WorldWideScience

Sample records for anonymous hiv workplace

  1. HIV disclosure in the workplace

    OpenAIRE

    Degroote, S.; Vogelaers, D.; Koeck, R.; Borms, R.; De Meulemeester, L.; Vandijck, Dominique

    2014-01-01

    Objectives: As HIV is currently a chronic and manageable disease, an increasing amount of people living with HIV (PLHIV) are (again) active on the labour market. Since research on this topic is scarce, this study aimed to explore experiences of PLHIV in the workplace, especially concerning disclosure and adherence to antiretroviral therapy. Methods: A questionnaire was developed and validated in collaboration with Sensoa (Flemish expertise centre for sexual health) and participants were recru...

  2. HIV/AIDS issues in the workplace of nurses

    Directory of Open Access Journals (Sweden)

    A Minnaar

    2005-09-01

    Full Text Available HIV/AIDS is a global problem with an estimated 40 million infected people. In less than two years, this figure will leap to 100 million according to the World Health Organisation (WHO. By 2005,65 million people will be infected. Half of the number of people in this group will be under 25 years old, and will die before they reach the age of 35. In a South African study done by the Human Science Research Council and published in 2003, regarding the impact of HIV/AIDS on the health sector, the findings were that 15% of health workers in public and private hospitals tested positive for HIV antibodies. Together with these facts above it was found that 46.2 percent of patients served in medical and paediatric wards tested positive for HIV. These factors have major implication for staffing in the future and the role of the nurse manager in South Africa. The aim of the study: to explore the management of HIV/AIDS in the workplace of nurses in selected health services in KwaZulu-Natal. This research was part of a greater study on the exploration of the presence of caring as part of nursing management. . The methodology: the qualitative research approach was used with a phenomenological design, which ensured that the richness and the complexities are reflected in the study. The data was collected by means of an open-ended question to nurse managers during an interview. The first question posed was; How do you or your s e n ’ices care fo r nurses in this hospital? Secondly nurse managers were asked, To explain their role in caring for HIV/AIDS positive nurses on their staff establishment. . The results: a qualitative analysis of the interviews with nurse managers indicated that they rate HIV/AIDS issues as an important part of their management task. Four main themes were identified, namely HIV/AIDS, counselling, dying of AIDS and funerals. Rich descriptions of these themes are given in this paper. Nurse managers in the health services are managing HIV

  3. Barriers to workplace HIV testing in South Africa: a systematic review of the literature.

    Science.gov (United States)

    Weihs, Martin; Meyer-Weitz, Anna

    2016-01-01

    Low workplace HIV testing uptake makes effective management of HIV and AIDS difficult for South African organisations. Identifying barriers to workplace HIV testing is therefore crucial to inform urgently needed interventions aimed at increasing workplace HIV testing. This study reviewed literature on workplace HIV testing barriers in South Africa. Pubmed, ScienceDirect, PsycInfo and SA Publications were systematically researched. Studies needed to include measures to assess perceived or real barriers to participate in HIV Counselling and Testing (HCT) at the workplace or discuss perceived or real barriers of HIV testing at the workplace based on collected data, provide qualitative or quantitative evidence related to the research topic and needed to refer to workplaces in South Africa. Barriers were defined as any factor on economic, social, personal, environmental or organisational level preventing employees from participating in workplace HIV testing. Four peer-reviewed studies were included, two with quantitative and two with qualitative study designs. The overarching barriers across the studies were fear of compromised confidentiality, being stigmatised or discriminated in the event of testing HIV positive or being observed participating in HIV testing, and a low personal risk perception. Furthermore, it appeared that an awareness of an HIV-positive status hindered HIV testing at the workplace. Further research evidence of South African workplace barriers to HIV testing will enhance related interventions. This systematic review only found very little and contextualised evidence about workplace HCT barriers in South Africa, making it difficult to generalise, and not really sufficient to inform new interventions aimed at increasing workplace HCT uptake. PMID:26560013

  4. [Utilization of anonymous HIV testing by the federal health office--developments and motives].

    Science.gov (United States)

    Scheibner, J; Waldvogel, B

    1993-01-01

    In the state-run health office in Ulm a survey of the frequency of anonymous HIV-antibody tests was taken between 1985 to 1991, of the age and gender representation from 1988 to 1991, of the test motives from 1.1.1990 to 1.3.1991. The result was a regressive trend following the test boom of 1987 and 1988, which is becoming more and more stable. The relation of men and women has been amounting to 6:4 in the last four years; the proportion of women receding slightly but constantly. The main motive of being tested was finding out about a high-risk or potentially high-risk sexual contact, mostly at the beginning of a new partnership. The motive ranking second in frequency was the investigation of the consequences of blood exposure, mostly relating to medical work. The third place was taken by irrational anxieties as a test motive. The article discusses the fact that test at the beginning of a new partnership frequently have the meaning of a sacrifice and a symbol of bondage in combination with a vow to be faithful. In case of irrational anxieties about AIDS the test-counsellor gets a chance to diagnose a possibly neurotic development at a very early stage, so that painful and expensive chronification and generalisation could be stopped or eased. PMID:8435542

  5. Factors associated with failure to return for HIV test results in a free and anonymous screening centre.

    Science.gov (United States)

    Laanani, Moussa; Dozol, Adrien; Meyer, Laurence; David, Stéphane; Camara, Sékou; Segouin, Christophe; Troude, Pénélope

    2015-07-01

    Free and anonymous screening centres (CDAG: Centres de Depistage Anononyme et Gratuit) are public facilities set up for HIV infection diagnosis in France. Some people visiting CDAG fail to return for test results and are not informed of their serology. This study aimed to assess factors associated with failure to return for HIV test results. Patients visiting the Fernand-Widal CDAG (Paris) for an HIV test in January-February 2011 were eligible to take part in the study. Data were collected with an anonymous self-administered questionnaire. Factors associated with failure to return were assessed using logistic regression models. Of the 710 participants (participation rate 88%), 46 patients failed to return. Not specifying birthplace and not living in the region of Paris were associated with failure to return. Those who perceived no risk of HIV infection and those who felt they were more at risk than other people were both statistically associated with failure to return. Self-perceived risk seemed to be of chief concern for failure to return for HIV test results and should be considered during pre-test counselling.

  6. Should HIV and AIDS workplace programmes still be advocated in the automotive industry?

    OpenAIRE

    Liana Steenkamp; Jill von der Marwitz; Friederike Baasner-Weihs; Jacques Pietersen

    2015-01-01

    Orientation: In light of the human immunodeficiency virus (HIV) pandemic, and in order to improve competitiveness in the South African private sector, many structures have implemented subsidised workplace programmes.Research purpose: The aim of this study was to collect baseline data regarding the knowledge, attitudes, practices and belief (KAPB) of employees in the automotive industry in relation to HIV and AIDS, in order to assess the need for HIV and AIDS workplace programmes.Motivation fo...

  7. Do employees participate in workplace HIV testing just to win a lottery prize? A quantitative study

    Directory of Open Access Journals (Sweden)

    Martin Weihs

    2016-02-01

    Full Text Available Orientation: To encourage workers to participate in workplace HIV testing, some SouthAfrican automotive companies use lotteries. However, there is a lack of empirical evidence on how lottery incentives may influence employees’ workplace HIV counselling and testing behaviour.Research purpose: Determine whether workers intend to test for HIV only to win a lottery prize.Motivation for the study: The positive and also negative influences of lotteries on workers’ HIV testing behaviour need to be understood to avoid undue coercion in workplace HIV testing participation.Research design, approach and method: Post-test only quasi-experimental studies were conducted the day HIV testing and lotteries were announced to staff in four companies using a cross-sectional, self-administered survey that measured workers’ workplace HIV testing behaviour intentions. Intention to participate in workplace HIV counselling and testing was used as the main outcome of respondents’ behaviour and investigated via the statement: ‘If the company would organise its on-site Wellness Day tomorrow, I would go testing for HIV tomorrow’. In a first setting, two companies’ workers had to test for HIV to be entered in the lottery (n = 198. In the second setting, two other companies’ workers did not have to test to be entered in the lottery (n = 316. Chi-square tests were conducted to measure significant differences between the two conditions distinguishing between permanent and non-permanent staff.Main findings: No significant association was found between behaviour intention in the two settings for permanent workers’ workplace HIV testing intention ( χ2 = 1.145, p = 0.285, phi = -0.097. However, a significant association with a small effect size was found for non-permanent workers ( χ2 = 8.04, p = 0.005, phi = -0.279.Practical/managerial implications: Results show that lotteries to encourage workplace HIV testing are very likely to help workers ‘do the right

  8. Voluntary anonymous linked study of the prevalence of HIV infection and hepatitis C among inmates in a Canadian federal penitentiary for women.

