, and educational level was analyzed, using a cross-validation design. None of the items of the YSQ exhibited differential item functioning (DIF) for gender, and only one item showed DIF for educational level. Furthermore, item bias analysis did not identify DIF for the presence or absence of psychopathology in as much as 195 of the 205 items comprising the YSQ. Ten items, however, spread over the questionnaire, were found to yield relatively inconsistent response patterns for patients and nonclinical participants.


Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


Author(s):  
Endang Maruti

The research aims to uncover the symbols in the novel The Alchemist and to gain knowledge about the moral teachings in the symbol. This research is descriptive qualitative approach. Data sources in this study are words, phrases or sentences in the novel Alchemist. Data collection method is a literature study method with note taking technique. Data were analyzed using description and content analysis methods. The results showed that the novel The Alchemist contained many symbols. These symbols include: (1) wise parents, who symbolize both negative and positive things. From his appearance, parents can symbolize something bad, but behind his old age he symbolizes a knowledge that is very much and wise; (2) stones that symbolize something hard, not easily broken, and can provide clues to something; and (3) deserts or deserts which can be interpreted as symbols of drought, aridity, unattractiveness, emptiness, despair, determination for ignorance, and also as symbols of devotion.  


Author(s):  
Shanty Bahar Ising ◽  
Mujiono Mujiono

This study aims to find out, describe and analyze the democratic leadership of the Principal in improving achievement at the Palangka Raya Model State Madrasah (MAN). The research method used is descriptive qualitative. The researcher wanted to describe the Principal's democratic leadership in improving achievement at the Palangka Raya Model State Islamic Senior High School (MAN). Primary data sources (person) are the Principal, Teachers (Teachers) and Students of MAN Model Palangka Raya. Whereas secondary data sources are the data in the Palangka Raya Model MAN and supporting literature. The results of the study show that the Principal's leadership in improving achievement in the Palangka Raya Model MAN is very democratic, this condition can be seen from: (1) Principals are happy to receive suggestions, opinions and even criticism from subordinates both delivered by students and teachers through suggestion boxes and in the teacher council meeting, (2) the Principal always strives to prioritize teamwork cooperation in an effort to achieve the goal by appointing the instructor teacher, trainer teacher and mentor teacher and conducting deliberation in planning, implementing and evaluating activities, (3) the Principal always tries to make subordinates more success than him, which is realized by including teachers in seminars, workshops, training and competitions so that they get achievements both locally and nationally, and (4) Principals always try to develop their personal capacity as good leaders in conceptual skills, human skill and technical skill.


Sign in / Sign up

Export Citation Format

Share Document