An analysis with serious flaws.

نویسندگان

  • Andrew J Nunn
  • Patrick P J Phillips
چکیده

TO THE EDITOR—Pasipanodya and Gumbo address an important question in their article: Is directly observed therapy (DOT) superior to self-administered treatment (SAT) for tuberculosis? [1] Unfortunately, however, their analysis contains some serious flaws. Two of the distinct studies that the authors include from Cape Town are actually from the same trial [2, 3]. Therefore, there is double counting of some of the patients. The randomized trial reported from India is not a comparison of DOT and SAT but rather of a strategy of treating patients with 1 of 2 regimens administered by DOT with another, different regimen given as SAT [4]. This study should not have been included in the meta-analysis. The inclusion of data is inconsistent and not well described. For example, the randomized trial reported from Pakistan is a comparison of 3 arms: health-worker DOT, family-member DOT, and SAT [5]. Pasipanodya and Gumbo combine the health-worker and family-member DOT arms for the analysis of default (Figure 2), but only include patients in the familymember DOT arm for the analysis of microbiologic failure (Figure 3) [1]. The observational study by Ormerod et al is prone to particular bias as the authors themselves noted: “In the UK, . . . DOT is only recommended for those who are thought to be non-compliant, or in whom non-compliance has been demonstrated” [6]. The same bias may also be present in other included observational studies. Contrary to what is stated in the Methods section, under “Definitions” [1], not all DOT in the selected studies was administered by trained health personnel. Only the Indian trial, which should not have been included in the analysis, reports relapse outcomes. Failure at the end of treatment is an inadequate measure of treatment success alone as it takes no account of relapse, in addition to which the higher rates of default found in the SAT groups are likely to mean that some microbiological failures and relapse would have been missed. Methods of administering DOT vary considerably as the data from the selected studies illustrate; a proper assessment of the efficacy of DOT needs to take this into account. The authors’ conclusion that “resources should be shifted to other causes of poor microbiologic outcomes” [1] cannot be justified on the basis of these findings.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

3 Serious Flaws in

Understanding the effect of a heuristic on the time complexity of the well-known A∗ search algorithm has been a subject of a large research body in AI. Among those researches is Korf et al.’s analysis (Korf & Reid, 1998; Korf et al., 2001; Korf, 2000a; Korf, 2000b), which concluded that the effect of a heuristic is to reduce the effective depth rather than effective branching factor. Since this...

متن کامل

Static Analysis: C Code Error Checking for Reliable and Secure Programming

common programming and security flaws using static analysis of the C source code. These flaws may be serious errors or simple ones caused by programmer's carelessness and most of them may not be detected by the compilers. Manual reviewing of code for errors may take a lot of time especially if the code is big and it will also be very expensive, also simple flaws maybe overlooked .In this paper ...

متن کامل

Web vulnerability study of online pharmacy sites.

Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expand...

متن کامل

Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus

Anonymity with identity escrow attempts to allow users of a service to remain anonymous, while providing the possibility that the service owner can break the anonymity in exceptional circumstances, such as to assist in a criminal investigation. A protocol for achieving anonymity with identity escrow has been presented by Marshall and Molina-Jiminez. In this paper, we show that protocol suffers ...

متن کامل

Intercepting Mobile Communications: The Insecurity of 802.11 —DRAFT—

The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer communications from eavesdropping and other attacks. We have discovered several serious security flaws in the protocol, stemming from misapplication of cryptographic primitives. The flaws lead to a number of practical attacks that demonstrate that WEP fails to achieve its sec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Clinical infectious diseases : an official publication of the Infectious Diseases Society of America

دوره 57 7  شماره 

صفحات  -

تاریخ انتشار 2013