    OpenAIRE

    Ford, P M; White, C; KAUFMANN, H.; MacTavish, J; Pearson, M.; Ford, S.; Sankar-Mistry, P; Connop, P

    1995-01-01

    OBJECTIVE: To determine the seroprevalence of HIV infection and hepatitis C among inmates of a federal penitentiary for women. DESIGN: Voluntary, anonymous, linked, point-prevalence study involving testing of blood samples for antibodies to HIV and hepatitis C virus. PARTICIPANTS: All inmates of the multilevel security federal Prison for Women, Kingston, Ont., who volunteered to participate in the study. Inmates at this long-stay facility are from across Canada. OUTCOME MEASURE: Seroprevalenc...

  9. Should HIV and AIDS workplace programmes still be advocated in the automotive industry?

    Directory of Open Access Journals (Sweden)

    Liana Steenkamp

    2015-03-01

    Full Text Available Orientation: In light of the human immunodeficiency virus (HIV pandemic, and in order to improve competitiveness in the South African private sector, many structures have implemented subsidised workplace programmes.Research purpose: The aim of this study was to collect baseline data regarding the knowledge, attitudes, practices and belief (KAPB of employees in the automotive industry in relation to HIV and AIDS, in order to assess the need for HIV and AIDS workplace programmes.Motivation for the study: Given the abundance of HIV and AIDS information, the question is whether these workplace programmes’ efforts are still relevant.Research design, approach and method: A quantitative descriptive study design was used using a self-administered questionnaire covering questions about KAPB with regard to HIV and AIDS. The data collection took place in seven automotive supplier companies in South Africa (n = 733 who were going to implement HIV and AIDS workplace programmes with the support of the Automotive Industry Development Centre in the Eastern Cape.Main findings: High-risk behaviour, as indicated by sexual relations with more than one partner in the last 12 months, occurred in between 12% (management and 42% (cleaners of employees. All risk behaviour indicators showed significant differences (p < 0.05 between management and administrative staff on the one hand and technicians, operators and cleaners on the other. Despite being aware of an HIV policy, more than 50% of employees indicated that they would not be willing to disclose their status.Practical/managerial implications: As HIV and AIDS risk behaviour and stigma remain a problem, HIV infection with associated health problems may threaten productivity in the automotive industry if no measures are taken to address the impact on employees and the company.Contribution: This study strongly supports the conclusion that KAPB studies can still provide important information to tailor HIV workplace

  10. Mortality and morbidity among HIV type-1-infected patients during the first 5 years of a multicountry HIV workplace programme in Africa

    NARCIS (Netherlands)

    S.F. van der Borght; P. Clevenbergh; H. Rijckborst; P. Nsalou; N. Onyia; J.M. Lange; T.F. Rinke de Wit; M.F.S. van der Loeff

    2009-01-01

    BACKGROUND: This study aimed to evaluate the effectiveness of an HIV workplace programme in sub-Saharan Africa. METHODS: The international brewing company, Heineken, introduced an HIV workplace programme in its African subsidiaries in 2001. Beneficiaries from 16 sites in 5 countries were eligible. H

  11. South African HIV/AIDS programming overlooks migration, urban livelihoods, and informal workplaces.

    Science.gov (United States)

    Vearey, Jo; Richter, Marlise; Núñez, Lorena; Moyo, Khangelani

    2011-01-01

    South Africa has the largest population of people living with HIV globally and is associated with high population mobility. The majority of migrants move in search of improved livelihood opportunities, and many who migrate (both internally and across borders) move into urban areas, often through peripheral informal settlements where HIV prevalence is shown to be double that of urban formal areas. While the relationship between migration and the spread of HIV is acknowledged as complex, the context of migration may place individuals at increased risk for acquiring HIV. Studies have demonstrated the long-wave impact of HIV and AIDS on livelihood activities and, more recently, on patterns of migration. Many migrants engage in livelihood strategies situated within the urban 'informal economy'; these informal workplaces are often overlooked in global and national legislation governing workplace responses to health and HIV and AIDS. This study draws on existing research and limited primary data to explore the implications of HIV/AIDS programming for diverse migrant groups labouring in informal workplaces in Johannesburg, South Africa. We describe three case studies: waste-pickers at a dumpsite in a peripheral urban informal settlement; barmen and cleaners working in inner-city hotels where sex is also sold; and, migrants engaged in informal livelihood activities who are also members of burial societies. Given the importance of varied informal livelihood activities for diverse migrant groups, particularly in urban areas of South Africa, we propose that the national HIV/AIDS response can and should engage with internal and cross-border migrants in informal workplaces - which is in line with the principle of universal access and will strengthen the national response. Especially, we point out the potential for burial societies to provide an entry point for HIV/AIDS programming that targets migrant groups involved in the informal economy of South African cities. PMID:25865514

  12. Mathematical Analysis of the Effects of HIV-Malaria Co-infection on Workplace Productivity.

    Science.gov (United States)

    Seidu, Baba; Makinde, Oluwole D; Seini, Ibrahim Y

    2015-06-01

    In this paper, a nonlinear dynamical system is proposed and qualitatively analyzed to study the dynamics and effects of HIV-malaria co-infection in the workplace. Basic reproduction numbers of sub-models are derived and are shown to have LAS disease-free equilibria when their respective basic reproduction numbers are less than unity. Conditions for existence of endemic equilibria of sub-models are also derived. Unlike the HIV-only model, the malaria-only model is shown to exhibit a backward bifurcation under certain conditions. Conditions for optimal control of the co-infection are derived using the Pontryagin's maximum principle. Numerical experimentation on the resulting optimality system is performed. Using the incremental cost-effectiveness ratio, it is observed that combining preventative measures for both diseases is the best strategy for optimal control of HIV-malaria co-infection at the workplace.

  13. The role of HIV/AIDS committees in effective workplace governance of HIV/AIDS in South African small and medium-sized enterprises (SMEs).

    Science.gov (United States)

    Vaas, Jocelyn R

    2008-04-01

    The primary purpose of this study was to assess the role, status and scope of workplace HIV/AIDS committees as a means of effective workplace governance of the HIV/AIDS impact, and their role in extending social protective HIV/AIDS-related rights to employees. In-depth qualitative case studies were conducted in five South African small and medium-sized enterprises (SMEs) that were actively implementing HIV/AIDS policies and programmes. Companies commonly implemented HIV/AIDS policies and programmes through a workplace committee dedicated to HIV/AIDS or a generic committee dealing with issues other than HIV/ AIDS. Management, through the human resources department and the occupational health practitioner often drove initial policy formulation, and had virtually sole control of the HIV/AIDS budget. Employee members of committees were mostly volunteers, and were often production or blue collar employees, while there was a notable lack of participation by white-collar employees, line management and trade unions. While the powers of workplace committees were largely consultative, employee committee members often managed in an indirect manner to secure and extend social protective rights on HIV/AIDS to employees, and monitor their effective implementation in practice. In the interim, workplace committees represented one of the best means to facilitate more effective workplace HIV/AIDS governance. However, the increased demands on collective bargaining as a result of an anticipated rises in AIDS-related morbidity and mortality might prove to be beyond the scope of such voluntary committees in the longer term. PMID:18496614

  14. HIV Risk Behaviours Differ by Workplace Stability Among Mexican Female Sex Workers With Truck Driver Clientele

    OpenAIRE

    Chen, Nadine E.; Steffanie A Strathdee; Gudelia Rangel; Patterson, Thomas L.; Uribe-Salas, Felipe J.; Perth Rosen; Jorge Villalobos; Kimberly C Brouwer

    2012-01-01

    Background. In a study of female sex workers (FSWs) servicing truck driver clients in Mexican border cities, we evaluated differences in HIV/STI risk behaviours determined by workplace. Design and Methods. Our study was cross-sectional and its population comprised 100 FSWs from Nuevo Laredo (US border) and 100 FSWs from Ciudad Hidalgo (Guatemalan border). The main outcome was that the primary place of sex work was unstable in a public place (street, vehicle, gas station, etc.) intead of stab...

  15. Workplace and HIV-related sexual behaviours and perceptions among female migrant workers

    OpenAIRE

    Yang, H; Li, X; Stanton, B.; Fang, X.; Lin, D.; Mao, R; H. Liu; Chen, X; SEVERSON, R.

