Warung Bebas

Senin, 08 Juli 2013

Jurnal Kesehatan Lingkungan

Jurnal Kesehatan Lingkungan - para ahli kesehatan telah membuat batasan
kesehatan masyarakat ini. Secara kronologis batasan akan kesehatan
masyarakat mulai dengan batasan yang begitu sempit hingga batasan yang
luas seperti yang kita anut ketika ini bisa diringkas sebagai batasan paling tua, kesehatan
masyarakat merupakan upaya untuk dalam mengatasi permasalahan sanitasi
yang dapat mengganggu

Another Attempt to Show the RUC Behind the Curtain

In 2007, readers of the Annals of Internal Medicine could read part of the solution to a great medical mystery.(1)  For years, health care costs in the US had been levitating faster than inflation, without producing any noticeable positive effect on patients.  Many possible reasons were proposed, but as the problem continued to worsen, none were proven.

Prices are High Because They are Fixed That Way

The article in the Annals, however, proposed one conceptually simple answer.

The prices of most physicians' services, at least most of those that involved procedures or operations for Medicare patients, were high because the US government set them that way. Although the notion that prices were high because they were fixed to be so high was simple, how the fixing was done, and how the fixing affected the rest of the health system was complex, mind numbingly complex.

Perhaps because of the complexity of its implementation, the simplicity of the concept has not seemingly reached the consciousness of most American health care professionals or policy makers, despite the publication of several scholarly articles on the subject,.efforts by humble bloggers such as yours truly, a major journalistic expose, and recent congressional hearings.  The lack of discussion of this issue seemed to be a prime example of what we have called the anechoic effect, that important causes of health care dysfunction whose discussion would discomfit those who are currently personally profiting from the current system rarely produce many public echoes.  (For a review of what is known to date about how the offputtingly named Resource Based Relative Value Scale Update Committee (RUC) works, and previous attempts to makes it central role in fixing what US physicians are paid public, see the Appendix.)

The Washington Monthly Pulls Back the Curtain

Now another attempt to pull back the curtain that hides the RUC was just made by the Washington Monthly.  A long, detailed, well-written article by Haley Sweetland Edwards went through the major points, and included some new discoveries.  She asserted:

The RUC is Well Hidden

[The RUC is] probably one of the most powerful committees in America that you’ve never heard of.

The RUC Fixes Prices

when a roomful of professionals from the same trade meet behind closed doors to agree on how much their services should be worth. It’s called price-fixing. 

The Government Enables the RUC to Fix Prices

 this kind of 'price-fixing' is not only perfectly legal, it’s sanctioned by the U.S. government. At the end of each of these meetings, RUC members vote anonymously on a list of 'recommended values,' which are then sent to the Centers for Medicare and Medicaid Services (CMS), the federal agency that runs those programs. For the last twenty-two years, the CMS has accepted about 90 percent of the RUC’s recommended values—essentially transferring the committee’s decisions directly into law.

The Government Fixed Prices are Endorsed by the Private Sector

 private insurance companies also use Medicare’s fee schedule as a baseline for negotiating prices with hospitals and other providers. 

The Price Fixing Drives Up Costs and the Use of Services

 So if the RUC inflates the base price Medicare pays for a specific procedure, that inflationary effect ripples up through the health care industry as a whole.

These Incentives Cripple Primary Care

 These manipulated prices are also a major reason why specialists are in oversupply in many parts of the country, while a worsening shortage of primary care providers threatens the whole health care delivery system. 

These Incentives Benefit Big Corporations, not just Medical Specialists

 the incentives are perfectly aligned: ordering that extra test means more money for a doctor’s practice or hospital, more money for the labs, and often more money for the device makers and drug companies, too. (Oh, and, by the way, the device makers and drug companies are, not incidentally, major funders of the medical specialty societies whose members vote on the RUC.)

[Art by Monte Wolverton for the Washington Monthly article]

What to Do and What Will Happen?

We previously wrote,

 Economists have beaten us over the head with idea that incentives matter.  The RUC seems to embody a corporatist approach to fixing prices for medical services to create perverse incentives for physicians to do more procedures, and do less conversing with and examining patients, examining the best clinical research evidence about their problems, and rigorously thinking about how best to help them.  More procedures at higher prices helps physicians who do procedures.  It may help even more the corporations that provide the devices and drugs whose use is necessitated by such procedures, and the hospitals who can charge a lot of money as sites for performance of procedures.  It may even help insurance companies by driving ever more money through the health care system, and thus allow rationalization for higher administrative expenses as a function of overall money flow.

