2 research outputs found
Athletes Perceive Weighted Baseballs to Carry a Notable Injury Risk, yet Still Use Them Frequently: A Multicenter Survey Study
INTRODUCTION: Weighted baseball use in throwing programs is widespread; however, their use remains controversial. Prior research shows that weighted baseball programs can increase ball velocity but potentially increase throwing arm injuries. This study aims to ascertain perceptions of weighted baseballs among elite baseball players.
METHODS: A created online survey questioned common practices, throwing regimens, injury risk factors, and weighted baseball program use. The questions were modeled to ascertain the perceptions of elite baseball players to understand their experience with weighted baseballs. Descriptive statistical analysis was conducted.
RESULTS: Three hundred seventy-six baseball players with a mean age of 20 ± 2 years completed the survey; 64% of the players (239/376) were pitchers. 71% (267/376) reported the use of weighted baseballs. Of those, 75% (199/267) thought it made them a better player. Overall, 73% (275/377) thought weighted baseballs are a risk for injury. 17% (46/267) attributed their injury to using weighted baseballs. Overall, participants reported a mean 72% ± 30% likelihood of future weighted baseball use.
CONCLUSION: Most of the participating elite adult baseball players reported prior weighted baseball use with a corresponding improvement in pitching performance despite a perceived increased injury risk. Nearly 20% of the players attributed pain or injury to weighted baseball use. Moreover, the players surveyed intend to continue using weighted baseballs because of the perceived performance benefit
Recommended from our members
Authentication Procedures - The Procedures and Integration Working Group
Authentication is how we establish trust in monitoring systems and measurements to verify compliance with, for example, the storage of nuclear weapons material. Authentication helps assure the monitoring party that accurate and reliable information is provided by any measurement system and that any irregularities are detected. The U.S. is developing its point of view on the procedures for authentication of monitoring systems now planned or contemplated for arms reduction and control applications. The authentication of a system utilizes a set of approaches, including: functional testing using trusted calibration sources, evaluation of documentation, evaluation of software, evaluation of hardware, random selection of hardware and software, tamper-indicating devices, and operational procedures. Authentication of measurement systems should occur throughout their lifecycles, starting with the elements of design, and moving to off-site authentication, on-siste authentication, and continuing with authentication following repair. The most important of these is the initial design of systems. Hardware and software design criteria and procurement decisions can make future authentication relatively straightforward or conversely very difficult. Facility decisions can likewise ease the procedures for authentication since reliable and effective monitoring systems and tampering indicating devices can help provide the assurance needed in the integrity of such items as measurement systems, spare equipment, and reference sources. This paper will summarize the results of the U.S. Authentication Task Force discussion on the role of procedures in authentication