    2005-01-01

    Data from 1,543 female migrants working in eight occupational clusters in Beijing and Nanjing, China were analysed to examine the association of workplace with HIV-related behaviours and perceptions. For sexually experienced women (n = 666, 43.2%), those working in entertainment establishments or personal service (e.g., nightclubs, dancing halls, barbershops, beauty salons, massage parlours, etc.) engaged in risky sexual practices twice as frequently as those working in non-entertainment esta...

  16. Data-protection standards and confidentiality of HIV/AIDS status in the workplace - a South African case study.

    Science.gov (United States)

    Muskat-Gorska, Zuzanna

    2008-11-01

    The article contextualises an emerging new regime for information privacy in South Africa (i.e. the draft Protection of Personal Information Bill). Subsequently, it discusses the possibility of successful implementation of international data-protection standards in an environment where there is an urgent need to balance HIV/AIDS confidentiality rights with public health requirements. Also, the article presents a preliminary assessment of the possible impact of professionalisation (and outsourcing) of workplace HIV/AIDS management on workplace data-protection practices, and it identifies some spaces for social dialogue on HIV/AIDS-data treatment in South Africa. The study methods comprise an analysis of legal documents (concerning international data-protection standards and the development of law governing data protection and HIV/AIDS confidentiality in South Africa) and interviews conducted with workplace health managers and trade union representatives, in Johannesburg, in 2007.

  17. Anonymous Gossiping

    CERN Document Server

    Datta, Anwitaman

    2010-01-01

    In this paper we introduce a novel gossiping primitive to support privacy preserving data analytics (PPDA). In contrast to existing computational PPDA primitives such as secure multiparty computation and data randomization based approaches, the proposed primitive `anonymous gossiping' is a communication primitive for privacy preserving personalized information aggregation complementing such traditional computational analytics. We realize this novel primitive by composing existing gossiping mechanisms for peer sampling & information aggregation and onion routing technique for establishing anonymous communication. This is more an `ideas' paper, rather than providing concrete and quantified results.

  18. Against anonymity.

    Science.gov (United States)

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile.

  19. Against anonymity.

    Science.gov (United States)

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile. PMID:24724540

  20. Group Anonymity

    CERN Document Server

    Chertov, Oleg; 10.1007/978-3-642-14058-7_61

    2010-01-01

    In recent years the amount of digital data in the world has risen immensely. But, the more information exists, the greater is the possibility of its unwanted disclosure. Thus, the data privacy protection has become a pressing problem of the present time. The task of individual privacy-preserving is being thoroughly studied nowadays. At the same time, the problem of statistical disclosure control for collective (or group) data is still open. In this paper we propose an effective and relatively simple (wavelet-based) way to provide group anonymity in collective data. We also provide a real-life example to illustrate the method.

  1. Workplace and HIV-related sexual behaviours and perceptions among female migrant workers.

    Science.gov (United States)

    Yang, H; Li, X; Stanton, B; Fang, X; Lin, D; Mao, R; Liu, H; Chen, X; Severson, R

    2005-10-01

    Data from 1,543 female migrants working in eight occupational clusters in Beijing and Nanjing, China were analysed to examine the association of workplace with HIV-related behaviours and perceptions. For sexually experienced women (n = 666, 43.2%), those working in entertainment establishments or personal service (e.g., nightclubs, dancing halls, barbershops, beauty salons, massage parlours, etc.) engaged in risky sexual practices twice as frequently as those working in non-entertainment establishments (e.g. restaurants, stalls, domestic service, factories, etc.). About 10% of women in the entertainment establishments reported having sold sex, 30% having multiple sexual partners and 40% having sex with men with multiple sexual partners. The rate of consistent condom use was less than 15%. They also tended to have a higher level of perceptions of both peer risk involvement and positive expectancy of risk behaviours, and lower perceptions of severity of STDs and HIV. For women who were not sexually experienced, those working in 'stalls' or 'domestic service' tended to perceive higher peer risk involvement, less severity of HIV infection, and less effectiveness of protective behaviour. The occupational pattern of sexual risk behaviours and perceptions observed in the current study indicates employment conditions are associated with HIV risk. Intervention strategies should be tailored to address occupational-related factors. PMID:16120499

  2. Harm reduction measures and injecting inside prison versus mandatory drugs testing: results of a cross sectional anonymous questionnaire survey. The European Commission Network on HIV Infection and Hepatitis in Prison.

    OpenAIRE

    Bird, A G; Gore, S M; Hutchinson, S J; Lewis, S. C.; Cameron, S; Burns, S

    1997-01-01

    OBJECTIVES: (a) To determine both the frequency of injecting inside prison and use of sterilising tablets to clean needles in the previous four weeks; (b) to assess the efficiency of random mandatory drugs testing at detecting prisoners who inject heroin inside prison; (c) to determine the percentage of prisoners who had been offered vaccination against hepatitis B. DESIGN: Cross sectional willing anonymous salivary HIV surveillance linked to a self completion risk factor questionnaire. SETTI...

  3. Ethical standards for the occupational health-nursing practitioner regarding the HIV positive person in the workplace

    Directory of Open Access Journals (Sweden)

    A C Botes

    2001-01-01

    Full Text Available The occupational health-nursing practitioner often becomes involved in ethical dilemmas with regard to the handling of HIV-positive people in the workplace in that the interests of the HIV-positive people conflict with the interests of the employer.

    Opsomming
    Die beroepsgesondheidsverpleegkundige raak dikwels in etiese dilemmas betrokke ten opsigte van die hantering van die MIV-positiewe persoon by die werkplek deurdat die belange van die MIV-positiewe persoon botsend is met die belange van die werkgewer. *Please note: This is a reduced version of the abstract. Please refer to PDF for full text.

  4. Contrasting Reasons for Discontinuation of Antiretroviral Therapy in Workplace and Public-Sector HIV Programs in South Africa

    OpenAIRE

    Dahab, Maysoon; Kielmann, Karina; Charalambous, Salome; Karstaedt, Alan S; Hamilton, Robin; La Grange, Lettie; Katherine L Fielding; Churchyard, Gavin J.; GRANT, Alison D

    2011-01-01

    We investigated reasons for clinical follow-up and treatment discontinuation among HIV-infected individuals receiving antiretroviral therapy (ART) in a public-sector clinic and in a workplace clinic in South Africa. Participants in a larger cohort study who had discontinued clinical care by the seventh month of treatment were traced using previously provided locator information. Those located were administered a semistructured questionnaire regarding reasons for discontinuing clinical follow-...

  5. Keeping health staff healthy: evaluation of a workplace initiative to reduce morbidity and mortality from HIV/AIDS in Malawi

    Directory of Open Access Journals (Sweden)

    Bemelmans Marielle

    2011-01-01

    Full Text Available Abstract Background In Malawi, the dramatic shortage of human resources for health is negatively impacted by HIV-related morbidity and mortality among health workers and their relatives. Many staff find it difficult to access HIV care through regular channels due to fear of stigma and discrimination. In 2006, two workplace initiatives were implemented in Thyolo District: a clinic at the district hospital dedicated to all district health staff and their first-degree relatives, providing medical services, including HIV care; and a support group for HIV-positive staff. Methods Using routine programme data, we evaluated the following outcomes up to the end of 2009: uptake and outcome of HIV testing and counselling among health staff and their dependents; uptake and outcomes of antiretroviral therapy (ART among health staff; and membership and activities of the support group. In addition, we included information from staff interviews and a job satisfaction survey to describe health workers' opinions of the initiatives. Results Almost two-thirds (91 of 144, 63% of health workers and their dependents undergoing HIV testing and counselling at the staff clinic tested HIV positive. Sixty-four health workers had accessed ART through the staff clinic, approximately the number of health workers estimated to be in need of ART. Of these, 60 had joined the support group. Cumulative ART outcomes were satisfactory, with more than 90% alive on treatment as of June 2009 (the end of the study observation period. The availability, confidentiality and quality of care in the staff clinic were considered adequate by beneficiaries. Conclusions Staff clinic and support group services successfully provided care and support to HIV-positive health workers. Similar initiatives should be considered in other settings with a high HIV prevalence.

  6. Anonymizing Unstructured Data

    CERN Document Server

    Motwani, Rajeev

    2008-01-01

    In this paper we consider the problem of anonymizing datasets in which each individual is associated with a set of items that constitute private information about the individual. Illustrative datasets include market-basket datasets and search engine query logs. We formalize the notion of k-anonymity for set-valued data as a variant of the k-anonymity model for traditional relational datasets. We define an optimization problem that arises from this definition of anonymity and provide a constant factor approximation algorithm for the same. We evaluate our algorithms on the America Online query log dataset.

  7. An Anonymity Revocation Technology for Anonymous Communication

    Science.gov (United States)

    Antoniou, Giannakis; Batten, Lynn; Parampalli, Udaya

    A number of privacy-enhancing technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who use PETs have been proposed. These are known as anonymity revocation technologies (ARTs). However, the construction of ARTs has been developed in an ad hoc manner without a theoretical basis outlining the goals and underlying principles. In this chapter we present a set of fundamental principles and requirements for construction of an ART, identifying the necessary features. We then propose an abstract scheme for construction of an ART based on these features.

  8. A decade of an HIV workplace programme in armed conflict zones; a social responsibility response of the International Committee of the Red Cross.

    Science.gov (United States)

    Du Mortier, Stéphane; Mukangu, Silas; Sagna, Charles; Nyffenegger, Laurent; Aebischer Perone, Sigiriya

    2016-01-01

    The International Committee of the Red Cross (ICRC) works in fragile States and in armed conflict zones. Some of them are affected by the HIV pandemic. Within the framework of its social responsibility programme concerning HIV affecting its staff members, the organization has implemented an HIV workplace programme since 2004. We carried out a retrospective analysis over 10 years. Data collected were initially essentially qualitative and process-oriented, but were complemented over the years by data on annual voluntary counselling and testing (VCT) uptake and on direct annual costs covering awareness, testing and antiretroviral therapy. The number of people covered by the programme grew from none in 2003 to 4,438 in 2015, with an increase in annual VCT uptake over the years increasing from 376 persons (14 %) in 2007 to 2,663 in 2015 (60 %). Over the years, the services were expanded from awareness raising to bringing VCT to the workplace, as well as offering testing and health coverage of other conditions and innovative approaches to facing challenges linked to situations of violence. Within its social responsibility framework, the ICRC has shown the importance and feasibility of a workplace HIV programme in conflict zones. A sustainable workplace programme in these conflict settings requires constant adaptation, with regular follow-up given the relatively high turnover of staff, and ensuring sustainable stocks of condoms and antiretroviral drugs. PMID:27247611

  9. A decade of an HIV workplace programme in armed conflict zones; a social responsibility response of the International Committee of the Red Cross.

    Science.gov (United States)

    Du Mortier, Stéphane; Mukangu, Silas; Sagna, Charles; Nyffenegger, Laurent; Aebischer Perone, Sigiriya

    2016-01-01

    The International Committee of the Red Cross (ICRC) works in fragile States and in armed conflict zones. Some of them are affected by the HIV pandemic. Within the framework of its social responsibility programme concerning HIV affecting its staff members, the organization has implemented an HIV workplace programme since 2004. We carried out a retrospective analysis over 10 years. Data collected were initially essentially qualitative and process-oriented, but were complemented over the years by data on annual voluntary counselling and testing (VCT) uptake and on direct annual costs covering awareness, testing and antiretroviral therapy. The number of people covered by the programme grew from none in 2003 to 4,438 in 2015, with an increase in annual VCT uptake over the years increasing from 376 persons (14 %) in 2007 to 2,663 in 2015 (60 %). Over the years, the services were expanded from awareness raising to bringing VCT to the workplace, as well as offering testing and health coverage of other conditions and innovative approaches to facing challenges linked to situations of violence. Within its social responsibility framework, the ICRC has shown the importance and feasibility of a workplace HIV programme in conflict zones. A sustainable workplace programme in these conflict settings requires constant adaptation, with regular follow-up given the relatively high turnover of staff, and ensuring sustainable stocks of condoms and antiretroviral drugs.

  10. Anonymization of Court Orders

    DEFF Research Database (Denmark)

    Povlsen, Claus; Jongejan, Bart; Hansen, Dorte Haltrup;

    We describe an anonymization tool that was commissioned by and specified together with Schultz, a publishing company specialized in Danish law related publications. Unavailability of training data and the need to guarantee compliance with pre-existing anonymization guidelines forced us to implement...

  11. Get Tested for HIV

    Science.gov (United States)

    ... Submit Home > HIV/AIDS > Get tested for HIV HIV/AIDS This information in Spanish ( en español ) Get tested for HIV When should I get tested for HIV? Types ... to top More information on Get tested for HIV Explore other publications and websites HIV Anonymous Testing, ...

  12. Anonymity in science.

    Science.gov (United States)

    Neuroskeptic

    2013-05-01

    The history of science is replete with important works that were originally published without the author's legal name being revealed. Most modern scientists will have worked anonymously in their capacity as peer reviewers. But why is anonymity so popular? And is it a valid approach? I argue that pseudonymity and anonymity, although not appropriate for all forms of scientific communication, have a vital role to play in academic discourse. They can facilitate the free expression of interpretations and ideas, and can help to ensure that suggestions and criticisms are evaluated dispassionately, regardless of their source. PMID:23570959

  13. Anonymous Mobile Payment Solution

    Directory of Open Access Journals (Sweden)

    Alhaj Ali Jalila

    2015-09-01

    Full Text Available The evolution and increasing popularity of mobile handheld devices has led to the development of payment applications. The global acceptance of mobile payments is hindered by security and privacy concerns. One of the main problems evoked is the anonymity related with banking transactions. In this paper I propose a new secured architecture for mobile banking. Anonymity and privacy protection are the measures to be enhanced in order to satisfy people’s current needs. The banking platform must provide the highest level of security for messages exchanged between bank and the customer.

  14. HIV Disease and Work: Effect on the Individual, Workplace, and Interpersonal Contexts.

    Science.gov (United States)

    Hoffman, Mary Ann

    1997-01-01

    A review of literature 1992-1996 examined effects of HIV on career development and employment; impact on employers, employees, and formal caregivers; and effects on employment of informal caregivers. Most studies defined work narrowly, used cross-sectional designs, and almost exclusively used gay men as respondents. (91 references) (SK)

  15. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  16. Anonymity in Large Societies

    OpenAIRE

    Andrei Gomberg; Cesar Martinelli; Ricard Torres

    2002-01-01

    In a social choice model with an infinite number of agents, there may occur "equal size" coalitions that a preference aggregation rule should treat in the same manner. We introduce an axiom of equal treatment with respect to a measure of coalition size and explore its interaction with common axioms of social choice. We show that, provided the measure space is sufficiently rich in coalitions of the same measure, the new axiom is the natural extension of the concept of anonymity, and in particu...

  17. HIV/AIDS Basics

    Science.gov (United States)

    ... Providers Prevention Resources Newsletter Get Tested Find an HIV testing site near you. Enter ZIP code or ... AIDS Get Email Updates on AAA Anonymous Feedback HIV/AIDS Media Infographics Syndicated Content Podcasts Slide Sets ...

  18. The psychological well-being of persons living with HIV/AIDS in the workplace / Joalane Mokhethi

    OpenAIRE

    Mokhethi, Thelma Joalane

    2006-01-01

    The history of HIV/AIDS dates back to 1985, when it was thought to be a disease affecting animals. Later, HIV/AIDS was regarded as an illness which affected gay individuals. However, research world-wide has shown that HIV/AIDS is a disease that affects everyone irrespective of race, gender, social status and sexual orientation. Research regarding the psychological well-being (coping, sense of coherence, locus of control and general health) of HIV infected persons in the workpla...

  19. HIV-Related Stigma and Discrimination in Small Enterprises: Employers’ and Employees’ Knowledge and Attitudes about HIV workplace Policy in Kabale, Uganda.

    OpenAIRE

    Twinomugisha, Benedict

    2010-01-01

    Background: In its third decade, the HIV/AIDS epidemic continues to affect many people’s lives in affected nations. In the world of work, the epidemic has brought about loss of productivity, increased labour costs, and loss of employment due to stigma and discrimination. Many people in the affected countries have lost their jobs due to their HIV positive status. HIV-related effects like stigma and discrimination lead to its denial. HIV-related stigma and discrimination present ...

  20. Anonymous Broadcast Messages

    Directory of Open Access Journals (Sweden)

    Dragan Lazic

    2013-01-01

    Full Text Available The Dining Cryptographer network (or DC-net is a privacy preserving communication protocol devised by David Chaum for anonymous message publication. A very attractive feature of DC-nets is the strength of its security, which is inherent in the protocol and is not dependent on other schemes, like encryption. Unfortunately the DC-net protocol has a level of complexity that causes it to suffer from exceptional communication overhead and implementation difficulty that precludes its use in many real-world use-cases. We have designed and created a DC-net implementation that uses a pure client-server model, which successfully avoids much of the complexity inherent in the DC-net protocol. We describe the theory of DC-nets and our pure client-server implementation, as well as the compromises that were made to reduce the protocol’s level of complexity. Discussion centers around the details of our implementation of DC-net.