Yet incentives favoring procedures over all else may lead to worse outcomes for patients, and more costs to patients and society.  If we do not figure out how to make incentives given to physicians more rational and fair, expect health care costs to continue to rise, while access and quality continue to suffer.

Ms Edwards ended her article with two specific suggestions:

take the process away from the control of the AMA and put it in the hands of a well-resourced group of experts under the auspices of the federal government. This might take the form of a panel of doctors employed by the government, or of an advisory committee of representatives of different medical societies but with greater representation of primary care doctors.

Or

 get Medicare out of the business of funding fee-for-service medicine. 

I can only hope that the latest Washington Monthly article, which was accompanied by an editorial and a short first-hand account of how difficult is the lot of the modern primary care physician, will succeed in increasing awareness of the RUC and its essential role in making the US health care system increasingly unworkable.  Of course, such awareness may disturb the many people who are making so much money within the current system.  But if we do nothing about the RUC, and about the ever expanding bubble of health care costs, that bubble will surely burst, and the results for patients' and the public's health will be devastating.

APPENDIX - Background on the RUC

 We have frequently posted, first here in 2007, and more recently here,  here, here, and here, about the little-known group that controls how the US Medicare system pays physicians, the RBRVS Update Committee, or RUC.

Since 1991, Medicare has set physicians' payments using the Resource Based Relative Value System (RBRVS), ostensibly based on a rational formula to tie physicians' pay to the time and effort they expend, and the resources they consume on particular patient care activities. Although the RBRVS was meant to level the payment playing field for cognitive services, including primary care vs procedures, over time it has had the opposite effect, as explained by Bodenheimer et al in a 1997 article in the Annals of Internal Medicine.(1) A system that pays a lot for procedures, but much less for diagnosing illnesses, forecasting prognoses, deciding on treatment, and understanding patients' values and preferences when procedures and devices are not involved, is likely to be very expensive, but not necessarily very good for patients.

 

As we wrote before, to update the system, the Center for Medicare and Medicaid Services (CMS) relies almost exclusively on the advice of the RBRVS Update Committee. The RUC is a private committee of the AMA, touted as an "expert panel" that takes advantage of the organization's First Amendment rights to petition the government. Membership on the RUC is allotted to represent specialty societies, so that the vast majority of the members represent specialties that do procedures and focus on expensive, high-technology tests and treatments.
 

However, the identities of RUC members were opaque for a long time, and the proceedings of the group are secret.  As Goodson(2) noted, RUC "meetings are closed to outside observers except by invitation of the chair." Furthermore, he stated, "proceedings are proprietary and therefore not publicly available for review."
 

In fact, the fog surrounding the operations of the RUC seems to have affected many who write about it. We have posted (here, here, here, and here) about how previous publications about problems with incentives provided to physicians seemed to have avoided even mentioning the RUC. Up until 2010, after the US recent attempt at health care reform, the RUC seemed to remain the great unmentionable. Even the leading US medical journal seemed reluctant to even print its name.
 

That changed in October, 2010.  A combined effort by the Wall Street Journal, the Center for Public Integrity, and Kaiser Health News yielded two major articles about the RUC, here in the WSJ (also with two more spin-off articles), and here from the Center for Public Integrity (also reprinted by Kaiser Health News.) The articles covered the main points about the RUC: its de facto control over how physicians are paid, its "secretive" nature (quoting the WSJ article), how it appears to favor procedures over cognitive physician services, etc.
 

In 2011, after the "Replace the RUC" movement generated some more interest about this secretive group, and its complicated but obscure role in the health care system, the current RUC membership was finally revealed.  It was relatively easy for me to determine that many of the members had conflicts of interest (beyond their specialty or sub-specialty identity and their role in medical societies that might have institutional conflicts of interest, and leaders with conflicts of interest).  
 

