Kidd, Nancy V.; Hudson, George R.
Women students in a community college were studied to determine the effects of single-sex counseling groups and two single-sex minicourses on reducing alienation and increasing self-regard and inner direction in women. (Author)
Rostosky, Sharon S.; Riggle, Ellen D. B.
The denial of civil marriage rights is a specific example of minority stress that can negatively affect the psychosocial well-being of self-identified lesbian, gay, bisexual, transgender, and queer (LGBTQ) individuals in same-sex partnerships, their families, and their allies. Counseling psychologists have an important role in addressing the…
... Banners Site Help What's New Welcome to Alcoholics Anonymous ® NEED HELP WITH A DRINKING PROBLEM? If you ... drinking problem, wish to learn more about Alcoholics Anonymous or want to find A.A. near you, ...
In this paper we introduce a novel gossiping primitive to support privacy preserving data analytics (PPDA). In contrast to existing computational PPDA primitives such as secure multiparty computation and data randomization based approaches, the proposed primitive `anonymous gossiping' is a communication primitive for privacy preserving personalized information aggregation complementing such traditional computational analytics. We realize this novel primitive by composing existing gossiping mechanisms for peer sampling & information aggregation and onion routing technique for establishing anonymous communication. This is more an `ideas' paper, rather than providing concrete and quantified results.
In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile. PMID:24724540
Chertov, Oleg; 10.1007/978-3-642-14058-7_61
In recent years the amount of digital data in the world has risen immensely. But, the more information exists, the greater is the possibility of its unwanted disclosure. Thus, the data privacy protection has become a pressing problem of the present time. The task of individual privacy-preserving is being thoroughly studied nowadays. At the same time, the problem of statistical disclosure control for collective (or group) data is still open. In this paper we propose an effective and relatively simple (wavelet-based) way to provide group anonymity in collective data. We also provide a real-life example to illustrate the method.
Dilley, James W.; Schwarcz, Sandy; Murphy, Jessie; Joseph, Charlotte; Vittinghoff, Eric; Scheer, Susan
In a previous report, we demonstrated the efficacy of a cognitively based counseling intervention compared to standard counseling at reducing episodes of unprotected anal intercourse (UAI) among men who have sex with men (MSM) seeking HIV testing. Given the limited number of efficacious prevention interventions for MSM of color (MOC) available, we analyzed the data stratified into MOC and whites. The sample included 196 white MSM and 109 MOC (23 African Americans, 36 Latinos, 22 Asians, eight...
Mubanda Rasmussen, Louise
behaviour. To explore this phenomenon, the paper analyses a number of dynamics characterising HIV counselling in Uganda, including the pressures of the global bio-political project to ‘save lives’ with ART, the counsellors' working conditions in resource-constrained clinics, the professional authority of...
Qvist, Tavs; Cowan, Susan Alice; Graugaard, Christian;
of the Copenhagen MSM community provided sexually transmitted infection counseling and rapid HIV testing. In addition, syphilis testing and hepatitis B vaccination were offered. The clinic was staffed with specially trained, predominantly non-health care personnel, and services were anonymous and free of charge...... out the established health care system. Checkpoint diagnosed 37 new HIV cases, posed no barrier to successful linkage to care, was noninferior in quickly reducing community viral load, was cost-effective, reached younger MSM, and proved an ideal platform for trying out new interventions and test forms......, which conventional health care providers have not yet embraced....
Jonker, Hugo; Pieters, Wolter
According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in e-voting. First, we identify and categorise the types of attack that can be a threat to anonymity of the voter, including different types of vote buying and coercion. This analysis leads to a categorisation of anonymity in voting in terms of a) the strength of the anonymity achieved and b) the extent of interaction between voter and attacker. Some of the combinations, including weak and strong receipt-freeness, are formalised in epistemic logic.
Choi, Kyung-Hee; Lui, Hui; Guo, Yaqi; Han, Lei; Mandel, Jeffrey S.
In China, men who have sex with men (MSM) are at high risk for HIV. However, little is known about their HIV testing behavior. From September 2001 to January 2002, we recruited 482 men through social networks and MSM venues. We conducted HIV testing and counseling, and anonymous, standardized face-to-face interviews. Eighty-two percent of…
Young, Mark E.; DeLorenzi, Leigh de Armas; Cunningham, Laura
Meditation has been studied as a way of reducing stress in counseling clients since the 1960s. Alcoholics Anonymous, Narcotics Anonymous, and new wave behavior therapies incorporate meditation techniques in their programs. This article identifies meditation's curative factors and limitations when using meditation in addiction settings.
In this paper we consider the problem of anonymizing datasets in which each individual is associated with a set of items that constitute private information about the individual. Illustrative datasets include market-basket datasets and search engine query logs. We formalize the notion of k-anonymity for set-valued data as a variant of the k-anonymity model for traditional relational datasets. We define an optimization problem that arises from this definition of anonymity and provide a constant factor approximation algorithm for the same. We evaluate our algorithms on the America Online query log dataset.
Antoniou, Giannakis; Batten, Lynn; Parampalli, Udaya
A number of privacy-enhancing technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who use PETs have been proposed. These are known as anonymity revocation technologies (ARTs). However, the construction of ARTs has been developed in an ad hoc manner without a theoretical basis outlining the goals and underlying principles. In this chapter we present a set of fundamental principles and requirements for construction of an ART, identifying the necessary features. We then propose an abstract scheme for construction of an ART based on these features.
We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.
Sato, Hirotsune; Yoshida, Fujio
The effects of anonymity on self-disclosure were investigated in a CMC (computer-mediated communication) situation by separately manipulating the anonymity of the self and the other. It was hypothesized that anonymity of the self would enhance disclosure, whereas anonymity of the other would decrease it. Female undergraduate students (n = 60) were randomly assigned to a 2 (self: anonymous or non-anonymous) x 2 (other: anonymous or non-anonymous) experimental design. The anonymity of the self and the other was manipulated in the profile, such as the photo, name, and sex of the self or the other, on the computer screen. The results indicated that anonymity of the self decreased the feeling of anxiety, but had no effect on disclosure, whereas anonymity of the other decreased the feeling of closeness and decreased the intimacy of disclosure. PMID:18402057
Molina-Jimenez, C.; Marshall, L.
Anonymizers based on mix computers interposed between the sender and the receiver of an e-mail message have been used in the Internet for several years by senders of e-mail messages who do not wish to disclose their identity. Unfortunately, the degree of anonymity provided by this paradigm is limited and fragile. First, the messages sent are not truly anonymous but pseudo-anonymous since one of the mixes, at least, always knows the sender's identity. Secondly, the strength of the system to protect the sender's identity depends on the ability and the willingness of the mixes to keep the secret. If the mixes fail, the sender/'s anonymity is reduced to pieces. In this paper, we propose a novel approach for sending truly anonymous messages over the Internet where the anonymous message is sent from a PDA which uses dynamically assigned temporary, non-personal, random IP and MAC addresses. Anonymous E-cash is used to pay for the service.
We present a new information-theoretically secure protocol for the anonymous transmission of quantum information. Different from the pioneering works, we use single photons to construct anonymous entanglement instead of multi-partite entangled states in this protocol, and therefore we reduce the complexity of physical implementation in practice.
Baron, Robert S.
Several writers suggest that reducing one's sense of individuality reduces social restraints. The author suggests that the effect of uniformity of appearance on aggression is unclear when anonymity is held constant. This poses a problem of interpretation given that a distinction must be made between lack of individuality and anonymity. One must…
The history of science is replete with important works that were originally published without the author's legal name being revealed. Most modern scientists will have worked anonymously in their capacity as peer reviewers. But why is anonymity so popular? And is it a valid approach? I argue that pseudonymity and anonymity, although not appropriate for all forms of scientific communication, have a vital role to play in academic discourse. They can facilitate the free expression of interpretations and ideas, and can help to ensure that suggestions and criticisms are evaluated dispassionately, regardless of their source. PMID:23570959
Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu
Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.
Zou, Huachun; Wu, Zunyou; Yu, JianPing; Li, Min; Ablimit, Muhtar; Li, Fan; Poundstone, Katharine
Objective To explore the feasibility of using Internet outreach to encourage men who have sex with men (MSM) to get tested for HIV at voluntary counseling and testing (VCT) clinics in Beijing and Urumqi, China. Methods From June to August 2007, two volunteers contacted MSM using instant messaging, online chat rooms, mobile phone, and e-mail (active recruitment). Banners with study information were put at the front pages of three major Chinese gay websites (passive recruitment). Those contacte...
Tupler, Larry A; Hong, Jennifer Y; Gibori, Ron; Blitchington, Timothy F; Krishnan, K Ranga R
College/university students are at high risk for psychiatric disorder and suicide secondary to age, campus stressors, and social pressures. We therefore report frequencies of 18 Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision disorders and suicidal ideation (SI) acquired anonymously from a Web site receiving 113,181 visits from more than 1,500 predominantly US colleges/universities. Depression was foremost, followed by social phobia and eating disorders. Substance-related disorders were less frequent than expected. SI occurred in 47.1% of students, with women evidencing somewhat stronger findings than men. SI was more associated with substance, bipolar, and panic disorders than depression. Self-reported emotional volatility exceeded thoughts of self-harm for all disorders. The results support two subtypes of suicide risk: dysphoric premeditators and those primarily angry and/or impulsive. Clinicians and researchers should therefore consider suicide as an independent psychopathological phenomenon that includes emotional volatility as a risk factor and thoroughly evaluate psychiatric disorders potentially conferring greater suicidal propensity than depression. PMID:25784307
Hart, Trevor A.; Stratton, Natalie; Coleman, Todd A.; Wilson, Holly A.; Simpson, Scott H.; Julien, Rick E.; Adam, Barry D.
Background Even in the presence of promising biomedical treatment as prevention, HIV incidence among men who have sex with men has not always decreased. Counseling interventions, therefore, continue to play an important role in reducing HIV sexual transmission behaviors among gay and bisexual men and other men who have sex with men. The present study evaluated effects of a small-group counseling intervention on psychosocial outcomes and HIV sexual risk behavior. Method HIV-positive (HIV+) peer counselors administered seven 2-hour counseling sessions to groups of 5 to 8 HIV+ gay and bisexual men. The intervention employed information provision, motivational interviewing, and behavioral skills building to reduce sexual transmission risk behaviors. Results There was a significant reduction in condomless anal sex (CAS) with HIV-negative and unknown HIV-status partners, from 50.0% at baseline to 28.9% of the sample at 3-month follow-up. Findings were robust even when controlling for whether the participant had an undetectable viral load at baseline. Significant reductions were also found in the two secondary psychosocial outcomes, loneliness and sexual compulsivity. Conclusions The findings provide preliminary evidence that this intervention may offer an efficient way of concurrently reducing CAS and mental health problems, such as sexual compulsivity and loneliness, for HIV+ gay and bisexual men. Trial Registration ClinicalTrials.gov NCT02546271 PMID:27054341
... 32 National Defense 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling... Programs or Activities Prohibited § 196.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling...
... 45 Public Welfare 3 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Activities Prohibited § 618.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or guidance...
... 34 Education 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling... Programs or Activities Prohibited § 106.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling...
... 45 Public Welfare 4 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Activities Prohibited § 2555.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or guidance...
Research in Privacy Enhancing Technology has meanwhile a tradition of at least 20 years. One application (if not the most significant at the present) of Privacy Enhancing Technology is anonymous Web surfing. While weak protection can be achieved by simple proxy solutions, strong anonymity needs more effort: Systems like JAP and TOR are based on the idea of the "mix network" introduced by David Chaum in 1981. The talk presents selected basic privacy enhancing techniques, available practical so...
Maheshwarkar, Nidhi; Pathak, Kshitij; Chourey, Vivekanand
Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked with the private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. This paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. This paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.
Alhaj Ali Jalila
Full Text Available The evolution and increasing popularity of mobile handheld devices has led to the development of payment applications. The global acceptance of mobile payments is hindered by security and privacy concerns. One of the main problems evoked is the anonymity related with banking transactions. In this paper I propose a new secured architecture for mobile banking. Anonymity and privacy protection are the measures to be enhanced in order to satisfy people’s current needs. The banking platform must provide the highest level of security for messages exchanged between bank and the customer.
Full Text Available Access control systems using the latest biometric technologies can offer a higher level of security than conventional password-based systems. Their widespread deployments, however, can severely undermine individuals' rights of privacy. Biometric signals are immutable and can be exploited to associate individuals' identities to sensitive personal records across disparate databases. In this paper, we propose the Anonymous Biometric Access Control (ABAC system to protect user anonymity. The ABAC system uses novel Homomorphic Encryption (HE based protocols to verify membership of a user without knowing his/her true identity. To make HE-based protocols scalable to large biometric databases, we propose the k-Anonymous Quantization (kAQ framework that provides an effective and secure tradeoff of privacy and complexity. kAQ limits server's knowledge of the user to k maximally dissimilar candidates in the database, where k controls the amount of complexity-privacy tradeoff. kAQ is realized by a constant-time table lookup to identity the k candidates followed by a HE-based matching protocol applied only on these candidates. The maximal dissimilarity protects privacy by destroying any similarity patterns among the returned candidates. Experimental results on iris biometrics demonstrate the validity of our framework and illustrate a practical implementation of an anonymous biometric system.
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 17.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...
... 7 Agriculture 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling... Education Programs and Activities Prohibited § 15a.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in...