  1. "That is why I stopped the ART": Patients' & providers' perspectives on barriers to and enablers of HIV treatment adherence in a South African workplace programme

    Directory of Open Access Journals (Sweden)

    Kielmann Karina

    2008-02-01

    Full Text Available Abstract Background As ART programmes in African settings expand beyond the pilot stages, adherence to treatment may become an increasing challenge. This qualitative study examines potential barriers to, and facilitators of, adherence to ART in a workplace programme in South Africa. Methods We conducted key informant interviews with 12 participants: six ART patients, five health service providers (HSPs and one human resources manager. Results The main reported barriers were denial of existence of HIV or of one's own positive status, use of traditional medicines, speaking a different language from the HSP, alcohol use, being away from home, perceived severity of side-effects, feeling better on treatment and long waiting times at the clinic. The key facilitators were social support, belief in the value of treatment, belief in the importance of one's own life to the survival of one's family, and the ability to fit ART into daily life schedules. Conclusion Given the reported uncertainty about the existence of HIV disease and the use of traditional medicines while on ART, despite a programme emphasising ART counselling, there is a need to find effective ways to support adherence to ART even if the individual does not accept biomedical concepts of HIV disease or decides to use traditional medicines. Additionally, providers should identify ways to minimize barriers in communication with patients with whom they have no common language. Finally, dissatisfaction with clinical services, due to long waiting times, should be addressed.

  2. Efficient Anonymizations with Enhanced Utility

    Directory of Open Access Journals (Sweden)

    Jacob Goldberger

    2010-08-01

    Full Text Available One of the most well studied models of privacy preservation is k-anonymity. Previous studies of k-anonymization used various utility measures that aim at enhancing the correlation between the original public data and the generalized public data. We, bearing in mind that a primary goal in releasing the anonymized database for datamining is to deducemethods of predicting the private data from the public data, propose a new information-theoretic measure that aims at enhancing the correlation between the generalized public data and the private data. Such a measure significantly enhances the utility of the released anonymized database for data mining. We then proceed to describe a new algorithm that is designed to achieve k-anonymity with high utility, independently of the underlying utility measure. That algorithm is based on a modified version of sequential clustering which is the method of choice in clustering. Experimental comparison with four well known algorithms of k-anonymity show that the sequential clustering algorithm is an efficient algorithm that achieves the best utility results. We also describe a modification of the algorithm that outputs k-anonymizations which respect the additional security measure of l-diversity.

  3. Narcotics Anonymous: Anonymity, admiration, and prestige in an egalitarian community

    OpenAIRE

    Snyder, Jeffrey K.; Fessler, Daniel M.T.

    2014-01-01

    Narcotics Anonymous (NA) supports long-term recovery for those addicted to drugs. Paralleling social dynamics in many small-scale societies, NA exhibits tension between egalitarianism and prestige-based hierarchy, a problem exacerbated by the addict’s personality as characterized by NA’s ethnopsychology.  We explore how NA’s central principle of anonymity normatively translates into egalitarianism among group members.  Turning to the lived reality of membership, building on Carr’s (2011) conc...

  4. The use of HIV testing in the workplace as the basis for possible unfair discrimination / Lerato Hycenth Thejane

    OpenAIRE

    Thejane, Lerato Hycenth

    2015-01-01

    Human immunodeficiency virus and acquired immune deficiency syndrome (hereafter HIV/AIDS) in South Africa are epidemic virus and disease respectively, item 1.1 of the EEA Code of Good Practice on Key Aspects of HIV/AIDS and Employment, 2000 states that HIV/AIDS are serious public health problems, which have socio-economic, employment and human rights implications on the society, employees inclusive. The Constitution of the Republic of South Africa, 1996, Employment Equity Act 55 of 1998, Labo...

  5. Workplace Violence

    Science.gov (United States)

    ... Possible Solutions It is recommended that management and employees work together to reduce workplace violence. Management Commitment: Provides the motivation and resources to deal effectively with workplace violence ...

  6. Association of knowledge of HIV and other factors with individuals' attitudes toward HIV infection: a national cross-sectional survey among the Japanese non-medical working population.

    Directory of Open Access Journals (Sweden)

    Guoqin Wang

    Full Text Available BACKGROUND: The stigma of and discrimination because of HIV has been described as the most important obstacle to prevention and treatment efforts. The purpose of this study was to investigate negative attitudes and prejudice toward HIV among the Japanese non-medical working population and to explore contributing factors. METHODS: An online anonymous nationwide survey involving approximately 3,000 individuals was conducted in Japan. Questions ranged from background information and HIV knowledge to individuals' attitudes towards HIV infection in the workplace. Descriptive statistics and logistic regression were applied for analysis. RESULTS: Thirty-three percent of participants feared transmission of HIV from infected colleagues, 34% tended to avoid contact with them and 40% had prejudiced opinions about HIV infection. Despite a relatively high level of knowledge of HIV/AIDS overall (11.9 ± 3.3 from 15 points, only 50% of individuals were aware of some issues. Greater knowledge was associated with less negative attitudes towards HIV infection (OR 0.39, 95% CI 0.31-0.48 for prejudiced opinion, high compared with low level of knowledge, whereas greater health consciousness was inversely related to attitude (OR 1.97, 95% CI 1.50-2.58 for prejudiced opinion, high compared with low health consciousness. CONCLUSION: Knowledge neutralizes peoples' negative attitudes towards HIV infection, whereas greater health consciousness may worsen them. Educational programs should balance knowledge with health consciousness to improve the efficacy of HIV interventions.

  7. Anonymity and Historical-Anonymity in Location-Based Services

    Science.gov (United States)

    Bettini, Claudio; Mascetti, Sergio; Wang, X. Sean; Freni, Dario; Jajodia, Sushil

    The problem of protecting user’s privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving “historical k- anonymity” in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.

  8. Anonymous online purchases with exhaustive operational security

    OpenAIRE

    Van Mieghem, Vincent; Pouwelse, Johan

    2015-01-01

    This paper describes the process of remaining anonymous online and its concurrent operational security that has to be performed. It focusses particularly on remaining anonymous while purchasing online goods, resulting in anonymously bought items. Different aspects of the operational security process as well as anonymously funding with cryptocurrencies are described. Eventually it is shown how to anonymously purchase items and services from the hidden web, as well as the delivery. It is shown ...

  9. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key k which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: { Introducing and formally dening...

  10. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key $k$ which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: - Introducing and formally...

  11. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  12. Movement Data Anonymity through Generalization

    Directory of Open Access Journals (Sweden)

    Anna Monreale

    2010-08-01

    Full Text Available Wireless networks and mobile devices, such as mobile phones and GPS receivers, sense and track the movements of people and vehicles, producing society-wide mobility databases. This is a challenging scenario for data analysis and mining. On the one hand, exciting opportunities arise out of discovering new knowledge about human mobile behavior, and thus fuel intelligent info-mobility applications. On other hand, new privacy concerns arise when mobility data are published. The risk is particularly high for GPS trajectories, which represent movement of a very high precision and spatio-temporal resolution: the de-identification of such trajectories (i.e., forgetting the ID of their associated owners is only a weak protection, as generally it is possible to re-identify a person by observing her routine movements. In this paper we propose a method for achieving true anonymity in a dataset of published trajectories, by defining a transformation of the original GPS trajectories based on spatial generalization and k-anonymity. The proposed method offers a formal data protection safeguard, quantified as a theoretical upper bound to the probability of re-identification. We conduct a thorough study on a real-life GPS trajectory dataset, and provide strong empirical evidence that the proposed anonymity techniques achieve the conflicting goals of data utility and data privacy. In practice, the achieved anonymity protection is much stronger than the theoretical worst case, while the quality of the cluster analysis on the trajectory data is preserved.

  13. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  14. Quantum communications with an anonymous receiver

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    A new protocol for the anonymous communication of quantum information is proposed. The anonymity of the receiver and the privacy of the quantum information are perfectly protected except with exponentially small probability in this protocol. Furthermore, this protocol uses single photons to construct anonymous entanglement instead of multipartite entangled states, and therefore it reduces quantum resources compared with the pioneering work.

  15. Workplace violence

    NARCIS (Netherlands)

    Bossche, S. van den

    2014-01-01

    Workplace violence refers to incidents where workers are abused, threatened or assaulted, either by people from within or outside their workplace. Workplace violence may have severe negative consequences for the workers affected, their co-workers and families; as well as for organisations and the so

  16. Workplace learning

    DEFF Research Database (Denmark)

    Warring, Niels

    2005-01-01

    In November 2004 the Research Consortium on workplace learning under Learning Lab Denmark arranged the international conference “Workplace Learning – from the learner’s perspective”. The conference’s aim was to bring together researchers from different countries and institutions to explore...... and discuss recent developments in our understanding of workplace and work-related learning. The conference had nearly 100 participants with 59 papers presented, and among these five have been selected for presentation is this Special Issue....

  17. Dentistry and HIV/AIDS related stigma

    Directory of Open Access Journals (Sweden)

    Jesus Eduardo Elizondo

    2015-01-01

    Full Text Available OBJECTIVE To analyze HIV/AIDS positive individual’s perception and attitudes regarding dental services.METHODS One hundred and thirty-four subjects (30.0% of women and 70.0% of men from Nuevo León, Mexico, took part in the study (2014. They filled out structured, analytical, self-administered, anonymous questionnaires. Besides the sociodemographic variables, the perception regarding public and private dental services and related professionals was evaluated, as well as the perceived stigma associated with HIV/AIDS, through a Likert-type scale. The statistical evaluation included a factorial and a non-hierarchical cluster analysis.RESULTS Social inequalities were found regarding the search for public and private dental professionals and services. Most subjects reported omitting their HIV serodiagnosis and agreed that dentists must be trained and qualified to treat patients with HIV/AIDS. The factorial analysis revealed two elements: experiences of stigma and discrimination in dental appointments and feelings of concern regarding the attitudes of professionals or their teams concerning patients’ HIV serodiagnosis. The cluster analysis identified three groups: users who have not experienced stigma or discrimination (85.0%; the ones who have not had those experiences, but feel somewhat concerned (12.7%; and the ones who underwent stigma and discrimination and feel concerned (2.3%.CONCLUSIONS We observed a low percentage of stigma and discrimination in dental appointments; however, most HIV/AIDS patients do not reveal their serodiagnosis to dentists out of fear of being rejected. Such fact implies a workplace hazard to dental professionals, but especially to the very own health of HIV/AIDS patients, as dentists will not be able to provide them a proper clinical and pharmaceutical treatment.

  18. Dentistry and HIV/AIDS related stigma

    Science.gov (United States)

    Elizondo, Jesus Eduardo; Treviño, Ana Cecilia; Violant, Deborah

    2015-01-01

    OBJECTIVE To analyze HIV/AIDS positive individual’s perception and attitudes regarding dental services. METHODS One hundred and thirty-four subjects (30.0% of women and 70.0% of men) from Nuevo León, Mexico, took part in the study (2014). They filled out structured, analytical, self-administered, anonymous questionnaires. Besides the sociodemographic variables, the perception regarding public and private dental services and related professionals was evaluated, as well as the perceived stigma associated with HIV/AIDS, through a Likert-type scale. The statistical evaluation included a factorial and a non-hierarchical cluster analysis. RESULTS Social inequalities were found regarding the search for public and private dental professionals and services. Most subjects reported omitting their HIV serodiagnosis and agreed that dentists must be trained and qualified to treat patients with HIV/AIDS. The factorial analysis revealed two elements: experiences of stigma and discrimination in dental appointments and feelings of concern regarding the attitudes of professionals or their teams concerning patients’ HIV serodiagnosis. The cluster analysis identified three groups: users who have not experienced stigma or discrimination (85.0%); the ones who have not had those experiences, but feel somewhat concerned (12.7%); and the ones who underwent stigma and discrimination and feel concerned (2.3%). CONCLUSIONS We observed a low percentage of stigma and discrimination in dental appointments; however, most HIV/AIDS patients do not reveal their serodiagnosis to dentists out of fear of being rejected. Such fact implies a workplace hazard to dental professionals, but especially to the very own health of HIV/AIDS patients, as dentists will not be able to provide them a proper clinical and pharmaceutical treatment. PMID:26538100

  19. Workplace Bullying

    Directory of Open Access Journals (Sweden)

    Devi Akella

    2016-02-01

    Full Text Available Previous research on workplace bullying has narrowed its subjective boundaries by drawing heavily from psychological and social-psychological perspectives. However, workplace bullying can also be understood as an endemic feature of capitalist employment relationship. Labor process theory with its core characteristics of power, control, and exploitation of labor can effectively open and allow further exploration of workplace bullying issues. This article aims to make a contribution by examining workplace bullying from the historical and political contexts of society to conceptualize it as a control tool to sustain the capitalist exploitative regime with empirical support from an ethnographic case study within the health care sector.

  20. Octopus: A Secure and Anonymous DHT Lookup

    CERN Document Server

    Wang, Qiyan

    2012-01-01

    Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup mechanism achieving both security and anonymity, heretofore an open problem. We present Octopus, a novel DHT lookup which provides strong guarantees for both security and anonymity. Octopus uses attacker identification mechanisms to discover and remove malicious nodes, severely limiting an adversary's ability to carry out active attacks, and splits lookup queries over separate anonymous paths and introduces dummy queries to achieve high levels of anonymity. We analyze the security of Octopus by developing an event-based simulator to show that the attacker discovery mechanisms can rapidly identify malicious nodes with low error rate. We calculate the anonymity of Octopus using probabilistic modeling and show that Octopus can achieve near-optimal anonymity. We evaluate ...

  1. Privacy-Preserving Updates to Anonymous Databases

    OpenAIRE

    Sivasubramanian, R.; K.P. KALIYAMURTHIE

    2013-01-01

    Suppose a medical facility connected with a research institution and the researchers can use themedical details of a patient without knowing the personal details. Thus the research data base used by theresearchers must be anonymized (Sanitized). We can consider another problem in the area of census.Individuals give the private information to a trusted party (Census Bureau) and the census bureau mustpublish anonymized or sanitized version of data. So anonymization is done for privacy. Our work...

  2. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  3. Anonymous Web Browsing and Hosting

    Directory of Open Access Journals (Sweden)

    MANOJ KUMAR

    2013-02-01

    Full Text Available In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that how we can choose safe web hosting solutions and what the main functions are which provides more security over server data. With the browser security network security is also important which can be implemented using cryptography solutions, VPN and by implementing firewalls on the network. Hackers always try to steal our identity and data, they track our activities using the network application software’s and do harmful activities. So in this paper we described that how we can monitor them from security purposes.

  4. Distributed anonymous discrete function computation

    CERN Document Server

    Hendrickx, Julien M; Tsitsiklis, John N

    2010-01-01

    We propose a model for deterministic distributed function computation by a network of identical and anonymous nodes. In this model, each node has bounded computation and storage capabilities that do not grow with the network size. Furthermore, each node only knows its neighbors, not the entire graph. Our goal is to characterize the class of functions that can be computed within this model. In our main result, we provide a necessary condition for computability which we show to be nearly sufficient, in the sense that every function that violates this condition can at least be approximated. The problem of computing suitably rounded averages in a distributed manner plays a central role in our development; we provide an algorithm that solves it in time that grows quadratically with the size of the network.

  5. Evaluation of Anonymized ONS Queries

    CERN Document Server

    Garcia-Alfaro, Joaquin; Kranakis, Evangelos

    2009-01-01

    Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications). This infrastructure relies on the use of the (1) Radio Frequency Identification (RFID) technology to tag objects in motion and (2) distributed services providing information about objects via the Internet. A lookup service, called the Object Name Service (ONS) and based on the use of the Domain Name System (DNS), can be publicly accessed by EPC applications looking for information associated with tagged objects. Privacy issues may affect corporate infrastructures based on EPC technologies if their lookup service is not properly protected. A possible solution to mitigate these issues is the use of online anonymity. We present an evaluation experiment that compares the of use of Tor (The second generation Onion Router) on a global ONS/DNS setup, with respect to benefits, limitations, and latency.

  6. Self-tallying quantum anonymous voting

    Science.gov (United States)

    Wang, Qingle; Yu, Chaohua; Gao, Fei; Qi, Haoyu; Wen, Qiaoyan

    2016-08-01

    Anonymous voting is a voting method of hiding the link between a vote and a voter, the context of which ranges from governmental elections to decision making in small groups like councils and companies. In this paper, we propose a quantum anonymous voting protocol assisted by two kinds of entangled quantum states. Particularly, we provide a mechanism of opening and permuting the ordered votes of all the voters in an anonymous manner; any party who is interested in the voting results can acquire a permutation copy and then obtains the voting result through a simple calculation. Unlike all previous quantum works on anonymous voting, our quantum anonymous protocol possesses the properties of privacy, self-tallying, nonreusability, verifiability, and fairness at the same time. In addition, we demonstrate that the entanglement of the quantum states used in our protocol makes an attack from an outside eavesdropper and inside dishonest voters impossible. We also generalize our protocol to execute the task of anonymous multiparty computation, such as anonymous broadcast and anonymous ranking.

  7. Anonymity in Classroom Voting and Debating

    Science.gov (United States)

    Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie

    2011-01-01

    The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…

  8. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterio

  9. Workplace violence: a study of Turkish workers.

    Science.gov (United States)

    Aytac, Serpil; Bozkurt, Veysel; Bayram, Nuran; Yildiz, Selver; Aytac, Mustafa; Akinci, Fusun Sokullu; Bilgel, Nazan

    2011-01-01

    This research was conducted to address the experience of workplace violence of Turkish workers from different sectors and to investigate the impact of the exposed violence on their psychological well-being. Data were collected anonymously with printed questionnaires from the volunteer participants and depended on self-reporting. The response rate was 79.0% (1708/2161). The prevalence of workplace violence was found to be 44.8%. The most common type was verbal violence together with mobbing (bullying). Victims of physical violence were mostly males, whereas females were found to be victims of verbal, psychological and sexual violence. Most cases did not result in legal action and the victims remained silent. Psychological well-being of exposed workers in terms of depression, anxiety and stress seemed to deteriorate. Workplace violence remains a silent epidemic in Turkey. Preventive measures against workplace violence and social support for violated workers do not exist. PMID:22152504

  10. Towards a Theory of Anonymous Networking

    CERN Document Server

    Ghaderi, J

    2009-01-01

    The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination nodes, and paths of information flow in the network. One way to achieve such an anonymity is to use mixers. Mixers are nodes that receive packets from multiple sources and change the timing of packets, by mixing packets at the output links, to prevent the eavesdropper from finding sources of outgoing packets. In this paper, we consider two simple but fundamental scenarios: double input-single output mixer and double input-double output mixer. For the first case, we use the information-theoretic definition of the anonymity, based on average entropy per packet, and find an optimal mixing strategy under a strict latency constraint. For the second case, perfect anonymity is considered, and a maximal throughput strategy with perfect anonymity is found that minimizes the average delay.

  11. A flexible approach to distributed data anonymization.

    Science.gov (United States)

    Kohlmayer, Florian; Prasser, Fabian; Eckert, Claudia; Kuhn, Klaus A

    2014-08-01

    Sensitive biomedical data is often collected from distributed sources, involving different information systems and different organizational units. Local autonomy and legal reasons lead to the need of privacy preserving integration concepts. In this article, we focus on anonymization, which plays an important role for the re-use of clinical data and for the sharing of research data. We present a flexible solution for anonymizing distributed data in the semi-honest model. Prior to the anonymization procedure, an encrypted global view of the dataset is constructed by means of a secure multi-party computing (SMC) protocol. This global representation can then be anonymized. Our approach is not limited to specific anonymization algorithms but provides pre- and postprocessing for a broad spectrum of algorithms and many privacy criteria. We present an extensive analytical and experimental evaluation and discuss which types of methods and criteria are supported. Our prototype demonstrates the approach by implementing k-anonymity, ℓ-diversity, t-closeness and δ-presence with a globally optimal de-identification method in horizontally and vertically distributed setups. The experiments show that our method provides highly competitive performance and offers a practical and flexible solution for anonymizing distributed biomedical datasets. PMID:24333850

  12. Preserving Communities in Anonymized Social Networks

    Directory of Open Access Journals (Sweden)

    Alina Campan

    2015-04-01

    Full Text Available Social media and social networks are embedded in our society to a point that could not have been imagined only ten years ago. Facebook, LinkedIn, and Twitter are already well known social networks that have a large audience in all age groups. The amount of data that those social sites gather from their users is continually increasing and this data is very valuable for marketing, research, and various other purposes. At the same time, this data usually contain a significant amount of sensitive information which should be protected against unauthorized disclosure. To protect the privacy of individuals, this data must be anonymized such that the risk of re-identification of specific individuals is very low. In this paper we study if anonymized social networks preserve existing communities from the original social networks. To perform this study, we introduce two approaches to measure the community preservation between the initial network and its anonymized version. In the first approach we simply count how many nodes from the original communities remained in the same community after the processes of anonymization and de-anonymization. In the second approach we consider the community preservation for each node individually. Specifically, for each node, we compare the original and final communities to which the node belongs. To anonymize social networks we use two models, namely, k-anonymity for social networks and k-degree anonymity. To determine communities in social networks we use an existing community detection algorithm based on modularity quality function. Our experiments on publically available datasets show that anonymized social networks satisfactorily preserve the community structure of their original networks.

  13. Providing Group Anonymity Using Wavelet Transform

    CERN Document Server

    Chertov, Oleg

    2010-01-01

    Providing public access to unprotected digital data can pose a threat of unwanted disclosing the restricted information. The problem of protecting such information can be divided into two main subclasses, namely, individual and group data anonymity. By group anonymity we define protecting important data patterns, distributions, and collective features which cannot be determined through analyzing individual records only. An effective and comparatively simple way of solving group anonymity problem is doubtlessly applying wavelet transform. It's easy-to-implement, powerful enough, and might produce acceptable results if used properly. In the paper, we present a novel method of using wavelet transform for providing group anonymity; it is gained through redistributing wavelet approximation values, along with simultaneous fixing data mean value and leaving wavelet details unchanged (or proportionally altering them). Moreover, we provide a comprehensive example to illustrate the method.

  14. Finding routes in anonymous sensor networks

    OpenAIRE

    Dutra, Renato C.; Barbosa, Valmir C

    2005-01-01

    We consider networks of anonymous sensors and address the problem of constructing routes for the delivery of information from a group of sensors in response to a query by a sink. In order to circumvent the restrictions imposed by anonymity, we rely on using the power level perceived by the sensors in the query from the sink. We introduce a simple distributed algorithm to achieve the building of routes to the sink and evaluate its performance by means of simulations.

  15. Security and Anonymity of Bitcoin Payments

    OpenAIRE

    Korošec, Peter

    2016-01-01

    This thesis presents the digital payment system Bitcoin. It describes the cryptography on which the system is based. Presented are the short history of the system and the principles of how it works. Highlighted are the state of anonymity that the system provides while making payments and the safety it guarantees while executing transactions. Within the context of anonymity, the state of masking the users identity within the payment system is described, together with warnings and mechanisms to...

  16. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis

    2015-01-01

    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  17. Anon-Pass: Practical Anonymous Subscriptions.

    Science.gov (United States)

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081

  18. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    LENUS (Irish Health Repository)

    Walsh, Anthony PH

    2011-04-20

    Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004\\/23\\/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004\\/23\\/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  19. Workplace Violence

    Science.gov (United States)

    ... and log all incidents and threats of workplace violence. s Provide prompt medical evaluation and treatment after the incident. s Report violent incidents to the local police promptly. s Inform victims of their legal right to prosecute perpetrators. s Discuss the circumstances of the ...

  20. How Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) Work: Cross-Disciplinary Perspectives

    OpenAIRE

    Krentzman, Amy R.; Robinson, Elizabeth A. R.; Moore, Barbara C.; Kelly, John F.; Laudet, Alexandre B.; White, William L.; Zemore, Sarah E.; Kurtz, Ernest; Strobbe, Stephen

    2010-01-01

    Evidence from multiple lines of research supports the effectiveness and practical importance of Alcoholics Anonymous and Narcotics Anonymous. Conference presenters discussed the relationship between 12-Step participation and abstinence among various populations, including adolescents, women, and urban drug users. Insight from the arts and humanities placed empirical findings in a holistic context.

  1. How Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) Work: Cross-Disciplinary Perspectives.

    Science.gov (United States)

    Krentzman, Amy R; Robinson, Elizabeth A R; Moore, Barbara C; Kelly, John F; Laudet, Alexandre B; White, William L; Zemore, Sarah E; Kurtz, Ernest; Strobbe, Stephen

    2010-12-01

    Evidence from multiple lines of research supports the effectiveness and practical importance of Alcoholics Anonymous and Narcotics Anonymous. Conference presenters discussed the relationship between 12-Step participation and abstinence among various populations, including adolescents, women, and urban drug users. Insight from the arts and humanities placed empirical findings in a holistic context. PMID:21785524

  2. Anonymous Fingerprinting with Robust QIM Watermarking Techniques

    Directory of Open Access Journals (Sweden)

    R. L. Lagendijk

    2007-12-01

    Full Text Available Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer's identity as a watermark into the content so that the merchant can retrieve the buyer's identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer's identity multiple times, it is essential for the fingerprinting scheme to be anonymous. Kuribayashi and Tanaka, 2005, proposed an anonymous fingerprinting scheme based on a homomorphic additive encryption scheme, which uses basic quantization index modulation (QIM for embedding. In order, for this scheme, to provide sufficient security to the merchant, the buyer must be unable to remove the fingerprint without significantly degrading the purchased digital content. Unfortunately, QIM watermarks can be removed by simple attacks like amplitude scaling. Furthermore, the embedding positions can be retrieved by a single buyer, allowing for a locally targeted attack. In this paper, we use robust watermarking techniques within the anonymous fingerprinting approach proposed by Kuribayashi and Tanaka. We show that the properties of an additive homomorphic cryptosystem allow for creating anonymous fingerprinting schemes based on distortion compensated QIM (DC-QIM and rational dither modulation (RDM, improving the robustness of the embedded fingerprints. We evaluate the performance of the proposed anonymous fingerprinting schemes under additive-noise and amplitude-scaling attacks.