Then that year a lawsuit was filed by a number of primary care physicians that contended that the RUC was functioning illegally as a de facto US government advisory panel.  It appeared that things might change.  However, it was not to be.  A judge dismissed the lawsuit in 2012, based on his contention that the law that set up the RBRVS system prevented any challenges through the legal system to the mechanism used to set payment rates.  The ruling did not address the legality of the relationship between the RUC and the federal government.  The eery quiet then resumed, only punctuated briefly in early 2013, when a Senate committee held hearings with no obvious effect.      

ADDENDUM (15 July, 2013) - see also comments by Dr Howard Brody on the Hooked: Ethics, Medicine and Pharma blog.  

ADDENDUM (18 July, 2013) - see also comments by Yves Smith on the Naked Capitalism blog.

References
1. Bodenheimer T, Berenson RA, Rudolf P. The primary care-specialty income gap: why it matters. Ann Intern Med 2007; 146: 301-306. (Link here.)
2. Goodson JD. Unintended consequences of Resource-Based Relative Value Scale reimbursement. JAMA 2007; 298(19):2308-2310. (Link here.)

Daily Blog #15: 7/72013 Sunday Funday winner!

Howdy Reader,
        I'm in Austin for the DFIR Summit, but the daily blogs must continue! Yesterday we had a particularly challenging Sunday Funday regarding detecting web server log tampering. We had a couple contenders and the winner this week is Jacob Williams! Here is Jacob's winning answer:

Wow, I wish I had access to the server.  Text based log files are one of the few places where slack space analysis can be a benefit.  There's plenty of room to potentially find evidence of log tampering (especially if the tampered log is smaller than the original).  Over three years of web server logs, I'd hope to find SOMETHING in slack space if logs were manipulated.

The first thing to check are time series within the logs.  By time series, I mean does every log entry come after the one before it.  This is one place that people totally screw up when modifying logs.  I actually have written scripts to check this in various formats and again, it's a place that inexperienced forgers get caught.

Timestamps on the logs might also be useful, though less reliable depending on how you were provided the logs.  W3C formatted logs begin anew each day. Obviously you want to check for the timestamps to be consistent with the dates of the logs.  Again, depending on how you were provided the logs (FAT formatted thumb drive for instance), the file timestamps may not be usable.

A piece of the case that isn't specified is whether the suspect has a static IP address.  Obviously we'll want to correlate log entries to that static IP if one exists.  If the user has a dynamic IP, check the range to make sure it is consistent with his ISP.  Three years is probably too far back to subpoena DHCP logs from the ISP, but get as much as you can.

GoGo InFlight Internet service has sort of screwed up this next one, but I want to get the suspect's travel records to identify time periods when he couldn't have had access to the Internet to make the illicit logins.  Times when a suspect is in the air, etc. are great.  Is the suspect a public speaker? Check the logs for times when he was speaking.  I like to think I'm talented, but I have a hard time hacking websites and teaching SANS FOR610 at the same time (even if I do know the material like the back of my hand).  Find as many instances of these time issues as possible.  It might be conceivable that the suspect violated the laws of time and space once, but thirty times? Fifty times? Come on, this isn't an episode of Fringe.  Of course the attacker could have been creative with his Internet access or set an automated timed attack, but let the plaintiff prove this.  Just as in the possibility of tampering with forensic data, the simple possibility of isn't sufficient to say it happened.

One of the more technical approach I'd take would be analysis of actual usage patterns.  Are the suspect's usage patterns (i.e. pages accessed) consistent with what the plaintiff is alleging?  Does the defendant magically skip the login screen and go directly to authenticated access when everyone else must login through login.aspx?  Stuff like this can be an indicator that the logs have been tampered with.

Some of the rest depends on the style of the web application and the verbosity of logging.  If the logs contain some sort of session ID (in the URL perhaps) we should analyze how this session ID is generated.  If it is completely random, do the logs ever show our suspect using the same ID?  If so, the odds of hitting the same random session id are nil to none.  Go buy a lottery ticket.  Another thing we often see are time based session IDs where the IDs increase over time.  Again, make sure that the IDs are increasing over time for the user's login.  If the web application places a time stamp in the URL to prevent replay attacks, make sure that the URL timestamps are consistent with the log timestamps.  Also check that they are increasing.

We also want to check the user agents being recorded. Is your suspect a total techno-tard but his user agent indicates Linux?  Mac user agent, but the user doesn't own a Mac?  Look for accepted languages in the HTTP requests.  If the user is in America and doesn't speak Chinese, then the accepted language in the HTTP headers probably won't be Chinese.

Anomalies in the logs are also something to check for.  Did the suspect's log entries happen at a particular time?  One of the ways people screw up forging logs is to change a legitimate log entry to cover up illicit activity.  In this case, check other user's patterns of behavior.  Does user X always log in between 0900 and 1100, but fails to on days when our suspect logs in at the same time (and coincidentally performs the same actions)?

One of the final things I'd check would be whether the web application logs both a text based userID and a numeric user ID.  We want to make sure that these are always consistent with one another and never reused in the logs.

As a side note, I'd also want to subpoena the web server configuration and web application to audit the code.  If this is a high profile case, it's worth performing tests on the web application to ensure that the expected logging matches the actual logging.
To extend my answer a little, I'd like to add to check the Cookie and Referrer fields in the W3C formatted logs (if those attributes are being logged).

Either attribute could highlight an anomaly in forged records.  For instance, cookie values could point to session IDs inconsistent with those in the GET request (or assigned simultaneously to another user).

Referrer fields are another issue entirely.  Web applications usually have a fairly static content flow.  If the referred fields for our suspected forged records are inconsistent with those of legitimate users, we may have found the smoking gun.  This again underscores the need to subpoena the web application for testing.  If the plaintiff claims the logs are damning "because that's how the custom web app works" we should have cause to examine the web application to determine logging fringe cases/inconsistencies.

    This was a great answer! Jake certainly showed a mastery of web log analysis in his response and I hope you will get some good pointers here for your own log analysis.

    This Sunday Funday was based on a real case, ILS v Partsbase, that I worked on for three years back in 2003-2006. The case went to a jury trail where we were able to successfully show that 3 years of web logs were altered to make it appear as though our client had made 1.6 million unauthorized accesses over 3 years.

    The case came together in a series of steps that Jacob highlighted in his answer but that I want to highlight and explain.
  1. Compare session states, in my case I was lucky and the developer decided to store the cookies assigned in the web logs and they contain an environmental variable for the users IP address. In my case the IP stored in the cookie never matched the IP recorded in the log. 
  2. Review the the user agents, Using the user agents we were able to pull out 1,100 different devices suddenly associated with my clients outgoing IP address. 
  3. Review the user agents for browser customization. This was the most critical aspect in getting the jury to understand what occurred. There was a public and a private web site with two different sets of logs. If you have a standard image rolled out to your systems you may see a message on the browser bar (IE specifically) that says something like 'Provided by HECFBlog'. This information is passed on in the UserAgent.
  4. Put all your logs into a database for better analysis and cross queries. With distinct customized browser user agents located , for example 'University of Some State' I was able to reconstruct sessions between the two logs and show that when a visit to the public side was made it contained an IP address belonging to the University but when an image request was made to the private side my clients IP address would suddenly appear in the logs as the requester.
    We still don't know who modified the logs and due to protective orders I can't reveal what all we discovered. However using the type of analysis Jacob described and the facts I identified above, combined with some great simple animated PowerPoint slides we were able to clearly demonstrate to the jury why any reasonable person could see the logs were manipulated.

The milestone series resumes tomorrow!

MENIKMATI KEUNIKAN DANAU-DANAU TERBESAR DI DUNIA

Mendengar kata danau, pastilah yang terlintas di pikiran kita adalah genangan air tawar yang luas, panorama perbukitan indah dibalut dengan hutan hijau yang lebat, serta udara segar yang sejuk dan bebas polusi.

Suasana di atas adalah sedikit gambaran mengenai suasana danau dan keindahan yang melekat padanya, yang biasa kita temui pada objek wisata danau yang ada di Indonesia. Namun tahukah anda, beberapa danau di dunia tak hanya indah, namun juga unik. Keunikan yang paling kentara adalah luas danau-danau tersebut melebihi danau lain umumnya, danau-danau ini tercatat sebagai danau terbesar di dunia, sehingga satu buah danau bisa dimiliki oleh lebih dari dua Negara.

Berikut ini akan disajikan enam danau terbesar di dunia, lengkap dengan letak dan keunikan masing-masing danau tersebut.

1. Laut Kaspia ( Danau Laut Kaspia)



Danau laut Kaspia adalah danau terbesar di dunia yang terletak antara perbatasan benua Asia dan Eropa. Danau ini sesungguhnya adalah laut yang terkurung oleh daratan, hal ini menyebabkan danau Kaspia memiliki air yang asin. Danau laut Kaspia mendiami lima Negara. Mulai dari Azerbaijan, Rusia, Kazakhstan, Turkmenistan, hingga sebagian provinsi di Negara Iran. Danau laut Kaspia mempunyai luas 394.299k km2 dan kedalaman 946 m2, danau ini memang begitu luas sehingga para penduduk menyebut sebagai laut, jika anda mengunjungi danau ini, anda akan dimanjakan oleh pesona alam mediterania yang eksotik.

2. Superior



Danau Superior merupakan danau terbesar kedua di dunia, namun merupakan danau air tawar dengan permukaan terluas nomor satu di dunia. Danau ini berada di Negara Amerika Serikat dan Kanada. Danau ini memiliki luas 82.414 km2 dan kedalaman hingga 406 m2. Danau ini memiliki pemandangan yang sangat indah, selain piknik keluarga, danau ini juga di gunakan wisatawan lokal untuk aktivitas memancing dan wisata alam air lainnya.

3. Victoria



Danau Victoria merupakan sebuah danau air tawar yang membentang di benua Afrika, mulai dari Negara Tanzania hingga Uganda. Danau dengan luas 96.485 km2 dan kedalaman maksimum 82 m2 ini adalah danau terbesar di Afrika serta danau tropis terbesar di dunia. Yang istimewa, danau ini merupakan muara dari salah satu cabang sungai Nil, selain itu di tengah danau ini bertebaran pulau-pulau kecil tak berpenghuni. Hal ini dapat menjadi daya tarik bagi anda yang tidak hanya gemar wisata air, tapi juga berpetualang menelusuri pulau-pulau tersebut.

4. Huron



Danau Huron adalah danau terbesar di dunia selanjutnya. Danau ini mendiami Benua Amerika dan dimiliki bersama oleh Negara Amerika Serikat dan Kanada. Danau air tawar ini memiliki luas permukaan 59.596 km2, sedangkan memiliki kedalaman 229 m2. Sebagaimana danau lain yang berfungsi sebagai jalur transportasi air, danau Huron juga merupakan objek wisata yang sangat populer dan diberdayakan dengan sangat baik, terutama oleh pemerintah Kanada. Di Kanada danau Huron merupakan objek wisata alam liar yang diminati. Di Negara itu, danau Huron terkenal dengan turnip stone atau batu besar di pesisir danau yang menyerupai lobak.

5. Michigan



Danau Michigan adalah salah satu dari lima danau terbesar di Amerika Serikat. Danau ini begitu terkenal karena membatasi empat dari Negara bagian di Amerika. Luas danau ini mencapai 58.016 km2 sedangkan kedalamannya hingga 281 m2. Jika anda mengunjungi kota Chicago, mungkin anda akan berminat menikmati hamparan luas danau ini, karena Chicago merupakan kota terbesar yang berbatasan dengan danau Michigan.

6. Aral



Di urutan ke-enam adalah danau Aral. Danau ini terletak antara Kazakhstan bagian utara dan Uzbekistan bagian selatan. Luas danau ini terus menyusut semenjak 1960-an dari 66.456 km2 menjadi hanya 59.596 km2. Hal ini menyebabkan posisi danau Aral sebagai danau terbesar ke empat di dunia juga menurun hingga hanya berada di posisi enam. Berbicara mengenai Danau Aral berarti membicarakan kelamnya masa lalu di bawah pimpinan penguasa diktator. Buah dari penerapan teknologi yang membabi-buta pada masa Uni Soviet telah mengakibatkan pencemaran lingkungan, rusaknya ekosistem dan penyakit-penyakit yang diderita penduduk sekitar danau yang diperkirakan bersumber dari pencemaran tanah dan air sekitar danau.