... 49 Transportation 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 25.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 86.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...
... 10 Energy 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials... in Education Programs or Activities Prohibited § 5.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in...
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 229.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 146.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...
... 10 Energy 4 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials... on the Basis of Sex in Education Programs or Activities Prohibited § 1042.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...
Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.
Since the beginning of the digital area, privacy and anonymity have been impacted drastically (both, positively and negatively), by the different technologies developed for communications purposes. The broad possibilities that the Internet offers since its conception, makes it a mandatory target for those entities that are aiming to know and control the different channels of communication and the information that flows through. In this paper, we address the current threats against privacy and...
Izabachène, Malika; Pointcheval, David; Vergnaud, Damien
The notion of key privacy for asymmetric encryption schemes was formally defined by Bellare, Boldyreva, Desai and Pointcheval in 2001: it states that an eavesdropper in possession of a ciphertext is not able to tell which specifi key, out of a set of known public keys, is the one under which the ciphertext was created. Since anonymity can be misused by dishonest users, some situations could require a tracing authority capable of revoking key privacy when illegal behavior is detected. Prior wo...
Andrei Gomberg; Cesar Martinelli; Ricard Torres
In a social choice model with an infinite number of agents, there may occur "equal size" coalitions that a preference aggregation rule should treat in the same manner. We introduce an axiom of equal treatment with respect to a measure of coalition size and explore its interaction with common axioms of social choice. We show that, provided the measure space is sufficiently rich in coalitions of the same measure, the new axiom is the natural extension of the concept of anonymity, and in particu...
Kelley, James F; Henning, George; Ambrose, Anthony; Adelman, Alan
Cell-free DNA testing is a recently introduced method for screening pregnant women for fetal trisomy, which is associated with some common significant genetic diseases, as well as the sex of the fetus. The case described here demonstrates the connection between the ultrasound "vanishing twin" phenomenon and the misdiagnosis of prenatal sex using cell-free DNA testing. PMID:27170800
Freedom of speech is a core value of our society. While it can be exercised anonymously towards undesired observers in the physical world, the Internet is based on unique and nonanonymous identifiers (IDs) for every participant. Anonymity, however, is a crucial requirement to exercise freedom of speech using the Internet without having to face political persecution. To achieve anonymity, messages must be unlinkable to senders an receivers. That means that messages cannot be linked to IDs and ...
Behaghel, Luc; Crépon, Bruno; Le Barbanchon, Thomas
We evaluate an experimental program in which the French public employment service anonymized resumes for firms that were hiring. Firms were free to participate or not; participating firms were then randomly assigned to receive either anonymous resumes or name-bearing ones. We find that participating firms become less likely to interview and hire minority candidates when receiving anonymous resumes. We show how these unexpected results can be explained by the self-selection of firms into the p...
Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki
Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.
Mimiaga, Matthew J; Reisner, Sari L; Pantalone, David W; O'Cleirigh, Conall; Mayer, Kenneth H; Safren, Steven A
Crystal methamphetamine use is a major driver behind high-risk sexual behavior among men who have sex with men (MSM). Prior work suggests a cycle of continued crystal methamphetamine use and high-risk sex due to loss of the ability to enjoy other activities, which appears to be a side effect of this drug. Behavioral activation (BA) is a treatment for depression that involves learning to reengage in life's activities. We evaluated a novel intervention for crystal methamphetamine abuse and high-risk sex in MSM, incorporating 10 sessions of BA with integrated HIV risk reduction counseling (RR). Forty-four subjects were screened, of whom 21 met initial entry criteria. A total of 19 participants enrolled; 16 completed an open-phase study of the intervention. Behavioral assessments were conducted at baseline, 3 months postbaseline, and 6 months postbaseline. Linear mixed effects regression models were fit to assess change over time. Mean unprotected anal intercourse (UAI) episodes decreased significantly from baseline to acute postintervention (β=-4.86; 95% confidence interval [CI]=-7.48, -2.24; p=0.0015) and from baseline to 6 months postbaseline (β=-5.07; 95% CI=-7.85, -2.29; p=0.0017; test of fixed effects χ(2)=16.59; df=2,13; p=0.0002). On average, there was a significant decrease over time in the number of crystal methamphetamine episodes in the past 3 months (χ(2)=22.43; df=2,15; p<0.0001), and the number of days of crystal methamphetamine use in the past 30 days (χ(2)=9.21; df=2,15; p=0.010). Statistically significant reductions in depressive symptoms and poly-substance use were also maintained. Adding behavioral activation to risk reduction counseling for MSM with problematic crystal methamphetamine use may augment the potency of a risk reduction intervention for this population. Due to the small sample size and time intensive intervention, future testing in a randomized design is necessary to determine efficacy, with subsequent effectiveness testing. PMID
Full Text Available One of the most well studied models of privacy preservation is k-anonymity. Previous studies of k-anonymization used various utility measures that aim at enhancing the correlation between the original public data and the generalized public data. We, bearing in mind that a primary goal in releasing the anonymized database for datamining is to deducemethods of predicting the private data from the public data, propose a new information-theoretic measure that aims at enhancing the correlation between the generalized public data and the private data. Such a measure significantly enhances the utility of the released anonymized database for data mining. We then proceed to describe a new algorithm that is designed to achieve k-anonymity with high utility, independently of the underlying utility measure. That algorithm is based on a modified version of sequential clustering which is the method of choice in clustering. Experimental comparison with four well known algorithms of k-anonymity show that the sequential clustering algorithm is an efficient algorithm that achieves the best utility results. We also describe a modification of the algorithm that outputs k-anonymizations which respect the additional security measure of l-diversity.
Snyder, Jeffrey K.; Fessler, Daniel M.T.
Narcotics Anonymous (NA) supports long-term recovery for those addicted to drugs. Paralleling social dynamics in many small-scale societies, NA exhibits tension between egalitarianism and prestige-based hierarchy, a problem exacerbated by the addict’s personality as characterized by NA’s ethnopsychology. We explore how NA’s central principle of anonymity normatively translates into egalitarianism among group members. Turning to the lived reality of membership, building on Carr’s (2011) conc...
Dolev, Shlomi; Kopeetsky, Marina
We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.
Scheibe, A; Drame, F M; Shannon, K
Sex work occurs to meet the demand for sexual services and is a universal phenomenon. In Africa sex work takes many forms and is an important source of income for many women. Yet sex worker reproductive health needs remain largely unmet. The criminalisation of sex work; community and service provider stigma; violence; substance use and limited access to health services and prevention commodities contribute to the high HIV burden evident among female sex workers in Africa. Following UNAIDS' three pillar approach to HIV prevention and sex work we present an overview of current opportunities, barriers and suggestions to improve HIV prevention policy and programming for sex work in Africa. Universal access to a comprehensive package of HIV services is the first pillar. Reproductive health commodities; voluntary and anonymous HIV counselling and testing; treatment of sexually transmitted infections, HIV and opportunistic infections; harm reduction for substance use and psychosocial support services make up the recommended package of services. The second pillar is a sex worker-supportive environment. The inclusion of sex worker programmes within national HIV strategic planning; sex worker-led community mobilisation and the establishment of sex work community networks (comprised of sex workers, health service providers, law enforcers and other stakeholders) enable effective programme implementation and are recommended. The reduction of sex worker vulnerability and addressing structural issues form the final pillar. The decriminalisation of sex work; development of supportive policy; gender equality and economic development are key factors that need to be addressed to increase sex worker resilience. Evidence supports the public health benefit of human rights based approaches to HIV prevention; moralistic and restrictive policy and laws towards sex work are harmful and should be removed. The establishment of these pillars will increase sex worker safety and enhance the
A (randomized, anonymous) voting rule maps any multiset of total orders of (aka. votes over) a fixed set of alternatives to a probability distribution over these alternatives. A voting rule f is neutral if it treats all alternatives symmetrically. It satisfies participation if no voter ever benefits from not casting her vote. It is falsename-proof if no voter ever benefits from casting additional (potentially different) votes. It is anonymity-proof if it satisfies participation and it i...
Provides a summary of some of the technical solutions for producing anonymous communication on the Internet and presents an argument that anonymity is as much a part of crime prevention as requiring people to provide their names. Discusses identity theft; the three major techniques that make anonymous cash possible; and anonymizing Internet…
Girault, Philippe; Green, Kimberly; Clement, Nana Fosua; Rahman, Yussif Ahmed Abdul; Adams, Bashiru; Wambugu, Samuel
The 2011 Ghana Men's Study identified a high prevalence of HIV among men who have sex with men (MSM) in Accra/Tema (34.4 %) and in Kumasi (13.6 %), whereas the HIV rate among MSM referred through peer educators (PEs) to HIV testing and counseling (HTC) services in these two sites was substantially lower (8.4 %). These findings raised questions about possible limitations of the peer-education strategy to reach high-risk MSM. Therefore, a pilot study was conducted to assess the feasibility of using a social network strategy (SNS) to identify and refer MSM to HTC services. Within 3 months, 166 MSM were reached and referred to HTC services: 62.7 % reported no recent exposure to PEs; 61.5 % were unaware of their recent HIV serostatus; and 32.9 % were newly diagnosed HIV positive. This pilot study suggests that an SNS could be an important strategy to reach MSM and to increase the uptake of HTC. PMID:25903507
Bettini, Claudio; Mascetti, Sergio; Wang, X. Sean; Freni, Dario; Jajodia, Sushil
The problem of protecting user’s privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving “historical k- anonymity” in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.
Diambra, Joel F.; Pollard, Brittany L.; Gamble, R. M.; Banks, Breanna P.
The pervasiveness of sexual issues in counseling suggests the necessity of educating counseling students about relevant topics. Students enrolled in a human sexuality course anonymously submitted topical questions and secrets/fantasies. Following a content analysis, findings depicted themes of content and tone that provided curricular implications…
MALAN Mark Kim; 乔玉玲
Various methods of sex counseling have existed in many cultures since antiquity.In modern times,evidence based scientific methods of sex counseling continue to be developed.There is a broad range of methods from limited to comprehensive diagnosis and treatment.The biological,psychological,social model is generally accepted as the modern standard of care.Sexologists offering comprehensive care must have a multi-disciplinary education in order to co-ordinate the multi-disciplinary treatment patients may require.Sex counseling must be patient focused and is both an art and a science.Technology offers opportunities for sex counseling via internet and by utilizing media resources.Future sex counseling must address the special social conditions of many diverse world cultures to build sexual harmony in couples.Sexually joyful individuals make healthier families and stronger nations.%自古以来在不同文化中就存在各种性咨询的方式.而在现代,性咨询的循证科学持续发展,出现了大量的专项或综合的诊疗方式.由于现代医疗实施了生物心理社会模式,性学家们在提供综合治疗时必须具有多学科的知识以满足病人多方面的治疗需求.性咨询必须以病人为中心,做到科学和艺术的结合.技术进步使得通过互联网和多媒体开展性咨询成为可能.未来的性咨询必须满足不同国家和文化的特定社会状况,以促进伴侣间的性和谐,构建健康的家庭和强大的国家.
Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan
The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.
Genetic counseling provides information and support to people who have, or may be at risk for, genetic disorders. A ... meets with you to discuss genetic risks. The counseling may be for yourself or a family member. ...
St Lawrence, Janet S; Kelly, Jeffrey A; Dickson-Gomez, Julia; Owczarzak, Jill; Amirkhanian, Yuri A; Sitzler, Cheryl
Contemporary antiretroviral therapy (ART) can produce viral suppression of HIV, maintain health, and prevent onward HIV transmission from infected persons to their sexual partners, giving rise to the concept of treatment as prevention. Successful implementation of test-and-treat strategies rests on the early detection of HIV infection through voluntary counseling and testing (VCT) followed by entry and retention in care, ART initiation and adherence, and subsequent viral suppression. In the United States, African American men who have sex with men (MSM) bear a disproportionate burden of HIV and have high rates of undetected and untreated HIV infection. However, little research has examined racial minority MSM's views about HIV testing. In this study, in-depth interviews were conducted with 96 key informants knowledgeable about racial minority MSM as well as 100 African American MSM community members in Milwaukee, Cleveland, and Miami. Most men in the sample were aware of the availability of testing and knew testing locations, but many voiced great personal ambivalence about being tested, feared knowing their HIV status, expressed concern about stigma and loss of confidentiality, and held beliefs indicative of medical mistrust. Participants did not spontaneously cite benefits of being tested, risk reduction behavior changes made as a consequence of testing, nor the benefits of testing to get early medical care for HIV infection. There is a gap between the public health field's perception of testing benefits and the beliefs about testing held by racial minority MSM in this sample. To increase the desired outcomes from VCT for minority MSM, VCT promotion should address the concerns of African American MSM and underscore the benefits of early entry into medical care. PMID:26010312
Full Text Available OBJECTIVE: To explore the feasibility of using Internet outreach to encourage men who have sex with men (MSM to get tested for HIV at voluntary counseling and testing (VCT clinics in Beijing and Urumqi, China. METHODS: From June to August 2007, two volunteers contacted MSM using instant messaging, online chat rooms, mobile phone, and e-mail (active recruitment. Banners with study information were put at the front pages of three major Chinese gay websites (passive recruitment. Those contacted were offered a modest financial incentive to seek HIV testing at existing VCT clinics. Those who subsequently sought HIV testing services at VCT clinics and provided informed consent completed a questionnaire and a blood draw to test for HIV and syphilis. RESULTS: A total of 3,332 MSM were contacted and 429 attended VCT clinics. One out of every 4 men that were recruited through instant messaging actually went for HIV testing, while the recruitment yields for online gay chat rooms, mobile phone contact, and email were 1∶6, 1∶10, and 1∶140, respectively. The majority of participants (80%, 317/399 reported being motivated to seek HIV testing out of concern for their health, and only 3% (11/399 reported being motivated by the financial incentive. Active recruitment tend to recruit MSM who are younger (X(2 = 11.400, P = 0.001, never tested for HIV (X(2 = 4.281, P = 0.039, tested less often (X(2 = 5.638, P = 0.018. CONCLUSION: Internet outreach is a promising way to encourage MSM to seek HIV testing at existing VCT clinics. Active recruitment can target MSM who are younger, never tested for HIV and tested less often.
... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling materials. 41.425 Section 41.425 Public Lands: Interior Office of the Secretary of the Interior... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 41.425 Counseling and use...
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 54.425 Section 54.425 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 54.425 Counseling and use...
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling materials. 19.425 Section 19.425 Emergency Management and Assistance FEDERAL... Basis of Sex in Education Programs or Activities Prohibited § 19.425 Counseling and use of appraisal...
... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Counseling and use of appraisal and counseling materials. 101-4.425 Section 101-4.425 Public Contracts and Property Management... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 101-4.425 Counseling and...
... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 5.425 Section 5.425 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 5.425 Counseling and use...
... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials. 8a.425 Section 8a.425 Commerce and Foreign Trade Office of the Secretary of Commerce... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 8a.425 Counseling and use...
Nowadays, anonymity and privacy protecting mechanisms are becoming more and more important. The anonymity of platforms and the privacy of users operating in the Internet are major concerns of current research activities. Although different techniques for protecting anonymity exist, standard protocols like Transport Layer Security are still missing adequate support for these technologies. In this paper, we analyze how Trusted Computing technologies and anonymous credential systems can be used ...
Anonymity allows the individual to have a voice without having a name. Since the word “anonymous” entered the English language with the advent of the printing press, the implications of being anonymous - and its lexical offspring “anonymity” - have shifted with time, place, and circumstance. What are the perceived effects of being anonymous/anonymity on the individual and on society? In this paper, I will explore some of the shifting meanings and implications of this concept, first as i...
Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Kelomees, Raivo, 1960-
Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele
Kwee Choy Koh; Lit Sin Yong
We describe the HIV risk perception, sexual behavior, and HIV prevalence among 423 men-who-have-sex-with-men (MSM) clients who received voluntary counseling and testing (VCT) services at a community-based center in Kuala Lumpur, Malaysia. The mean age was 29 years old. One hundred one (23.9%) clients rated themselves as low risk, 118 (27.9%) as medium risk, 36 (8.5%) as high risk, and 168 (39.7%) were unsure of their risk. Twenty-four (9.4%) clients tested HIV positive (4 (4%) low risk, 9 (7....
Full Text Available Introduction: Men who have sex with men (MSM are at increased risk of HIV and other STI infections in Nigeria. This is because MSM are afraid to seek medical help because the healthcare workers in various facilities are afraid of the consequences if they provide services for MSM citing the law as a reason not to intervene. MSM in northern states of Nigeria are facing double-jeopardy because the few international partners working in MSM in Nigeria are pulling out of these volatile areas because of the fear of attacks by the Boko Haram and the Nigerian law enforcement agencies. Objectives: The intervention was conducted to promote affordable and sustainable HIV care and treatment for MSM in Nigeria. Methods: This intervention was conducted in the Boko Haram ravaged cities of Kano and Maiduguri (North-East Nigeria. Twenty MSM-key influencers from the two cities were identified and trained on HIV counselling and testing, caregivers, case managers and on initiation process for ARV treatment for new HIV+MSM as well as ethical considerations. Results: The mean age of the key influencers was 24 years +/−SD. Each of the trained 20 key influencers reached 20 MSM-peer with condom promotion, HCT, referral to identified MSM-community health centers and follow-up/caregiving within the space of one month. The project was able to reach 400 MSM in the two cities. 89% of the peers consented to HCT. HIV prevalence among the participants was at 18%. The project recorded ARV-successful referral to healthcare facilities for the respondents that tested positive. The key influencers have been following up for ARV-adherence. Conclusions: Use of community members should be promoted for sustainability and ownership. It also helps in eradicating socio-cultural barrier to HIV intervention for MSM. Moreover, this proves to be one of the safest and affordable methods of reaching MSM in Nigeria in this ugly time of legalization of homophobia in the country's constitution.
Kwee Choy Koh
Full Text Available We describe the HIV risk perception, sexual behavior, and HIV prevalence among 423 men-who-have-sex-with-men (MSM clients who received voluntary counseling and testing (VCT services at a community-based center in Kuala Lumpur, Malaysia. The mean age was 29 years old. One hundred one (23.9% clients rated themselves as low risk, 118 (27.9% as medium risk, 36 (8.5% as high risk, and 168 (39.7% were unsure of their risk. Twenty-four (9.4% clients tested HIV positive (4 (4% low risk, 9 (7.6% medium risk, 11 (30.6% high risk, and 13 (7.7% unsure risk. We found a positive correlation between risk perception and HIV infection in this study. Clients with high HIV risk perception have 17x the odds of testing HIV positive compared to low risk clients. High HIV risk perception was significantly associated with multiple sex partners, multiple types of sex partners, alcohol use before intercourse, unprotected sex beyond 6 months, and inconsistent condom use during anal sex compared to low risk clients. There were no statistically significant differences between medium risk and unsure risk clients compared to low risk clients. Strategies should be targeted towards change in sexual practices among those who are perceived to be at high risk.
Koh, Kwee Choy; Yong, Lit Sin
We describe the HIV risk perception, sexual behavior, and HIV prevalence among 423 men-who-have-sex-with-men (MSM) clients who received voluntary counseling and testing (VCT) services at a community-based center in Kuala Lumpur, Malaysia. The mean age was 29 years old. One hundred one (23.9%) clients rated themselves as low risk, 118 (27.9%) as medium risk, 36 (8.5%) as high risk, and 168 (39.7%) were unsure of their risk. Twenty-four (9.4%) clients tested HIV positive (4 (4%) low risk, 9 (7.6%) medium risk, 11 (30.6%) high risk, and 13 (7.7%) unsure risk). We found a positive correlation between risk perception and HIV infection in this study. Clients with high HIV risk perception have 17x the odds of testing HIV positive compared to low risk clients. High HIV risk perception was significantly associated with multiple sex partners, multiple types of sex partners, alcohol use before intercourse, unprotected sex beyond 6 months, and inconsistent condom use during anal sex compared to low risk clients. There were no statistically significant differences between medium risk and unsure risk clients compared to low risk clients. Strategies should be targeted towards change in sexual practices among those who are perceived to be at high risk. PMID:25053941
The aim of this thesis is to show the importance of security and anonymity on the internet by demonstrating the use of a SOCKS proxy. In theoretical part, properties of various security mechanisms are explored with focus on SOCKS protocol as one of the most widely used systems. Presented are the inner workings and different versions as well as advantages and drawbacks of the protocol. The paper tries to identify the simplest way of encrypting data traffic by using SOCKS protocol with SSH tunn...
Androulaki, Elli; Bellovin, Steven
Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.
Syta, Ewa; Johnson, Aaron; Corrigan-Gibbs, Henry; Weng, Shu-Chun; Wolinsky, David; Ford, Bryan
Users often wish to communicate anonymously on the Internet, for example in group discussion or instant messaging forums. Existing solutions are vulnerable to misbehaving users, however, who may abuse their anonymity to disrupt communication. Dining Cryptographers Networks (DC-nets) leave groups vulnerable to denial-of-service and Sybil attacks, mix networks are difficult to protect against traffic analysis, and accountable voting schemes are unsuited to general anonymous messaging. DISSENT ...
This articles explores the ratio and characteristics of the right of anonymity on the Internet. A right of anonymity is considered as a shield against oppression, harassment, retaliation, censorship or discrimination and therefore it is considered as a vital component of freedom of speech or freedom of expression. Reference is made to several existing types of rights of anonymity in relation to freedom of expression, such as the right to protect (confidential) journalistic sources, free elec...
Sivasubramanian, R.; K.P. KALIYAMURTHIE
Suppose a medical facility connected with a research institution and the researchers can use themedical details of a patient without knowing the personal details. Thus the research data base used by theresearchers must be anonymized (Sanitized). We can consider another problem in the area of census.Individuals give the private information to a trusted party (Census Bureau) and the census bureau mustpublish anonymized or sanitized version of data. So anonymization is done for privacy. Our work...
Full Text Available Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size was determined by Cochran formula.The short-form NEO Five Factor personality questionnaire administered among selected sample. Data analyzed by descriptive statistic as frequency and percentage, also, inferential statistic as multivariate analysis of variance was run. Results: The results showed that personality profiles of anonymous and non-anonymous addicts were significantly different. That is, mean score of neuroticism in anonymous addicts was less than non anonymous. Also, mean score of extraversion was higher in anonymous addicts. Conclusion: It can be concluded that the anonymous male addicts are differ with non-anonymous male addicts in personality traits.
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l
Full Text Available In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that how we can choose safe web hosting solutions and what the main functions are which provides more security over server data. With the browser security network security is also important which can be implemented using cryptography solutions, VPN and by implementing firewalls on the network. Hackers always try to steal our identity and data, they track our activities using the network application software’s and do harmful activities. So in this paper we described that how we can monitor them from security purposes.
Garcia-Alfaro, Joaquin; Kranakis, Evangelos
Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications). This infrastructure relies on the use of the (1) Radio Frequency Identification (RFID) technology to tag objects in motion and (2) distributed services providing information about objects via the Internet. A lookup service, called the Object Name Service (ONS) and based on the use of the Domain Name System (DNS), can be publicly accessed by EPC applications looking for information associated with tagged objects. Privacy issues may affect corporate infrastructures based on EPC technologies if their lookup service is not properly protected. A possible solution to mitigate these issues is the use of online anonymity. We present an evaluation experiment that compares the of use of Tor (The second generation Onion Router) on a global ONS/DNS setup, with respect to benefits, limitations, and latency.
Hendrickx, Julien M; Tsitsiklis, John N
We propose a model for deterministic distributed function computation by a network of identical and anonymous nodes. In this model, each node has bounded computation and storage capabilities that do not grow with the network size. Furthermore, each node only knows its neighbors, not the entire graph. Our goal is to characterize the class of functions that can be computed within this model. In our main result, we provide a necessary condition for computability which we show to be nearly sufficient, in the sense that every function that violates this condition can at least be approximated. The problem of computing suitably rounded averages in a distributed manner plays a central role in our development; we provide an algorithm that solves it in time that grows quadratically with the size of the network.
Linkage of different records such as health insurance claims or medical records for the purpose of cohort studies or cancer registration usually requires matching with personal names and other personally identifiable data. The present study was conducted to examine the possibility of performing such privacy-sensitive procedures in a "linkable anonymizing" manner using encryption. While bidirectional communication entails encryption and deciphering, necessitating both senders and receivers sharing a common secret "key", record linkage entails only encryption and not deciphering because researchers do not need to know the identity of the linked person. This unidirectional nature relieves researchers from the historical problem of "key sharing" and enables data holders such as municipal governments and insurers to encrypt personal names in a relatively easy manner. The author demonstrates an encryption technique using readily available spread-sheet software, Microsoft Excel in a step-by-step fashion. Encoding Chinese characters into the numeric JIS codes and replacing the codes with a randomly assigned case-sensitive alphabet, all names of Japanese nationals will be encrypted into gibberish strings of alphabet, which can not be deciphered without the secret key. Data holders are able to release personal data without sacrificing privacy, even when accidental leakage occurs and researchers are still able to link records of the same name because encrypted texts, although gibberish, are unique to each name. Such a technical assurance of privacy protection is expected to satisfy the Privacy Protection Act or the Ethical Guidelines for Epidemiological Research and enhance public health research. Traditional encryption techniques, however, cannot be applied to cancer or stroke registration, because the registrar receives reports from numerous unspecified senders. The new public key encryption technique will enable disease registry in a linkable anonymizing manner. However
Froomkin, A. Michael
Regulation of anonymous and pseudonymous communications is an important and contentious Internetrelated issues of the 21st century. Resolution of this controversy will effect freedom of speech, nature of electronic commerce, and capabilities of law enforcement. The legal constraints on anonymous communication, and the constitutional constraints on…
Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie
The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…
Serracino Inglott, P.
Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterio
Regardingt he main title of this project,t he term "inter-personal" refers to the inter-active relationship between people, as in: a psychotherapeutic counselling encounter. Deliberations with relatives, friends and colleagues who disclosed that they had been through similar situations as my own concerning inter-personal experiences with regard to proxemics, fired my aspiration to bring into relief the thread of proximity when relating inter-personally. It also fuelled my wondering about whic...
Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.
This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…
Full Text Available Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF and embryo transfer (ET where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.
C. Bram Cadsby; Maroš Servátka; Fei Song
Employing a two-by-two factorial design that manipulates whether dictator groups are single or mixed-sex and whether procedures are single or double-blind, we examine gender effects in a standard dictator game. No gender effects were found in any of the experimental treatments. Moreover, neither single- versus mixed-sex groups nor level of anonymity had any impact on either male or female behavior.
