Meta-analyses of safety data: a comparison of exact versus asymptotic methods

Vandermeer, Ben; Bialy, Liza; Hooton, Nicola; Hartling, Lisa; Klassen, Terry P.; Johnston, Bradley C.; Wiebe, Natasha
August 2009
Statistical Methods in Medical Research;Aug2009, Vol. 18 Issue 4, p421
Academic Journal
The objectives of this study were to establish and describe a database of Cochrane and non-Cochrane meta-analyses of safety data and to determine under what conditions exact methods differ from asymptotic methods in meta-analyses of safety data. A sample of Cochrane (n = 500) and non-Cochrane (n = 200) systematic reviews was randomly selected and a database of safety meta-analyses established. Point estimates and confidence intervals for each meta-analysis were recalculated using exact methods and compared to the results of asymptotic methods. Cochrane reviews were nearly four times as likely as non-Cochrane reviews to contain meta-analyses of safety data (35% compared to 9%). More than 50% of safety meta-analyses contained an outcome with a rare event rate (<5%) and 30% contained at least one study with no events in one arm of the study. For rare event meta-analyses, exact point estimates differed substantially from asymptotic estimates 46% of the time, compared to 17% for those without rare events. Exact confidence intervals differed substantially from asymptotic ones 67% of the time compared to only 19% for those without rare events. The magnitude of differences was also correlated with the number of studies and the summary statistic used to combine the data. Asymptotic methods will not always be a good approximation for exact methods in safety meta-analyses. Event rates and number of studies should be closely examined when choosing the statistical method for combining rare event data.


Related Articles

  • Time to get personal. Hinde, Anne // Computer Bulletin;Jan1998, Vol. 40 Issue 1, p24 

    New data protection laws go live in nine months� time � yet there is still considerable ignorance about existing legislation. Anne Hinde considers the impact of the new European Union Directive

  • Get ready for dedupe 2.0. Buffington, Jason // Storage Magazine;Aug2012, Vol. 11 Issue 6, p36 

    The article highlights the development of Dedupe 2.0. According to the author, the when or how well should not be the focus of data duplication conversation in 2012 as almost all vendors highlights the efficiency of their offering when it comes to compression ratios or methodology. He adds that...

  • Strategic and Economic Issues of Ownership Rights and Private Life Compliance. Crestin, Frederic; Judde, Michel // Internal Security;Jan-Jun2011, Vol. 3 Issue 1, p63 

    Rapid evolution of technology, especially taking into account the contribution of nanotechnologies has helped the improvement of Information System performance and provided access to new features in CLOUD COMPUTING STORAGE, for example, creation of new services, realization of the popular idea...

  • Data Encryption in the Hostile Environment for Wireless Sensor Network Using Virtual Energy and Trigger Time Response Protocol. Lavania, Krishan Kant; Tiwari, Saumitra Mani; Batra, Sahil // International Journal of Computer Science Issues (IJCSI);May2011, Vol. 8 Issue 3, p538 

    The future of communication is the intelligent sensors capable enough to manage the decision making process by making communication among themselves. Although to do that they need a secure communication to take place which is continuous and for that we need energy sources which is continuous and...

  • An Improved Watermarking-based Algorithm of Tamper Detection for Low-cost EPC C1G2 RFID Tags. Xiaoming Yao; Hongyu Chen; Honglei Li; Xiaoyi Zhou // Applied Mechanics & Materials;2014, Issue 513-517, p1005 

    Data tampering as one of the primary security issues in RFID-enabled applications has been presented in recent years and proposals based on watermarking have been put forward to address different aspects of tampering in RFID tags. However, most of current researches are focused on the way of...

  • Making the case for the true value of data. Reed, David // Data Strategy;Dec2008, Vol. 3 Issue 12, p16 

    The article discusses the rise in data migration and increased focus on data protection among companies in Great Britain. Master data management can address the objective of cost reductions across business functions. Consolidation through data migrations both reduces cost and mitigates risk....

  • Prevent your company becoming Mr Bean. N'Jai, Antu // Data Strategy;Jun2008, Vol. 3 Issue 10, p12 

    The article offers information on how to protect data, stating that it is a part of modern business practice. It notes that one way to protect data is to restrict where it goes as people will not be able to lose the data they cannot access. It also notes that a company will be able to protect...

  • Dealing with data: a mix of private and public. Waring, Joseph // Telecom Asia;Jun2012, Vol. 23 Issue 5, p32 

    The article focuses on the issue of mission critical data. Data varies from organization to organization but is seeing both data and broadband increasingly being considered mission critical. The multimedia aspect of network traffic means that cyber attacks will impact critical infrastructure and...

  • Omega Network Hash Construction. Chai Wen Chuah; Samsudin, Azman // Journal of Computer Science;2009, Vol. 5 Issue 12, p965 

    Problem statement: Cryptographic hash functions are important cryptographic primitives. They are commonly used for data integrity checking and data authentication. Most of the cryptographic hash functions are based on the Merkle-Damgård construction. The basic Merkle- Damgård construction...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics