SlideShare a Scribd company logo
1 of 3
Chapter 20
Primary Studies:
Additional Assessments
Supplementing Self-Reported Info.
• Anthropometric Measures
• Vital Signs
• Clinical Examination
• Tests of Physiological Function
• Laboratory Analysis of Biological Specimens
• Medical Imaging
• Tests of Physical Fitness
• Environmental Assessment
• GIS (Geographic Information Systems)

More Related Content

Viewers also liked

Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 
HEALTHCARE RESEARCH METHODS: Secondary and tertiary Studies
HEALTHCARE RESEARCH METHODS: Secondary and tertiary StudiesHEALTHCARE RESEARCH METHODS: Secondary and tertiary Studies
HEALTHCARE RESEARCH METHODS: Secondary and tertiary StudiesDr. Khaled OUANES
 

Viewers also liked (20)

83341 ch27 jacobsen
83341 ch27 jacobsen83341 ch27 jacobsen
83341 ch27 jacobsen
 
83341 ch19 jacobsen
83341 ch19 jacobsen83341 ch19 jacobsen
83341 ch19 jacobsen
 
83341 ch18 jacobsen
83341 ch18 jacobsen83341 ch18 jacobsen
83341 ch18 jacobsen
 
83341 ch03 jacobsen
83341 ch03 jacobsen83341 ch03 jacobsen
83341 ch03 jacobsen
 
83341 ch14 jacobsen
83341 ch14 jacobsen83341 ch14 jacobsen
83341 ch14 jacobsen
 
83341 ch08 jacobsen
83341 ch08 jacobsen83341 ch08 jacobsen
83341 ch08 jacobsen
 
83341 ch15 jacobsen
83341 ch15 jacobsen83341 ch15 jacobsen
83341 ch15 jacobsen
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
83341 ch03 jacobsen
83341 ch03 jacobsen83341 ch03 jacobsen
83341 ch03 jacobsen
 
83341 ch23 jacobsen
83341 ch23 jacobsen83341 ch23 jacobsen
83341 ch23 jacobsen
 
83341 ch09 jacobsen
83341 ch09 jacobsen83341 ch09 jacobsen
83341 ch09 jacobsen
 
83341 ch04 jacobsen
83341 ch04 jacobsen83341 ch04 jacobsen
83341 ch04 jacobsen
 
83341 ch17 jacobsen
83341 ch17 jacobsen83341 ch17 jacobsen
83341 ch17 jacobsen
 
83341 ch29 jacobsen
83341 ch29 jacobsen83341 ch29 jacobsen
83341 ch29 jacobsen
 
83341 ch26 jacobsen
83341 ch26 jacobsen83341 ch26 jacobsen
83341 ch26 jacobsen
 
83341 ch01 jacobsen
83341 ch01 jacobsen83341 ch01 jacobsen
83341 ch01 jacobsen
 
83341 ch06 jacobsen
83341 ch06 jacobsen83341 ch06 jacobsen
83341 ch06 jacobsen
 
83341 ch10 jacobsen
83341 ch10 jacobsen83341 ch10 jacobsen
83341 ch10 jacobsen
 
83341 ch24 jacobsen
83341 ch24 jacobsen83341 ch24 jacobsen
83341 ch24 jacobsen
 
HEALTHCARE RESEARCH METHODS: Secondary and tertiary Studies
HEALTHCARE RESEARCH METHODS: Secondary and tertiary StudiesHEALTHCARE RESEARCH METHODS: Secondary and tertiary Studies
HEALTHCARE RESEARCH METHODS: Secondary and tertiary Studies
 

More from Nada G.Youssef

Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Nada G.Youssef
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorNada G.Youssef
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsNada G.Youssef
 
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementChapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementNada G.Youssef
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and MaintenanceNada G.Youssef
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control ManagementNada G.Youssef
 
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityNada G.Youssef
 

More from Nada G.Youssef (20)

مجلة 1
مجلة 1مجلة 1
مجلة 1
 
Chapter Tewlve
Chapter TewlveChapter Tewlve
Chapter Tewlve
 
Chapter Eleven
Chapter ElevenChapter Eleven
Chapter Eleven
 
Chapter Ten
Chapter TenChapter Ten
Chapter Ten
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Chapter Eight
Chapter Eight Chapter Eight
Chapter Eight
 
Chapter Seven
Chapter SevenChapter Seven
Chapter Seven
 
Chapter Six
Chapter SixChapter Six
Chapter Six
 
Chapter Five
Chapter FiveChapter Five
Chapter Five
 
Chapter Four
Chapter FourChapter Four
Chapter Four
 
Chapter Three
Chapter ThreeChapter Three
Chapter Three
 
Chapter Two
Chapter TwoChapter Two
Chapter Two
 
Chapter one
Chapter oneChapter one
Chapter one
 
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
 
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementChapter 12: Business Continuity Management
Chapter 12: Business Continuity Management
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control Management
 
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations Security
 

83341 ch20 jacobsen