Mimiaga, Matthew J.; Reisner, Sari L.; Pantalone, David W.; O'Cleirigh, Conall; Mayer, Kenneth H.; Safren, Steven A.
Crystal methamphetamine use is a major driver behind high-risk sexual behavior among men who have sex with men (MSM). Prior work suggests a cycle of continued crystal methamphetamine use and high-risk sex due to loss of the ability to enjoy other activities, which appears to be a side effect of this drug. Behavioral activation (BA) is a treatment for depression that involves learning to reengage in life's activities. We evaluated a novel intervention for crystal methamphetamine abuse and high...
Kohlmayer, Florian; Prasser, Fabian; Eckert, Claudia; Kuhn, Klaus A
Sensitive biomedical data is often collected from distributed sources, involving different information systems and different organizational units. Local autonomy and legal reasons lead to the need of privacy preserving integration concepts. In this article, we focus on anonymization, which plays an important role for the re-use of clinical data and for the sharing of research data. We present a flexible solution for anonymizing distributed data in the semi-honest model. Prior to the anonymization procedure, an encrypted global view of the dataset is constructed by means of a secure multi-party computing (SMC) protocol. This global representation can then be anonymized. Our approach is not limited to specific anonymization algorithms but provides pre- and postprocessing for a broad spectrum of algorithms and many privacy criteria. We present an extensive analytical and experimental evaluation and discuss which types of methods and criteria are supported. Our prototype demonstrates the approach by implementing k-anonymity, ℓ-diversity, t-closeness and δ-presence with a globally optimal de-identification method in horizontally and vertically distributed setups. The experiments show that our method provides highly competitive performance and offers a practical and flexible solution for anonymizing distributed biomedical datasets. PMID:24333850
Full Text Available Social media and social networks are embedded in our society to a point that could not have been imagined only ten years ago. Facebook, LinkedIn, and Twitter are already well known social networks that have a large audience in all age groups. The amount of data that those social sites gather from their users is continually increasing and this data is very valuable for marketing, research, and various other purposes. At the same time, this data usually contain a significant amount of sensitive information which should be protected against unauthorized disclosure. To protect the privacy of individuals, this data must be anonymized such that the risk of re-identification of specific individuals is very low. In this paper we study if anonymized social networks preserve existing communities from the original social networks. To perform this study, we introduce two approaches to measure the community preservation between the initial network and its anonymized version. In the first approach we simply count how many nodes from the original communities remained in the same community after the processes of anonymization and de-anonymization. In the second approach we consider the community preservation for each node individually. Specifically, for each node, we compare the original and final communities to which the node belongs. To anonymize social networks we use two models, namely, k-anonymity for social networks and k-degree anonymity. To determine communities in social networks we use an existing community detection algorithm based on modularity quality function. Our experiments on publically available datasets show that anonymized social networks satisfactorily preserve the community structure of their original networks.
Tamura, Shinsuke; Yanase, Tatsuro
This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.
Providing public access to unprotected digital data can pose a threat of unwanted disclosing the restricted information. The problem of protecting such information can be divided into two main subclasses, namely, individual and group data anonymity. By group anonymity we define protecting important data patterns, distributions, and collective features which cannot be determined through analyzing individual records only. An effective and comparatively simple way of solving group anonymity problem is doubtlessly applying wavelet transform. It's easy-to-implement, powerful enough, and might produce acceptable results if used properly. In the paper, we present a novel method of using wavelet transform for providing group anonymity; it is gained through redistributing wavelet approximation values, along with simultaneous fixing data mean value and leaving wavelet details unchanged (or proportionally altering them). Moreover, we provide a comprehensive example to illustrate the method.
Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina;
A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as does multi-casting one message to a receiver population containing the intended receiver...... resource (e.g. a confidential anonymous channel) from given real resources (e.g. a broadcast channel). We define appropriate anonymous communication resources and show that a very natural resource can be constructed by using a PKE scheme which fulfills three properties that appear in cryptographic...... applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate for the...
... go for genetic counseling, such as: A family history of a genetic condition To learn about genetic screening for diseases that are more common in certain ethnic groups (e.g., sickle cell disease in African Americans and Tay-Sachs disease in Ashkenazi Jews) To discuss abnormal results ...
Decreased privacy is an unavoidable consequence in the drive to make the world a more secure, safer place, according to some analysts. In the on-line world, the conflict between privacy and security manifests itself in a debate between anonymity and accountability. Balance between Anonymity and Accountability is a major concern in web based transactions. The protection of users’ privacy when performing web-based transactions is an important factor in the acceptance and use of Internet and we...
Feigenbaum, Joan; Ford, Bryan
Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the Internet. Unfortunately, OR is known to be vulnerable at least in principle to several classes of attacks for which no solution is known or believed to be forthcoming soon. Current approaches to anonymity also appear unable to offer accurate, princi...
Krause Hansen, Hans; Schoeneborn, Dennis
Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...
This thesis presents the digital payment system Bitcoin. It describes the cryptography on which the system is based. Presented are the short history of the system and the principles of how it works. Highlighted are the state of anonymity that the system provides while making payments and the safety it guarantees while executing transactions. Within the context of anonymity, the state of masking the users identity within the payment system is described, together with warnings and mechanisms to...
Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett
We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081
Lee, Laurie Thomas
States that lawsuits are being filed that challenge anonymity and freedom of speech in cyberspace--is there a right to online anonymity? Examines the debate and issues associated with anonymous communications in cyberspace. Explores the "right of informational privacy" as it pertains to anonymity. Suggests some regulatory approaches for addressing…
Krentzman, Amy R.; Robinson, Elizabeth A. R.; Moore, Barbara C.; Kelly, John F.; Laudet, Alexandre B.; White, William L.; Zemore, Sarah E.; Kurtz, Ernest; Strobbe, Stephen
Evidence from multiple lines of research supports the effectiveness and practical importance of Alcoholics Anonymous and Narcotics Anonymous. Conference presenters discussed the relationship between 12-Step participation and abstinence among various populations, including adolescents, women, and urban drug users. Insight from the arts and humanities placed empirical findings in a holistic context.
Krentzman, Amy R; Robinson, Elizabeth A R; Moore, Barbara C; Kelly, John F; Laudet, Alexandre B; White, William L; Zemore, Sarah E; Kurtz, Ernest; Strobbe, Stephen
Evidence from multiple lines of research supports the effectiveness and practical importance of Alcoholics Anonymous and Narcotics Anonymous. Conference presenters discussed the relationship between 12-Step participation and abstinence among various populations, including adolescents, women, and urban drug users. Insight from the arts and humanities placed empirical findings in a holistic context. PMID:21785524
Kharaji, Morteza Yousefi; Rizi, Fatemeh Salehi
Anonymity has become a significant issue in security field by recent advances in information technology and internet. The main objective of anonymity is hiding and concealing entities privacy inside a system. Many methods and protocols have been proposed with different anonymity services to provide anonymity requirements in various fields until now. Each anonymity method or protocol is developed using particular approach. In this paper, first, accurate and perfect definitions of privacy and a...
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with
Wei Yang; Liusheng Huang; Fang Song
Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of...
R. L. Lagendijk
Full Text Available Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer's identity as a watermark into the content so that the merchant can retrieve the buyer's identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer's identity multiple times, it is essential for the fingerprinting scheme to be anonymous. Kuribayashi and Tanaka, 2005, proposed an anonymous fingerprinting scheme based on a homomorphic additive encryption scheme, which uses basic quantization index modulation (QIM for embedding. In order, for this scheme, to provide sufficient security to the merchant, the buyer must be unable to remove the fingerprint without significantly degrading the purchased digital content. Unfortunately, QIM watermarks can be removed by simple attacks like amplitude scaling. Furthermore, the embedding positions can be retrieved by a single buyer, allowing for a locally targeted attack. In this paper, we use robust watermarking techniques within the anonymous fingerprinting approach proposed by Kuribayashi and Tanaka. We show that the properties of an additive homomorphic cryptosystem allow for creating anonymous fingerprinting schemes based on distortion compensated QIM (DC-QIM and rational dither modulation (RDM, improving the robustness of the embedded fingerprints. We evaluate the performance of the proposed anonymous fingerprinting schemes under additive-noise and amplitude-scaling attacks.
Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.
Internet services can be accessed privately through anonymizing networks like Tor. A set of routers are used to achieve this in order to hide the identity of client from server. The users of such networks often indulge into malicious activities and cause damage to popular web applications. The...... administrators of those web sites do block the IP address from which the request comes. This is not the practical solution as the hackers operate through anonymous networks. Blocking a node based on IP address will cau se misbehaving and genuine users to lost access to the web sites. This is the problem in the...... existing systems and motivation to take up this research work. The proposed system develops a security mechanism that ensures that only the misbehaving users are blackl isted while genuine users and their anonymity are preserved. Even though the misbehaving users are blacklisted, their privacy is still...
Lee, Michael Z.; Dunn, Alan M.; Katz, Jonathan; Waters, Brent; Witchel, Emmett
We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sen...
CHENXiaofeng; ZHANGFangguo; WANGJilin; WANGYumin
A new anonymous fingerprinting protocol based on the principle of electronic cash is proposed in this paper.Redistributing a data item is equal to doublespending electronic cash.Contrasting with the previous coin-based anonymous fingerprinting protocol,we use the real electronic cash to trace traitors instead of the "coins" which serve only as a cryptographic primitive and have no monetary value,so it is easily understood and the bank does not need key-distribution and registration to prepare the "coina".
Full Text Available Anonymization of the Internet traffic usually hides details about the request originator from the target server. Such a disguise might be required in some situations, especially in the case of web browsing. Although the web traffic anonymization is not a part of the http specification, it could be achieved using a certain extra tool. Significant deceleration of anonymized traffic compared to normal traffic is inevitable but it can be controlled in some cases as this article suggests. The results presented here focus on measuring the parameters of such deceleration in terms of response time, transmission speed and latency and proposing the way how to control it. This study focuses on TOR primarily because recent studies have concluded that other tools (like I2P and JAP provide worse service. Sets of 14 file locations and 30 web pages have been formed and the latency, response time and transmission speed during the page or file download were measured repeatedly both with TOR active in various configurations and without TOR. The main result presented here comprises several ways how to improve the TOR anonymization efficiency and the proposal for its automatic control. In spite of the fact that efficiency still remains too low compared to normal web traffic for ordinary use, its automatic control could make TOR a useful tool in special cases.
Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.
Flip through a stack of anonymous student evaluations of professors and the mild comments, even the compliments, tend to blend together. But often, hidden among them, is a dagger. Then there are the out-and-out insults. Students' comments can be more than simply mean. Sometimes student comments aren't cruel, just weird. In this article, some…
Yong Xi; Ke-Wei Sha; Wei-Song Shi; Loren Schwiebert; Tao Zhang
Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on designing the media access and physical layer protocols.Privacy issues in vehicular systems have not been well addressed. We argue that privacy is a user-specific concept, and a good privacy protection mechanism should allow users to select the levels of privacy they wish to have. To address this requirement, we propose an adaptive anonymous authentication mechanism that can trade off the anonymity level with computational and communication overheads (resource usage). This mechanism, to our knowledge, is the first effort on adaptive anonymous authentication. The resources used by our protocol are few. A high traffic volume of 2000 vehicles per hour consumes about 60kbps bandwidth, which is less than one percent of the bandwidth of DSRC (Dedicated Short Range Communications). By using adaptive anonymity, the protocol response time can further be improved 2～4 times with lessthan 20% bandwidth overheads.
Ma Chunguang; Yang Yixian; Hu Zhengming
Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single check is used to pay any price that is not more than the face value. The main problem in check systems is to design an efficient refund mechanism that makes refund checks undistinguished from initial checks during payment and deposit. The problem of anonymity control also called fairness is also an important issue in check systems. All check systems yet are unconditional anonymity that opens the door to misuse for crime such as laundering and blackmailing. In this paper, the notion of anonymity revocation is introduced to electronic check system for the first time, and a model of fair electronic check system is proposed. An efficient fair online electronic check system with reusable refund is presented. In the system, a passive trustee is employed to revoke the anonymity of un-honest users. Moreover, the system solves the reusability problem of refunds thanks to the RSA-based partially signature. The system is efficient and meets all basic security requirements.
This article provides a historical, political, and organizational analysis regarding counseling psychology's involvement in professional school counseling. Issues discussed include collaboration, curriculum and training, and professional identity, as well as the commonalities that bind counselor education/professional school counseling and…
Byrne, J. Stephen; Shufelt, Brett
The present study explored the use of counseling among counselor trainees and the characteristics of consumers and nonconsumers. Approximately 61% of those surveyed (n = 85) reported that they had received counseling, with the majority being mental health counseling trainees. Nonconsumers (n = 54) indicated that they coped with problems in other…
ShenTu, QingChun; Yu, JianPing
The Bitcoin system is an anonymous, decentralized crypto-currency. There are some deanonymizating techniques to cluster Bitcoin addresses and to map them to users' identifications in the two research directions of Analysis of Transaction Chain (ATC) and Analysis of Bitcoin Protocol and Network (ABPN). Nowadays, there are also some anonymization methods such as coin-mixing and transaction remote release (TRR) to cover the relationship between Bitcoin address and the user. This paper studies an...
