Hostname: page-component-8448b6f56d-gtxcr Total loading time: 0 Render date: 2024-04-24T09:17:24.342Z Has data issue: false hasContentIssue false

OP177 Identification Of Technologies Of No Or Low Added Value

Published online by Cambridge University Press:  03 January 2019

Rights & Permissions [Opens in a new window]

Abstract

Core share and HTML view are not available for this content. However, as you have access to this content, a full PDF is available via the ‘Save PDF’ action button.
Introduction:

Health technology has no or low added value when it is harmful and/or is deemed to deliver limited health gain relative to its cost, representing inefficient health resource allocation. A joint effort by the Health Technology Assessment International (HTAi) interest group (IG) on disinvestment and early awareness, the IG on ethics, the EuroScan network and the International Network of Agencies for Health Technology Assessment (INAHTA) is aiming to design a toolkit that could aid organizations and individuals considering disinvestment activities. We synthesized state of the art methods for identifying candidate technologies for disinvestment, and propose a framework for executing this task.

Methods:

We searched systematic reviews on disinvestment and compared the methods used for identifying potential candidates. A descriptive analysis was performed including sources of evidence used and methods for selection / filtration.

Results:

Ten systematic reviews were retrieved, and the methods of 29 disinvestment initiatives were compared. A new framework for identifying potential candidates was proposed which comprises seven basic approaches based on the wide definition of evidence provided by Lomas et al.; 11 triggers for disinvestment were adapted from Elshaug's proposal, and 13 methods for applying these triggers that were grouped in embedded and ad-hoc methods.

Conclusions:

Identification methods have been described in the literature, and have been tested in different contexts. Context is crucial in determining the ‘not to do’ practices as they are described in different sources.

Type
Oral Presentations
Copyright
Copyright © Cambridge University Press 2018