Demikianlah urutan enam danau terbesar di dunia, selain luas dan dalam, masing-masing danau memiliki keunikan dan kisah masing-masing. Selain keenam danau di atas tentu masih banyak objek wisata danau yang dapat dijadikan tujuan wisata, yang mana telah pula dianugerahi pemandangan alam dan keunikan yang tak kalah memukau.

Oleh : Tika Dwi

Cara Menghilangkan Bekas Jerawat Secara Alami

Cara menghilangkan bekas jerawat secara alami - Apakah anda punya kebiasaan memencet jerawat? Hentikan kebiasaan buruk tersebut karena akan menimbulkan masalah baru. Jika anda memaksa memecahkan jerawat dengan memencetnya, justru itu akan memicu peradangan pada jerawat dan inilah yang mengakibatkan adanya bekas jerawat pada wajah ketika jerawat tersebut sudah kering. Jadi mulai dari sekarang ketika jerawat muncul Anda harus mulai belajar mengendalikan emosi sesaat untuk mengoprek jerawat, ingat jangka panjangnya akan buruk untuk wajah Anda. Faktor lain yang juga berpotensi membuat jerawat berbekas adalah penggunaan kosmetik atau obat jerawat yang mengandung alkohol atau minyak. Ada beberapa cara untuk menghilangkan bekas jerawat. Jika ada noda bekas jerawat yang membandel, coba praktikkan beberapa tips di bawah ini.

Beberapa Cara Menghilangkan Bekas Jerawat Secara Alami

Cara Menghilangkan Bekas Jerawat Secara Alami

Air Jeruk Nipis. Ambil air perasan jeruk nipis dengan kapas, kemudian usapkan pada bagian noda bekas jerawat, tunggu 10-15 menit kemudian bilas dengan air sampai bersih. Ketika awal pengolesan akan sedikit terasa perih, namun itu tidak akan berlangsung lama, justru efeknya mampu mengurangi rasa gatal dan membantu menghilangkan bekas jerawat.
Putih Telur. Cara penggunaanya adalah pisahkan putih telur dengan kuning telur, gunakan putih telurnya kemudian aduk perlahan, dan dapat digunakan sebagai masker. Tunggu 10-15 menit kemudian bilas hingga bersih, gunakan secara rutin 2-3 kali seminggu agar bekas jerawat memudar.
Ampas Teh. Cara penggunaanya sangat mudah yaitu oleskan ampas teh pada bagian noda bekas jerawat, diamkan selama 10-15 menit kemudian bilas dengan air sampai bersih. Penggunaan secara rutin dapat membantu mengurangi noda bekas jerawat di wajah Anda.
Lidah Buaya. Caranya adalah gunakan gel daging buah lidah buaya sebagai masker wajah diamkan selama 10-15 menit kemudian bilas dengan air hingga bersih, penggunaan secara rutin efektif mengurangi bekas jerawat.
Bawang Putih. Cara penggunaanya dengan mengiris bawang putih kemudian oleskan irisan tersebut pada bagian bekas jerawat, tunggu 10-15 menit kemudian bilas dengan air. Gunakan secara rutin agar memberikan efek yang sempurna, noda bekas jerawat Anda tersamarkan.

Bantu Menghilangkan Bekas Jerawat  -  Perhatikan Juga Asupan

Penjelasan di atas adalah mengenai beberapa bahan alami yang dapat digunakan untuk menghilangkan bekas jerawat. Yang tidak boleh anda lupakan, selain perawatan dari luar, perhatikan juga makanan dan minuman yang dikonsumsi, hindari makanan berlemak dan minuman bersoda. Perbanyak konsumsi air putih dan olah raga yang cukup. Demi mendapatkan hasil yang memuaskan, anda harus rutin melakukan perawatan, minimal 2x dalam seminggu. Konsep pengobatan alami adalah hasilnya tidak langsung dapat dirasakan/ instan, perlu proses dan ketelatenan, mengingat sesuatu yang butuh proses hasilnya cukup memuaskan dan untuk jangka panjang serta tanpa efek samping. Itu saja dulu bahasan tentang cara menghilangkan bekas jerawat tentunya dengan cara yang aman dan alami.

Semoga tulisan tentang cara menghilangkan bekas jerawat secara alami ini bermanfaat


 

ZOOM UNIK::UNIK DAN UNIK Copyright © 2012 Fast Loading -- Powered by Blogger