We present the first quantum secure communication protocol for an anonymous receiver without the assistance of anonymous entanglement. In previous works, if a public sender wants to send quantum messages to a chosen receiver while protecting the identity of the receiver from others, all participants should cooperate first to construct the entanglement between the sender and the anonymous receiver. This is the most important process in anonymous quantum communications. With anonymous entanglement, the sender can communicate quantum messages to the anonymous receiver by applying teleportation protocols. In contrast, our protocol is novel and achieves communication of quantum messages directly from the public sender to the anonymous receiver based on the quantum one-time pad and current achievements. Notably, the anonymity of the receiver, as well as the privacy of the quantum messages, is perfectly protected with the exception of an exponentially small probability in our protocol. (paper)
Whittaker, Shaun R.
Addresses the psychological effects of torture (including solitary confinement) and the implications of torture for counseling and the counseling psychology profession. Discusses counseling issues related to diagnosis of torture victims, treatment, special considerations for counselors, use of testimony as counseling technique, and prognosis.…
Sills, Eric Scott
Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p < 0.001). Infertility duration was ≥3 yrs for couples enrolling in dual gamete donation, and each had ≥2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5\\/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.
Herrmann, Janne Rothmar
bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...
Full Text Available There is an increase activity in research to improve the current electronic payment system which is parallel with the progress of internet. Electronic cash system is a cryptographic payment system which offers anonymity during withdrawal and purchase. Electronic cash displays serial numbers which can be recorded to allow further tracing. Contrary to their physical counterparts, e-cash have an inherent limitation; they are easy to copy and reuse (double-spending. An observer is a tamper-resistant device, issued by the Internet bank, which is incorporated with the Internet user’s computer that prevents double-spending physically, i.e., the user has no access to her e-cash and therefore he cannot copy them. In this paper, we shall present an anonymous electronic cash scheme on the internet which incorporates tamper-resistant device with user-module.
Full Text Available Decreased privacy is an unavoidable consequence in the drive to make the world a more secure, safer place, according to some analysts. In the on-line world, the conflict between privacy and security manifests itself in a debate between anonymity and accountability. Balance between Anonymity and Accountability is a major concern in web based transactions. The protection of users’ privacy when performing web-based transactions is an important factor in the acceptance and use of Internet and web services. There is a tremendous improvement in the automation of the way we pay for goods and services by the variety and growth of electronic banking services available to the consumers. Hence there is a need for the ultimate structure of the new electronic transaction system that has a substantial impact on the personal privacy as well as on the nature and extent of criminal use of E- transactions. This paper presents an approach for such structure.
Jones, Jason J; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam; Marlow, Cameron; Fowler, James H
Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources in order to conduct their research. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects evermore important. However, strict privacy procedures can make joining diverse sources of data that contain information about specific individual behaviors difficult. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as expected theoretically when we apply it to data from Facebook and public voter records.
McGonigle, Ian; Shomron, Noam
The use of non-anonymized human genome data is becoming increasingly popular in research. Here we review the proceedings of a special meeting on this topic that took place at European Molecular Biology Organization (EMBO) in December 2014. The main points discussed centered on how to achieve 'anonymity,' 'trust,' and 'protection of data' in relation to new genomic technologies and research. Following our report of this meeting, we also raise three further issues for future consideration: the harmonization of international law in relation to genetic data protection; the complex issues around the 'dividual' nature of genetic data; and the growing commercial value of personal data. In conclusion, we stress the importance of scientists working in the area of genomic research engaging in interdisciplinary collaborations with humanities and social science scholars and addressing these complicated issues. PMID:26763729
Nowadays, it is a common practice to protect various types of statistical data before publishing them for different researches. For instance, when conducting extensive demographic surveys such as national census, the collected data should be at least depersonalized to guarantee proper level of privacy preservation. In practice, even more complicated methods of data protection need to be used. All these methods can be generally divided into two classes. The first ones aim at providing individual data anonymity, whereas the other ones are focused on protecting information about a group of respondents. In this paper, we propose a novel technique of providing group anonymity in statistical data using singular spectrum analysis (SSA).Also, we apply SSA to defining hidden patterns in demographic data distribution.
K. Venkata Ramana
Full Text Available Releasing person specific data could potentially reveal the sensitive information of an individual. kanonymityis an approach for protecting the individual privacy where the data is formed into set ofequivalence classes in which each class share the same values. Among several methods, local recodingbased generalization is an effective method to accomplish k-anonymization. In this paper, we proposed aminimum spanning tree partitioning based approach to achieve local recoding. We achieve it in twophases. During the first phase, MST is constructed using concept hierarchical and the distances amongdata points are considered as the weights of MST and in the next phase we generate the equivalence classesadhering to the anonymity requirement. Experiments show that our proposed local recoding frameworkproduces better quality in published tables than existing Mondrian global recoding and k-memberclustering approaches.
Stroebel, Sandra S; O'Keefe, Stephen L; Griffee, Karen; Kuo, Shih-Ya; Beard, Keith W; Kommor, Martin J
Retrospective data were entered anonymously by 1,521 adult women using a computer-assisted self-interview. Thirty-one participants were victims of sister-sister incest, 40 were victims of brother-sister incest, 19 were victims of father-daughter incest, 8 were victims of sexual abuse by an adult female (including one mother), and 232 were victims of sexual abuse by an adult male other than their father before reaching 18 years of age. The rest (1,203) served as controls. The victims of sister-sister incest had significantly more problematic outcomes than controls on many measures as adults. Victims of sister-sister incest were more depressed and more likely than controls to be distant from the perpetrator-sister and to have traded sex for money, experienced an unplanned pregnancy, engaged in four different types of masturbation, and engaged in 13 different same-sex behaviors. Our findings were consistent with other reports of early eroticization and persistent hypereroticization of incest victims. PMID:23924178
Israt Jahan; Mohammad Zahidur Rahman; K M Akkas Ali; Israt Jerin
There is an increase activity in research to improve the current electronic payment system which is parallel with the progress of internet. Electronic cash system is a cryptographic payment system which offers anonymity during withdrawal and purchase. Electronic cash displays serial numbers which can be recorded to allow further tracing. Contrary to their physical counterparts, e-cash have an inherent limitation; they are easy to copy and reuse (double-spending). An observer is a tamper-resis...
The New Scientist recently recounted the story of an American teenager conceived through ostensibly anonymous donor insemination who had been able to identify his donor through DNA testing and an internet genetic database service (also see BioNews issue 333, at http://www.bionews.org.uk/new.lasso?storyid=2808). In fact, we have known since Barry Stevens' remarkable documentary, Offspring, released in 2001, that with some genetic background information, access to DNA testing and the intern...
Franke, Günter; Hess, Dieter
This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...
Broadberry, Stephen; Ghosal, Sayantan; Proto, Eugenio
Although the Industrial Revolution is often characterized as the culmination of a process of commercialisation, the precise nature of such a link remains unclear. This paper models and analyzes such link: the role of commercialisation in raising efficiency wages as impersonal and anonymous labour market transactions replace personalized customary relations. In the presence of an aggregate capital externality, we show that the resulting shift in relative factor prices leads to higher capital-i...
Strecker, D. W.; Ney, E. P.
Infrared (0.9 to 18 microns) observations of 232 anonymous 2-micron Sky survey (IRC) sources are reported. Most of the objects appear to be late-type stars with little or no long-wave excess. About ten percent exhibit large excesses. Thirty-one of the brightest 11-micron sources have been remeasured to determine variability. These brighter objects appear to fall into two groups; one group resembles NML Tauri, while the other is like NML Cygni.
Osiers Gyamfuah Grace; Dr. John Rajan
Security and privacy concerns are major issues to be considered in Mobile Ad hoc Networking (MANET). Several routing protocols have been proposed to achieve both routing and data packets security. In order to achieve privacy, the anonymous routing concept has been introduced and few protocols have been proposed for use in this area. In this paper, global position system (GPS) device is used to obtain the current location of nodes and with the help of a cryptographic algorithm incorporated int...
ZHANG Fan; MA JianFeng; SangJae MOON
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore,inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives.
Nielson, Seth James
The very nature of operations in peer-to-peer systems such as BitTorrent exposes information about participants to their peers. Nodes desiring anonymity, therefore, often chose to route their peer-to-peer traffic through anonymity relays, such as Tor. Unfortunately, these relays have little incentive for contribution and struggle to scale with the high loads that P2P traffic foists upon them. We propose a novel modification for BitTorrent that we call the BitTorrent Anonymity Marketplace. Peers in our system trade in k swarms obscuring the actual intent of the participants. But because peers can cross-trade torrents, the k-1 cover traffic can actually serve a useful purpose. This creates a system wherein a neighbor cannot determine if a node actually wants a given torrent, or if it is only using it as leverage to get the one it really wants. In this paper, we present our design, explore its operation in simulation, and analyze its effectiveness. We demonstrate that the upload and download characteristics of c...
Grijpink, J.H.A.M.; Prins, C.
This article sets out the most important conclusions of the first stage of a study into the dimensions of digital anonymity. It is intended to set out the problem, make people aware of the intricacies of the problem and thus stimulate the debate on useful legal structures for anonymity. The article focuses on Holland’s private law dimensions, addressing situations where consumers want to purchase anonymously on the Internet.
Yang, Wei; Huang, Liusheng; Song, Fang
Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.
Karlsberg, Daniel W; Pierce, Read G
Many teaching hospitals employ a care team structure composed of a broad range of healthcare providers with different skill sets. Each member of this team has a distinct role and a different level of training ranging from attending physician to resident, intern, and medical student. Often times, these different roles lead to greater complexity and confusion for both patients and nursing staff. It has been demonstrated that patients have a great degree of difficulty in identifying members of their care team. This anonymity also exists between nursing staff and other care providers. In order to better understand the magnitude of anonymity within the teaching hospital, a ten-question survey was sent to nurses across three different departments. Results from this survey demonstrated that 71% of nurses are "Always" or "Often" able to identify which care team is responsible for their patients, while 79% of nurses reported that they either "Often" or "Sometimes" page a provider who is not currently caring for a given patient. Furthermore, 33% of nurses felt that they were either "Rarely" or "Never" able to recognize, by face and name, attending level providers. Residents were "Rarely" or "Never" recognized by face and name 37% of the time, and interns 42% of the time. Contacting the wrong provider repeatedly leads to de facto delays in medication, therapy, and diagnosis. Additionally, these unnecessary interruptions slow workflow for both nurses and members of the care team, making hospital care less efficient and safe overall. Technological systems should focus on reducing anonymity within the hospital in order to enhance healthcare delivery. PMID:25114570
Bonizzoni, Paola; Dondi, Riccardo
The problem of publishing personal data without giving up privacy is increasingly important. An interesting formalization is the $k$-anonymization, where all rows in a table are clustered in sets of at least $k$ records, and all the entries for which records in the same cluster have different values are suppressed. The problem has been shown to be NP-hard when the records values are over a ternary alphabet and $k=3$. In this paper we show that the problem is not only NP-hard, but also APX-hard, when the records values are over a binary alphabet and $k=3$.
... 1983) For information on genetic counselors and genetic counseling training programs, please download this helpful brochure from the Association of Genetic Counseling Program Directors: Who are Genetic Counselors? Practicing genetic ...
Polcin, Douglas L.
Reviews major recent studies supporting the effectiveness of professional counseling, Alcoholics Anonymous, and specialty programs for treating alcohol and drug problems. Describes the American Society of Addiction Medicine's guidelines for referral to substance abuse services and examples of integrated treatment approaches. (Contains 35…
Clark, Heddy Kovach; Murdock, Nancy L.; Koetting, Kristin
Counseling psychology doctoral students (N = 284) from 53 training programs throughout the United States anonymously completed online measures of burnout, career choice satisfaction, global stress, role conflict, social support (from family/friends, advisors, other students) and psychological sense of community (SOC) in the doctoral program. Two…
Asserts that Catholic schools have fewer problems such as teen pregnancy, sex, drugs, and alcohol, but that there needs to be more information provided to students on sex education. States that a great deal of tutoring and counseling are provided for students in Catholic institutions, and that students are treated with more care. (CW)
When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…
Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni;
To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user to...
董恺; 顾涛; 陶先平; 吕建
Users are vulnerable to privacy risks when providing their location information to location-based services (LBS). Existing work sacrifices the quality of LBS by degrading spatial and temporal accuracy for ensuring user privacy. In this paper, we propose a novel approach, Complete Bipartite Anonymity (CBA), aiming to achieve both user privacy and quality of service. The theoretical basis of CBA is that: if the bipartite graph of k nearby users’ paths can be transformed into a complete bipartite graph, then these users achieve k-anonymity since the set of “end points connecting to a specific start point in a graph”is an equivalence class. To achieve CBA, we design a Collaborative Path Confusion (CPC) protocol which enables nearby users to discover and authenticate each other without knowing their real identities or accurate locations, predict the encounter location using users’ moving pattern information, and generate fake traces obfuscating the real ones. We evaluate CBA using a real-world dataset, and compare its privacy performance with existing path confusion approach. The results show that CBA enhances location privacy by increasing the chance for a user confusing his/her path with others by 4 to 16 times in low user density areas. We also demonstrate that CBA is secure under the trace identification attack.
Computer Security Team
Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy. When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...
Dipali V. Yelane
Full Text Available Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’sIP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network. As a result, administrators block a l known exit nodes of anonymizing networks, denying anonymous access to misbehaving and behaving users alike. To address this problem, we present Nymble, a system in which servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity.Our system is thus agnostic to different servers’ definitions of misbehavior — servers can blacklist users for whatever reason, and the privacy of blacklisted users is maintained.
Anonymous communication is an important building block for privacy enhancing technologies and in addition to this, the deployed anonymity networks have become important tools to protect the users’ privacy in the Internet where hundreds of thousands of users rely on them. During the last decades, researchers have investigated the security aspects of anonymous communication networks. One important research methodology is the investigation of attacks which helps to understand the security proper...
Larsson, Stefan; Svensson, Måns; Kaminski, Marcin
This article analyses current trends in the use of anonymity services among younger Swedes (15-25) and focuses on individuals engaging in illegal file sharing in order to better understand the rationale behind both file sharing as well as online anonymity, especially in relation to enforcement of copyright. By comparing the findings of a survey conducted on three different occasions (early 2009, late 2009 and early 2012), we measure the fluctuations in the use of anonymity services among appr...
Osiers Gyamfuah Grace
Full Text Available Security and privacy concerns are major issues to be considered in Mobile Ad hoc Networking (MANET. Several routing protocols have been proposed to achieve both routing and data packets security. In order to achieve privacy, the anonymous routing concept has been introduced and few protocols have been proposed for use in this area. In this paper, global position system (GPS device is used to obtain the current location of nodes and with the help of a cryptographic algorithm incorporated into the existing Optimized Link State Routing protocol (OLSR, it is expected that security services such as authentication, data integrity, privacy and confidentiality will be provided. This work proposes to protect the network against active attacks such as impersonation and modification.
Full Text Available Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data Mining (PPDM techniques aim at protecting the sensitive data and mining results. In this study, the different Clustering techniques via classification with and without anonymization data using mining tool WEKA is presented. The aim of this study is to investigate the performance of different clustering methods for the diabetic data set and to compare the efficiency of privacy preserving mining. The accuracy of classification via clustering is evaluated using K-means, Expectation-Maximization (EM and Density based clustering methods.
Robinove, Charles J.
Mryl Beck's Forum article denouncing anonymous reviews (Eos, 1 July 2003) is right on the money. Perhaps he read my letter in Applied Physics in 1990 also denouncing anonymous reviews.Some years ago, I received an anonymous review of a paper I had submitted for journal publication. The reviewer raised such interesting questions that I wanted to discuss them with him. I phoned the editor of the journal and asked if he would tell me the name of the reviewer. He politely declined, but when I told him I thought I recognized the handwriting of the reviewer and named him, he relented and said I was correct! I called the reviewer and he was generous enough to spend a wonderful hour on the phone with me discussing the paper. The paper was published with great consideration given to his ideas, much to its betterment. Now that's a reviewer whose interest is in improving the paper and helping the author, not just showing how smart he is or slapping down a junior colleague. The AGU motto,“unselfish cooperation in research,” can be well exemplified by those who wish to help rather than to tear down.
Zabrack, Merle; Miller, Norman
The degree of acquaintance among group members (friends or strangers) and the opportunity for group members to observe each other's actions (anonymous or non-anonymous) were manipulated in a 2 x 2 factorial design, to determine the amount of aversive stimulation that would be administered to a target person. When group members could not observe…
Individualised motivational counselling to enhance adherence to antiretroviral therapy is not superior to didactic counselling in South African patients: Findings of the CAPRISA 058 randomised controlled trial
van Loggerenberg, Francois; Alison D. Grant; Naidoo, Kogieleum; Murrman, Marita; Gengiah, Santhanalakshmi; Gengiah, Tanuja N; Fielding, Katherine; Karim, Salim S. Abdool
Concerns that standard didactic adherence counselling may be inadequate to maximise antiretroviral therapy (ART) adherence led us to evaluate more intensive individualised motivational adherence counselling. We randomised 297 HIV-positive ART-naïve patients in Durban, South Africa, to receive either didactic counselling, prior to ART initiation (n=150), or an intensive motivational adherence intervention after initiating ART (n=147). Study arms were similar for age (mean 35.8 years), sex (43....
Full Text Available With the rapid development of the Internet, anonymity and privacy protection in many applications of the scene is critical. The anonymous authentication means that the server cant know the users identity when they are communicating with each other. In this paper, based on the Wangs zero knowledge proof scheme of possessing a digital signature, we propose a new anonymous authentication scheme. Compared with the Cui-Caos anonymous authentication protocol based on the ring signature, our scheme has two advantages. First, we dont need to know all users public keys. And then our scheme reduces the communication traffic largely. We also discuss the security attributes of our new scheme which are authentication, anonymity and unlinkablity. And then we introduce a concrete application of our scheme. Finally, we make a conclusion of this paper.
As users of networks increasingly aware of their privacy needs, the importance of anonymity is gaining popularity. The reason behind it is that anonymity can hide the actual identity of end users while allowing their to access services of network or web site. More over they are allowed to do so...... without being traced. This usage is prevailing in P2P systems and also payment based networks like e-cash. Achieving anonymity and being able to trace misbehaving users are the two conflicting requirements. This paper proposes a security architecture that is aimed at providing complete anonymity to honest...... users while tracing misbehaving users thus resolving the conflict between anonymity and traceability requirements. In addition to these, this paper also focuses on basic security requirements such as nonrepudiation, data integrity, confidentiality, and authentication. The empirical results revealed that...
Burkhart, Martin; May, Martin
The sharing of network traces is an important prerequisite for the development and evaluation of efficient anomaly detection mechanisms. Unfortunately, privacy concerns and data protection laws prevent network operators from sharing these data. Anonymization is a promising solution in this context; however, it is unclear if the sanitization of data preserves the traffic characteristics or introduces artifacts that may falsify traffic analysis results. In this paper, we examine the utility of anonymized flow traces for anomaly detection. We quantitatively evaluate the impact of IP address anonymization, namely variations of permutation and truncation, on the detectability of large-scale anomalies. Specifically, we analyze three weeks of un-sampled and non-anonymized network traces from a medium-sized backbone network. We find that all anonymization techniques, except prefix-preserving permutation, degrade the utility of data for anomaly detection. We show that the degree of degradation depends to a large exten...
Lageman, A G
Identifies, suggests understandings, and illustrates applications of marketing principles as they relate to pastoral counseling services. Describes four approaches to marketing pastoral counseling--traditional, educational, marketing, and fund raising--and gives illustrations of each. A director of an established pastoral counseling center responds to the article in terms of "high density" and "low density" principles and suggests that strategies which emulate the medical model may need to be re-examined by contemporary pastoral counselors. PMID:10269463
Cross, M. C.
Two hundred and eighty participants (113 Chartered Counselling Psychologists, 167 trainees in Counselling Psychology) took part in the project, conducted over 4 years, which aimed at explicating perspectives on what constitutes the discipline of Counselling Psychology. A range of studies employing diverse methodologies are reported which contribute to the overall aim of the project. Research was conceptualised and executed within the constructivist framework and drew heavily upon the Kellian ...
Lilley, Stacey Custer
Despite much attention given to effective teams in the workplace, school counseling teams have been neglected in the research. The primary purpose of this mixed methods study was to learn what characteristics secondary counselors perceive contribute to an effective school counseling team. The first research phase conducted six team interviews; themes emerging from the interviews yielded the development of the Effective School Counseling Team Questionnaire (ESCTQ). The following research quest...
The Virginia Tech Thomas E. Cook Counseling Center has been accredited by the International Association of Counseling Services, Inc., an organization of United States, Canadian, and Australian counseling agencies based in Alexandria, Va.
This article describes a new prenatal genetic test that is painless, early, and increasingly available. State legislatures have reacted by prohibiting abortion for reason of fetal sex or of fetal diagnosis and managing genetic counseling. This article explores these legislative responses and considers how physicians and genetic counselors currently communicate post-testing options. The article then examines the challenges ahead for genetic counseling, particularly in light of the troubling grip of abortion politics on conversations about prenatal diagnosis. PMID:26242943
O'Morain, Padraig; McAuliffe, Garrett J.; Conroy, Kayte; Johnson, Jennifer M.; Michel, Rebecca E.
Counseling in Ireland has experienced rapid growth in the past 30 years. Public attitudes toward counseling have become more positive, especially with the increasing secularization of a once strongly religious Catholic society. Licensure is nonexistent but there are certification bodies that attempt to ensure qualified practice. There is no…
Straehle, Manfred; Soucar, Beth
This paper explores the supportive and effective uses of improvisation in counseling. Specifically, the intention in this paper is to accomplish three goals: to explore the history of improvisation in psychotherapy, to examine the aspects of improvisation that pertain to the counseling process, and to identify ways in which the use of…
Smiley, Elizabeth B.
Provides a brief conceptual statement about bisexuality. Offers a review of existing research studies, and suggests issues to consider when counseling bisexual clients. Defines bisexuality and discusses prevalence studies, identity development, and implications for counseling. Claims that bisexuality challenges traditional rules about sexual…
Woody, Robert Henley
Responds to earlier four articles on integration of counseling psychology and neuropsychology by noting that neuropsychology occurs in settings with high risk of legal complaints. Contends that aspiration to press counseling psychology toward clinical neuropsychology should be filtered through consideration for legal risk. Explores legal…
Hohenshil, Thomas H.; Amundson, Norman E.
This article begins with a rationale for including international articles in the "Journal of Counseling & Development." Then, 2 general categories of international articles are described. First are articles that provide a general overview of counseling in a particular country. The 2nd category is more general and might involve international…
This short survey of UK infertility counsellors was designed to determine whether the removal of donor anonymity resulted in noticeable changes in prospective parents' stated intentions regarding disclosure of their origins to any children conceived through donor conception. Members of the British Infertility Counselling Association working in Human Fertilisation and Embryology Authority (HFEA) -- licensed centres, before and after the legal changes, were sent a short questionnaire that included space for free comments (take-up: 62%). Three-quarters reported changes. Of these, two-thirds said prospective parents were more likely to say they would disclose, while less than a tenth said prospective parents were less likely do so. Where no changes were noted, this was primarily because the majority of prospective parents had stated their intention to be open even prior to the legal changes. Possible influences on intentions included: the culture within the centre, moves towards openness within the wider society, and parents' lack of confidence regarding how to go about disclosure. Follow-up studies are needed to improve understanding of whether influences on decision making carry through to patterns of actual disclosure; whether involvement in counselling affects outcomes; and whether access to professional assistance at the time of planned disclosure is helpful. PMID:18569064
Shue, Craig A [ORNL; Gupta, Prof. Minaxi [Indiana University
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While many existing schemes provide strong anonymity, they are inappropriate when high bandwidth and low latency are required. In this work, we explore an anonymity scheme for end hosts whose performance makes it possible to have it always on. The scheme leverages the natural grouping of hosts in the same subnet and the universally available broadcast primitive to provide anonymity at line speeds. Our scheme is strongly resistant against all active or passive adversaries as long as they are outside the subnet. Even within the subnet, our scheme provides reasonable resistance against adversaries, providing anonymity that is suitable for common Internet applications.
Srinath, T R; Pais, Alwyn Roshan; 10.5121/ijitcs.2011.1401
The use of e-Auction services has been increasing in recent years. Security requirements in conducting e-Auctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with asymmetric models in which the commercial entity of an auction issuer or registration manager is assumed in addition to the auctioneer. Multi-attribute reverse auctions promise higher market efficiency and effective information exchange. This work extends and uses the existing schemes. This scheme uses scoring function, winner determination in multi-attribute auctions to implement public verifiability. Anonymity is achieved through bidder side pseudonym generation. By results and analysis we say this is very simple and effective scheme. This scheme ensures public verifiability and anonymity in multi-attribute auctions w...
Martin M. Merener
Full Text Available Consider a database D with records containing history of individuals' transactions, that has been de-identified, i.e., the variables that uniquely associate records with individuals have been removed from the data. An adversary de-anonymizes D via a linkage attack if using some auxiliary information about a certain individual in the database, it can determine which record of D corresponds to such individual. One example of this is given in the article Robust De-anonymization of Large Sparse Datasets, by Narayanan and Shmatikov , which shows that an anonymized database containing records with ratings of different movies rented by customers of Netflix, could in fact be de-anonymized using very little auxiliary information, even with errors. Besides the heuristic de-anonymization of the Netflix database, Narayanan and Shmatikov provide interesting theoretical results about database de-anonymization that an adversary can produce under general conditions. In this article we revisit these theoretical results, and work them further. Our first contribution is to exhibit different simple cases in which the algorithm Scoreboard, meant to produce the theoretical de-anonymization in , fails to do so. By requiring 1-sim to be a pseudo-metric, and that the algorithm producing the de-anonymization outputs a record with minimum support among the candidates, we obtain and prove deanonymization results similar to those described in . We then consider a new hypothesis, motivated by the fact (observed in heuristic de-anonymizations that when the auxiliary information contains values corresponding to rare attributes, the de-anonymization achieved is stronger. We formalize this using the notion on long tail , and give new theorems expressing the level of de-anonymization in terms of the parameters of the tail of the database D. The improvement in the deanonymization is reflected in the fact that when at least one value in the auxiliary information
De Cock, Barbara; Michaud Maturana, Daniel; 4th Biennial Meeting of the International Association for the Study of Spanish in Society (SIS-EES) / 6th International Conference of Hispanic Linguistics
Identity and anonymity: victims and perpetrators in human rights reports In this paper, we look into the construction of identity and anonymity in human rights reports, more concretely in the report by the Rettig Commission on human rights violations under the Pinochet regime. In the preliminaries to this report, the commission formulates its desire to give an account that is as complete as possible yet also its refraining from attributing individual responsibility (Oteíza 2010). We will anal...
Bahi, Jacques; Couchot, Jean-François; Friot, Nicolas; Guyeux, Christophe
In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve this goal, we propose an information hiding scheme being stego-secure, which is the highest level...
Cirucci, Angela M.
Social networking sites allow people to create, broadcast, and interpret the self in new and evolving ways. While early online social media studies praised the Internet for providing an anonymous space in which to experiment with identity, more recent research suggests that social networking sites have become not anonymous, as they compel users to perform identity in new ways. Through a novel application of affordance theory, this paper argues that instead of attempting to apply outdated defi...
Privacy, including the privacy of correspondence (communications), is a human right. Privacy Enhancing Technologies (PETs) provide a number of tools with the aim to protect this right. Anonymity networks, such as Tor, contribute to privacy by providing a degree of anonymity for an individual's Internet traffic. An increase in mobile devices connecting to the Internet is predicted to surpass static connections by 2014. The desire for privacy will provide additional challenges in the future, fo...
Security and privacy in distributed systems are long-standing hard problems. On the one hand, solutions for anonymous communications over the Internet are either vulnerable to traffic analysis or offer poor performance. On the other hand, compromises within enterprises remain hard to track down due to complex dependencies between hosts, applications, and their data.In this thesis, I develop two solutions to improve the anonymity vs. performance trade-off for communications over the Internet. ...
Rongjun Yu; Pan Hu; Ping Zhang
Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we...
LIU Yi; XIANG Ming-sen; WANG Yu-min
By using Pedersen' s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous payment protocol which have following features:protecting the confidentiality of sensitive payment information from spying by malicious hosts; using a trusted third party in a minimal way; verifying the validity of the share by the merchant; allowing agent to verify that the product which it is about to receive is the one it is paying for; keeping the customer anonymous.
Full Text Available Current de facto standard payment and billing models for commercial cloud storage services provide a plethora of information to the cloud provider about its clients. This leads to a hostile environment when seen from a privacy perspective. Motivated by recently leaked facts about large scale governmental surveillance efforts as well as the lack of privacy-preserving measures in existing commercial cloud storage services, in this paper, we investigate the feasibility of so called anonymous cloud storage services which require user payment (which we call commercial anonymous cloud storage. Anonymity in this context can be seen as the absence of information to uniquely identify a provider's client that is storing and manipulating data at the provider while at the same time still allowing fair billing, for both, the clients and the cloud provider. Although encrypting data prior to outsourcing helps to protect data privacy and can be achieved without the cloud provider's consent, the issues we are interested in, do not seem to be achievable that easily. However, while various measures for the latter issue, i.e., realizing access privacy, have been studied in the past, the role of privacy in context of billing and payment for cloud storage has, until now, remained unexplored. We therefore introduce an abstract model for commercial cloud storage services to define various types of anonymous cloud storage, study several payment and billing models for cloud storage services and their impact on the anonymity of the service's clients. Moreover, we discuss several solutions to provide anonymity within the different models. Our findings highlight the importance of anonymous payment for the practical deployment of commercial privacy-friendly cloud storage services. Furthermore, we provide directions for future work in some settings, i.e., when anonymous payment is not available, as interesting open challenges.
R. KALPANA; N. Rengarajan
Problem statement: Ad hoc networks are susceptible to malicious attacks through denial of services, traffic analysis and spoofing. The security of the ad hoc routing protocol depends upon encryption, authentication, anonymity and trust factors. End-to-end security of data is provided by encryption and authentication, topology information of the nodes can be obtained by studying traffic and routing data. This security problem of ad hoc network is addressed by the use of anonymity mechanisms an...
Gonçalves, João Fernando Ferreira
Several studies have linked deindividuation to an increase in aggression and incivility. This paper seeks to ascertain the influence of anonymity and hierarchy in online aggression by comparing two different newspaper comment sections: one with a hierarchical system and the other with an equalitarian setting. This study distinguishes itself form previous works by analyzing systems where identification is optional and where identified and anonymous users coexist. The hierarchical solution m...
Newhauser, Wayne; Jones, Timothy; Swerdloff, Stuart; Newhauser, Warren; Cilia, Mark; Carver, Robert (British painter, ca.1730-1791); Halloran, Andy; Zhang, Rui
Electronic medical records (EMR) and treatment plans are used in research on patient outcomes and radiation effects. In many situations researchers must remove protected health information (PHI) from EMRs. The literature contains several studies describing the anonymization of generic Digital Imaging and Communication in Medicine (DICOM) files and DICOM image sets but no publications were found that discuss the anonymization of DICOM radiation therapy plans, a key component of an EMR in a can...
A total of 84 individuals with addiction issues (e.g., drugs, sex, weight, food, and codependency) were asked about their willingness to incorporate religion or spirituality in their counseling. These respondents expressed willingness to deal with religion or spirituality in counseling if the counselor was knowledgeable about their religion or…
Kok-Seng WONG; Myung Ho KIM
Recently, privacy concerns about data collection have received an increasing amount of attention. In data collection process, a data collector (an agency) assumed that all respondents would be comfortable with submitting their data if the published data was anonymous. We believe that this assumption is not realistic because the increase in privacy concerns causes some re-spondents to refuse participation or to submit inaccurate data to such agencies. If respondents submit inaccurate data, then the usefulness of the results from analysis of the collected data cannot be guaranteed. Furthermore, we note that the level of anonymity (i.e., k-anonymity) guaranteed by an agency cannot be verified by respondents since they generally do not have access to all of the data that is released. Therefore, we introduce the notion of ki-anonymity, where ki is the level of anonymity preferred by each respondent i. Instead of placing full trust in an agency, our solution increases respondent confidence by allowing each to decide the preferred level of protection. As such, our protocol ensures that respondents achieve their preferred ki-anonymity during data collection and guarantees that the collected records are genuine and useful for data analysis.
Full Text Available BACKGROUND: Clients of sex workers represent a relevant target for interventions aimed at the prevention of HIV and sexually transmitted infections (STIs. Within prevention strategies, the AIDS and sexually transmitted infections helpline (Telefono Verde AIDS/ IST, TVA-IST of National Institute of Health in Italy has provided, since 1987, specific information and counselling interventions. AIM: The present study reports data on anagraphical characteristics and behaviours of clients of sex workers, anonymously reported at TVA-IST in the period 1987-2010. DISCUSSION: Among 95 149 phone calls (14% of the total considered 99.5% came from males, over 80% aged under 37 years and prevalently from Northern Italy. Among sexual behaviours, unprotected sexual intercourses were reported in the 26% of the calls. Subjects under 27 years reported a higher frequency of unprotected anal intercourse, while they used protection with oral and vaginal intercourses in a greater extent than older ones. Due to differential behaviours within clients of sex workers, specific informative strategies for this targeted population should adequately consider age-related differences.
Alexander, Chelsea K A; Veach, Patricia McCarthy; Lian, Fengqin; LeRoy, Bonnie S
International exchange training in genetic counseling is increasing, but research examining these experiences is lacking. In this study 309 genetic counseling students and genetic counselors completed an anonymous survey investigating six major research questions: (1) How prevalent are international genetic counseling experiences? (2) What types are pursued and why? (3) What supports and barriers exist? 3) What are the demographic characteristics of individuals accruing international experience? (5) Does international experience promote professional development? and (6) Do genetic counseling students and professionals perceive international experiences as beneficial? Most respondents were Caucasian females born in one of 25 countries. The most prevalent experiences involved either clinical observation or clinical training. Common motivations for pursuing international experience were personal growth, exposure to a different healthcare system, and travel opportunities. Outcomes included professionally-relevant experience and personal growth. Barriers included finances, limited availability of opportunities, and for those without international experience, family responsibilities. Additional findings, practice and training implications, and research recommendations are provided. PMID:23423708
Full Text Available Human immunodeficiency virus (HIV testing with pre and postcounseling aiming behavior change communication (BCC for core/bridge population is the main element of holistic model of health care. Voluntary counseling and testing center (VCTC remodeled as integrated counseling and testing center (ICTC-general is the ′gateways to care′. It was hospital-based cross sectional study of 811 clients registered at VCTC of Kesar SAL Hospital from January to December 2007. These patients either came voluntarily or by referral. Anonymous and unlinked information was collected on predesigned schedule and data was analyzed to find out the seropositivity, demographic characteristics (among attendees and HIV positives, and epidemiological vulnerability of different segments of population. Among the attendees, 64% were males, 75% in the age group of 20-49 years, 80% were currently married, and 70% were literate (< 10 th standard. Also, 66% clients were gainfully employed, while one-fourth were housewives; 98% lived with families, 75% were referred by doctors, and only 19% walked in directly. Dominant reason for visiting ICTC was the history/presence of high risk behavior (HRB (34%. 35% indulged in heterosexual route; other HRB (men having sex with men or MSM and injecting drug users or IDU were rare. There were more positive among males, 20-49 years of age group, those living singly, unmarried, divorcee, widow(er and separated. Similarly positives were more amongst illiterates, less educated and those engaged in unskilled and semi skilled jobs. Adolescent students (>14 years accounted for one-fifth of the total positives. Direct walk in clients were more positive compared to those referred by doctors. Those who confessed of history/presence of HRB accounted for all except 3 (85% positives. 51% indulged in heterosexual sex followed by MSM (8%. Overall sero positivity was 4.8%; high in males, 30-49 years age, unmarried and divorcee etc. Sero prevalence decreased
Araoz, Daniel L.
Twelve couples in marital counseling were studied during 12 months on the basis of their biorhythms. For each couple a compatibility percentage was obtained. It was found that difficulties in their interaction correlated highly with dissonance in their biorhythms. (Author)
... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.3100.... Chapter 35 Counseling § 21.3100 Counseling. (a) Purpose of counseling. The purpose of counseling is to...)) (b) Availability of counseling. Counseling assistance is available for— (1) Identifying and...
Genetic counselling and testing for females with a family history of haemophilia has long been advocated. However, there is little research in regard to clients\\' satisfaction with the existing counselling models in haemophilia, and in particular with nurse-led clinics. The purpose of this study was to evaluate whether clients were satisfied with a nurse-led carrier testing clinic and counselling service. A retrospective quantitative study of clients\\' satisfaction and perceived knowledge was undertaken using an anonymous questionnaire. A sample of 42 women who had attended the clinic in the last 12 months was identified. The response rate for the study was 71% (n = 30).Two thirds of the respondents were 35 years of age or younger, 93% had a family history of haemophilia and 56% were diagnosed as carriers. Perceived understanding and knowledge increased significantly between the first and second appointments (p < 0.001). Overall, the study identified a high level of client satisfaction with the nurse-led carrier testing clinic and counselling service.
Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina
Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.
van Drie, A; Ganzevoort, R R; Spiering, M
Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria on the other. We analyzed helpseeking questions of two protestant Christian organizations in the Netherlands providing anonymous pastoral care: Refoweb and EO-Nazorg. Sexual themes were addressed in 19 and 2.3 % of the submitted questions, respectively. Of the helpseekers, 56 % is female, 15 % male, and 29 % unknown. Questions and problems for which people seek anonymous pastoral care focus primarily on premarital abstinence, gender roles, contraception, sexual orientation and masturbation. The authority of the Bible seems to be important for questioners, especially when dealing with ethical questions. Different relations between the normativity of the church tradition and sexual and spiritual health are discussed. PMID:23784431
Bahi, Jacques M; Friot, Nicolas; Guyeux, Christophe
In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve this goal, we propose an information hiding scheme being stego-secure, which is the highest level of security in a well defined and studied category of attacks called "watermark-only attack". This category of attacks is the best context to study steganography-based anonymity through the Internet. The steganalysis of our steganographic process is also studied in order to show it security in a real test framework.
Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.
Full Text Available User-Generated Content (UGC is opening up new large market in content services, and more and more people are visiting web sites to share and enjoy UGCs. These trends make many authors to move into online. Authors want to conserve their authorship and expect to publish their UGC anonymously in cases. To meet the requirements, we propose a new authorship control model based on watermarking and metadata. Authors can embed their authorship into their UGC with identities or with anonym. Even though an author publishes his UGC anonymously, he can prove his authorship without unveiling his identity via 5 methods utilizing the proposed authorship model. The proposed model and methods need no TTP and are robust even based on fragile underlying watermarking scheme.
Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.
Ohkubo, Miyako; Abe, Masayuki
This paper studies the relations among several definitions of anonymity for ring signature schemes in the same attack environment. It is shown that one intuitive and two technical definitions we consider are asymptotically equivalent, and the indistinguishability-based technical definition is the strongest, i. e., the most secure when achieved, when the exact reduction cost is taken into account. We then extend our result to the threshold case where a subset of members cooperate to create a signature. The threshold setting makes the notion of anonymity more complex and yields a greater variety of definitions. We explore several notions and observe certain relation does not seem hold unlike the simple single-signer case. Nevertheless, we see that an indistinguishability-based definition is the most favorable in the threshold case. We also study the notion of linkability and present a simple scheme that achieves both anonymity and linkability.
席胜军; 何玉芳; 周晓红; 周丹丹; 王晨程
Objective To understand the status of HIV Voluntary Counseling and Testing (VCT) and its influencing factors among female community commercial sex workers in Xiacheng District of Hangzhou, and to provide basic evidence for the expanded HIV - VCT.Methods A questionnaire survey was conducted among commercial sex workers selected by stratified sampling. The status of HIV - VCT was collected and the influencing factors of VCT were analyzed with univariate analysis and multivariate logistic regression. Results The rate of participation in VCT in r, heard of VCT, known places of VCT among 446 Female commercial sex workers were 14.13％, 41.10％and 22. 87％, respectively. Married, having symptoms of sexual transmitted diseases, acceptance of prevention measures, having possibility of a self- sense of infection HIV and known places of VCT were contributing factors for participating in VCT among Female community commercial sex workers. Conclusion The rate of participation in VCT among Female community commercial sex workers is low and the level of understanding towards VCT is insuffieient. Therefore, behavior intervention and hospital VCT promotion should be fully implemented and enhanced.%目的 了解杭州市下城区社区暗娼人群艾滋病自愿咨询检测(VCT)现状及其影响因素,为扩大VCT范围提供科学依据.方法 采用分层抽样的方法,对暗娼人群进行问卷调查,了解参加VCT现状,应用单因素和多因素Logistic回归分析参加VCT的相关影响因素.结果 共调查446名社区暗娼,14.13%最近1年参加VCT,41.70%听说过VCT,22.87%知道提供VCT地方.在婚、有性病症状、接受预防措施服务、自我感觉有感染HIV可能性及知晓VCT地方是暗娼参加VCT的促进因素.结论 该区社区暗娼参加VCT比例低,对VCT了解程度不够,应继续加强行为干预和医院VCT宣传.
Guo-Zhu Geng; Ge Gao; Yu-Hua Ruan; Ming-Run Yu; Yun-Hua Zhou
Background:Human immunodeficiency virus (HIV) is spreading rapidly among men who have sex with men (MSM) in China.Anonymous questionnaires or direct interviews have been frequently used to study their behavior.The aim of the study was to describe the behavioral risk profile of the MSM in Beijing using the randomized response techniques (RRTs).Methods:A cross-sectional survey of sexual behavior among a sample of MSM was conducted in two HIV counseling and testing clinics in Beijing.The survey was carried out with an anonymous questionnaire containing sensitive questions on sexual behavior.To obtain the honest responses to the sensitive questions,three distinctive RRTs were used in the questionnaire:(1) Additive randomized response model for quantitative questions,(2) randomized response model for multiple choice questions,and (3) Simmons randomized response model for binomial questions.Formulae for the point estimate,variance,and confidence interval (CI) were provided for each specific model.Results:Using RRTs in a sample of 659 participants,the mean age at first homosexual encounter was estimated to be 21.7 years (95％ CI:21.2-22.2),and each had sex with about three (2.9,95％ CI:2.4-3.4) male partners on average in the past month.The estimated rate for consistent condom use was 56.4％ (95％ CI:50.1-62.8％).In addition,condom was estimated to be used among 80.0％ (95％ CI:74.1-85.9％) of the population during last anal sex with a male partner.Conclusions:Our study employed RRTs in a survey containing questions on sexual behavior among MSM,and the results showed that RRT might be a useful tool to obtain truthful feedback on sensitive information such as sexual behavior from the respondents,especially in traditional Chinese cultural settings.
Stewart Kenton Bertram
Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'
To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.
Adamson, Nicole A.; Kress, Victoria E.
The use of reused or recycled materials in counseling interventions provides counselors with an opportunity to use unique counseling mediums while simultaneously being socially and fiscally responsible. In this article, ways that reused or recycled items can be used in counseling are discussed. Practical suggestions for using reused or recycled…
Murdock, Nancy L.
Scheel et al. offer an interesting analysis on the publication rate of counseling-related research articles in counseling psychology's two major journals. In this reaction to their work, the author considers various aspects of their results and contemplates possible explanations for the decline of counseling-related publications. The author…
... testosterone restore sexual functioning? When is sexual counseling helpful? Any sexual problem caused or worsened by anxiety ... sexual function, speaking with a therapist can be helpful. Most counseling lasts about 2 or 3 sessions. ...
Goldin, Eugene; Bordan, Terry; Araoz, Daniel L.; Gladding, Samuel T.; Kaplan, David; Krumboltz, John; Lazarus, Arnold
This article explores the existence of humor in counseling from the perspectives of several leaders in the field. Specifically, the last 5 authors describe some of their thoughts and experiences regarding the emergence of humor in counseling.
Bank, Mads; Nissen, Morten
The article articulates experiments with spatial constructions in two Danish social work agencies, basing on a) a sketchy genealogical reconstruction of conceptualisations and uses of space in social work and counselling; b) a search for theoretical resources to articulate new spaces, and c) data...... from a long-standing collaboration with the social workers. Beside the classical disciplinary and pastoral spaces, we find spaces of attunement, spaces of production, and public spaces as forms of spatialisations which might be taken as prototypical in attempts to develop social work and counselling....
... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.5100.... Chapter 32 Counseling § 21.5100 Counseling. (a) Purpose. The purpose of counseling is: (1) To assist in... of counseling. Counseling assistance in available for— (1) Identifying and removing reasons...
Reviews the life of Abraham Maslow, a key founder of the humanistic approach to counseling, and his contributions to the counseling field. Maintains that Maslow's innovative work was often misinterpreted by both his admirers and his critics, yet remains highly relevant to current concerns in counseling. (Author/PVV)
Coman, Gregory J.; Evans, Barry J.; Burrows, Graham D.
Group counseling has been used to assist individuals to overcome difficulties associated with problem gambling behavior; however, there are few reports of this application in the clinical and research literature. This paper provides a brief review of group counseling, and describes the application of group counseling to assist individuals with…
Fong-Beyette, Margaret L.
Responds to Wittman's previous article on counseling and marketing by discussing concerns about two of Wittman's purposes for use of marketing: improved services in consumers and economic survival of counseling profession. Agrees that counseling profession needs to understand basic marketing principles used by business and health care industry;…
Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…
This paper explores the benefits of the design elements of public anonymity and private accountability in classroom Knowledge Sharing Systems (KSS). The major findings of this study indicate that classroom KSS have the potential to allow for greater equity of input, reduce academic anxiety, increase teachers knowledge of student understanding …
Descy, Don E.
Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…
A. Usha Rani
Full Text Available In this paper, we consider the collaborative data publishing problem for anonymizing horizontally partitioned data at multiple data providers. We consider a new type of “insider attack” by colluding data providers who may use their own data records (a subset of the overall data in addition to the external background knowledge to infer the data records contributed by other data providers. The paper addresses this new threat and makes several contributions. First, we introduce the notion of m-privacy, which guarantees that the anonymized data satisfies a given privacy constraint against any group of up to m colluding data providers. Second, we present heuristic algorithms exploiting the equivalence group monotonicity of privacy constraints and adaptive ordering techniques for efficiently checking m-privacy given a set of records. Finally, we present a data provider-aware anonymization algorithm with adaptive m- privacy checking strategies to ensure high utility and m-privacy of anonymized data with efficiency. Experiments on real-life datasets suggest that our approach achieves better or comparable utility and efficiency than existing and baseline algorithms while providing m-privacy guarantee.
Shermis, Mark D.; Lottridge, Sue; Mayfield, Elijah
This study investigated the impact of anonymizing text on predicted scores made by two kinds of automated scoring engines: one that incorporates elements of natural language processing (NLP) and one that does not. Eight data sets (N = 22,029) were used to form both training and test sets in which the scoring engines had access to both text and…
Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel V. S.; Kommor, Martin J.
Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were…
Discussion of role-play focuses on a case study of an asynchronous, anonymous online role-play at an Australian university within a WebCT bulletin board that was designed as an alternative to an existing face-to-face workshop to offer more flexible access for participants. Suggests further research needs. (Author/LRW)
Full Text Available Role play activities provide opportunities for learners to adopt unfamiliar roles, engage in interactions with others, and get involved in realistic tasks. They are often recommended to foster the development of soft skills and a wider perspective of the world. Such activities are widely used as an online teaching approach, with examples ranging from the simple use of email to the employment of virtual worlds and Web 2.0 technologies.This paper provides a case study of a role play activity which employs real-time anonymous discussion forums and aims to improve our understanding of effective role play and the impact of anonymity. This role play has been effective in educating learners about different perspectives on the issue of Quality in Further Education. The context and implementation of the role play are outlined, and the learners’ interactions and experiences are explored using an investigative analysis of discussion transcripts and semi-structured interviews with participants. The findings suggest that role engagement and anonymity are important components for success in synchronous online role play. Evidence is presented that provides an insight into the factors which encourage role engagement, including prior experiences and contributions from peers. The impact of anonymity is also explored since many participants did not regard the study environment as real and attempted to identify their peers.
A. van Drie; R.R. Ganzevoort; M. Spiering
Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria o
Davis, S. J.; Benshoff, John J.; Koch, D. Shane
One-hundred and fifty-one students enrolled in substance abuse counselor training classes were surveyed on their attitudes about spirituality in substance abuse treatment and their beliefs about the principles of Alcoholics Anonymous (AA). Significant correlations were found between the subjects' spirituality and their attitudes toward…
Roper, Kristin Grabarek; Sobel, Karen
Librarians who provide virtual reference services often perceive that their patrons self-identify to some degree, even when transactions are anonymous. They also develop a sense of patrons' greatest research-related needs over time. In this article, two librarians analyze two years' worth of virtual reference transcripts to determine what patrons…
Shklovski, Irina; Vertesi, Janet
to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...
Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.
Jing Xu; Wen-Tao Zhu
Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication,processing and storage capabilities.In this paper,we present a generic construction that converts any existing secure password authentication scheme based on a smart card into an anonymous authentication scheme for roaming services.The security proof of our construction can be derived from the underlying password authentication scheme employing the same assumptions.Compared with the original password authentication scheme,the transformed scheme does not sacrifice the authentication efficiency,and additionally,an agreed session key can be securely established between an anonymous mobile user and the foreign agent in charge of the network being visited.Furthermore,we present an instantiation of the proposed generic construction.The performance analysis shows that compared with other related anonymous authentication schemes,our instantiation is more efficient.
Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…
Liang Jian; Ao Qingyun; Chen Ying
This letter presents an anonymous off-line electronic payment model with multiple issuing-banks and gives an implementation scheme based on the discrete logarithm problem and the random oracle model. Comparing with previous works, the proposed scheme benefits from no involvement of customer group authority and its security depends on the known difficulty of resolving general discrete logarithm problem.
Timpanaro, Juan Pablo; Chrisment, Isabelle; Festor, Olivier
Anonymous communication has gained more and more interest from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anonymous file-sharing among users. However, one major problem with anonymous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21...
Dahm, John W.
To achieve full professional maturity, counselors must begin the process of self-study and assess the direction and leadership that is developing within the profession. The acceptance and success of counseling in educational settings may depend on the degree to which counselors are change-oriented, team-oriented, and outcome-oriented. (Author)
de Silva, Padmal
Discusses the relevance of the principles and practices of Buddhism to the field of counseling. As Buddhism espouses the notion of a productive and healthy life, it offers ways of dealing with problems and difficulties, and of improving psychological well-being. Cites examples of relevant Buddhist techniques and their application. (JPS)
Investigations are described that were carried out by the Centre d'Information de Documentation et d'Orientation of the Rene Descartes University to find an answer to the counseling problems arising from student admission, through coursework, and upon leaving the university to start a career. (Author/MLW)
Counseling and guidance services are vital in any school curriculum. Counselors may themselves be dealing with students of diverse abilities and handicaps. Counselors may have to work with students affected by drug addiction, fetal alcohol syndrome, homelessness, poverty, Acquired Immune Deficiency Syndrome (AIDS) and divorce. Students may present…
Sabella, Russell A.
Counselors today are presented with a number of differing applications software. This article intends to advance the counselor's knowledge and considerations of the various aspects of application software. Included is a discussion of the software applications typically of help to counselors in (a) managing their work (computer managed counseling);…
Keat, Donald B., II, Ed.
Contains six articles focusing on current developments in multimodal counseling. Topics addressed include multimodal methods of interviewing children, helping children with anger, and enhancing self-concept. Describes utilizing helping books with children, and the multimodal effect of physical exercise. (RC)
Safe sex means taking steps before and during sex that can prevent you from getting an infection, or from ... the skin around the genital area. Before having sex: Get to know your partner and discuss your ...
Wright, Michelle F
Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace. PMID:24724731
Roberts, Lynne D.; Rajah-Kanagasabai, Camilla J.
Academic staff members encourage university students to use online student discussion boards within learning management systems to ask and answer questions, share information and engage in discussion. We explore the impact of anonymity on student posting behaviour. An online survey was completed by 131 second year undergraduate psychology students…
Youngsook Lee; Juryon Paik
An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreig...
Ohno-Machado, Lucila; Vinterbo, Staal; Dreiseitl, Stephan
Protecting individual data in disclosed databases is essential. Data anonymization strategies can produce table ambiguation by suppression of selected cells. Using table ambiguation, different degrees of anonymization can be achieved, depending on the number of individuals that a particular case must become indistinguishable from. This number defines the level of anonymization. Anonymization by cell suppression does not necessarily prevent inferences from being made from the disclosed data. P...
The central theme of this thesis is infertility. It links different areas of my work as a chartered counselling psychologist working with clients experiencing difficulties conceiving. I currently work in private practice specialising in this area. Previously I worked as an NF counsellor at the Assisted Conception Unit of the Lister Hospital in London. Although the term `infertility' is commonly used, being `infertile' means a total absence of reproductive function and this condition is rare (...