  3. Secure Electronic Cash Scheme with Anonymity Revocation

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2016-01-01

    Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.

  4. Performance evaluation of various K- anonymity techniques

    Science.gov (United States)

    Maheshwarkar, Nidhi; Pathak, Kshitij; Chourey, Vivekanand

    2011-12-01

    Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked with the private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. This paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. This paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.

  5. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  6. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    OpenAIRE

    Wei Yang; Liusheng Huang; Fang Song

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of...

  7. Is it OK to be an Anonymous?

    Directory of Open Access Journals (Sweden)

    Philip Serracino-Inglott

    2013-12-01

    Full Text Available Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between formal norm enforcement practice and Internet natives’ experience of it. Anons are more like eco-warriors than terrorists. While their actions are contentious, their force is framed in a vision of common good that is not unreasonable. Engaging with online deviants is shown to be a productive way of identifying the weaknesses in concepts underpinning moral evaluation of Internet-enabled phenomena.

  8. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina;

    2013-01-01

    . While anonymity and confidentiality appear to be orthogonal properties, making anonymous communication confidential is more involved than one might expect, since the ciphertext might reveal which public key has been used to encrypt. To address this problem, public-key cryptosystems with enhanced...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...

  9. Anonymous Fingerprinting Based on Electronic Cash

    Institute of Scientific and Technical Information of China (English)

    CHENXiaofeng; ZHANGFangguo; WANGJilin; WANGYumin

    2003-01-01

    A new anonymous fingerprinting protocol based on the principle of electronic cash is proposed in this paper.Redistributing a data item is equal to doublespending electronic cash.Contrasting with the previous coin-based anonymous fingerprinting protocol,we use the real electronic cash to trace traitors instead of the "coins" which serve only as a cryptographic primitive and have no monetary value,so it is easily understood and the bank does not need key-distribution and registration to prepare the "coina".

  10. "That is why I stopped the ART": Patients' & providers' perspectives on barriers to and enablers of HIV treatment adherence in a South African workplace programme

    OpenAIRE

    Kielmann Karina; Fielding Katherine; Hamilton Robin; Charalambous Salome; Dahab Mison; Churchyard Gavin J; Grant Alison D

    2008-01-01

    Abstract Background As ART programmes in African settings expand beyond the pilot stages, adherence to treatment may become an increasing challenge. This qualitative study examines potential barriers to, and facilitators of, adherence to ART in a workplace programme in South Africa. Methods We conducted key informant interviews with 12 participants: six ART patients, five health service providers (HSPs) and one human resources manager. Results The main reported barriers were denial of existen...

  11. Automatic Control of Configuration of Web Anonymization

    Directory of Open Access Journals (Sweden)

    Tomas Sochor

    2013-01-01

    Full Text Available Anonymization of the Internet traffic usually hides details about the request originator from the target server. Such a disguise might be required in some situations, especially in the case of web browsing. Although the web traffic anonymization is not a part of the http specification, it could be achieved using a certain extra tool. Significant deceleration of anonymized traffic compared to normal traffic is inevitable but it can be controlled in some cases as this article suggests. The results presented here focus on measuring the parameters of such deceleration in terms of response time, transmission speed and latency and proposing the way how to control it. This study focuses on TOR primarily because recent studies have concluded that other tools (like I2P and JAP provide worse service. Sets of 14 file locations and 30 web pages have been formed and the latency, response time and transmission speed during the page or file download were measured repeatedly both with TOR active in various configurations and without TOR. The main result presented here comprises several ways how to improve the TOR anonymization efficiency and the proposal for its automatic control. In spite of the fact that efficiency still remains too low compared to normal web traffic for ordinary use, its automatic control could make TOR a useful tool in special cases.

  12. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  13. Anonymity control in electronic check systems

    Institute of Scientific and Technical Information of China (English)

    Ma Chunguang; Yang Yixian; Hu Zhengming

    2005-01-01

    Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single check is used to pay any price that is not more than the face value. The main problem in check systems is to design an efficient refund mechanism that makes refund checks undistinguished from initial checks during payment and deposit. The problem of anonymity control also called fairness is also an important issue in check systems. All check systems yet are unconditional anonymity that opens the door to misuse for crime such as laundering and blackmailing. In this paper, the notion of anonymity revocation is introduced to electronic check system for the first time, and a model of fair electronic check system is proposed. An efficient fair online electronic check system with reusable refund is presented. In the system, a passive trustee is employed to revoke the anonymity of un-honest users. Moreover, the system solves the reusability problem of refunds thanks to the RSA-based partially signature. The system is efficient and meets all basic security requirements.

  14. Probabilistic Adaptive Anonymous Authentication in Vehicular Networks

    Institute of Scientific and Technical Information of China (English)

    Yong Xi; Ke-Wei Sha; Wei-Song Shi; Loren Schwiebert; Tao Zhang

    2008-01-01

    Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on designing the media access and physical layer protocols.Privacy issues in vehicular systems have not been well addressed. We argue that privacy is a user-specific concept, and a good privacy protection mechanism should allow users to select the levels of privacy they wish to have. To address this requirement, we propose an adaptive anonymous authentication mechanism that can trade off the anonymity level with computational and communication overheads (resource usage). This mechanism, to our knowledge, is the first effort on adaptive anonymous authentication. The resources used by our protocol are few. A high traffic volume of 2000 vehicles per hour consumes about 60kbps bandwidth, which is less than one percent of the bandwidth of DSRC (Dedicated Short Range Communications). By using adaptive anonymity, the protocol response time can further be improved 2~4 times with lessthan 20% bandwidth overheads.

  15. MRSA and the Workplace

    Science.gov (United States)

    ... Products Programs Contact NIOSH NIOSH MRSA and the Workplace Recommend on Facebook Tweet Share Compartir Source: CDC ... livestock settings, and veterinary clinics. FAQs for the Workplace NOTE: This information is provided for general workplaces, ...

  16. Research on Anonymization and De-anonymization in the Bitcoin System

    OpenAIRE

    ShenTu, QingChun; Yu, JianPing

    2015-01-01

    The Bitcoin system is an anonymous, decentralized crypto-currency. There are some deanonymizating techniques to cluster Bitcoin addresses and to map them to users' identifications in the two research directions of Analysis of Transaction Chain (ATC) and Analysis of Bitcoin Protocol and Network (ABPN). Nowadays, there are also some anonymization methods such as coin-mixing and transaction remote release (TRR) to cover the relationship between Bitcoin address and the user. This paper studies an...

  17. Privacy, anonymity and subjectivity in genomic research.

    Science.gov (United States)

    McGonigle, Ian; Shomron, Noam

    2016-01-01

    The use of non-anonymized human genome data is becoming increasingly popular in research. Here we review the proceedings of a special meeting on this topic that took place at European Molecular Biology Organization (EMBO) in December 2014. The main points discussed centered on how to achieve 'anonymity,' 'trust,' and 'protection of data' in relation to new genomic technologies and research. Following our report of this meeting, we also raise three further issues for future consideration: the harmonization of international law in relation to genetic data protection; the complex issues around the 'dividual' nature of genetic data; and the growing commercial value of personal data. In conclusion, we stress the importance of scientists working in the area of genomic research engaging in interdisciplinary collaborations with humanities and social science scholars and addressing these complicated issues. PMID:26763729

  18. SSA-Caterpillar in Group Anonymity

    CERN Document Server

    Tavrov, Dan

    2011-01-01

    Nowadays, it is a common practice to protect various types of statistical data before publishing them for different researches. For instance, when conducting extensive demographic surveys such as national census, the collected data should be at least depersonalized to guarantee proper level of privacy preservation. In practice, even more complicated methods of data protection need to be used. All these methods can be generally divided into two classes. The first ones aim at providing individual data anonymity, whereas the other ones are focused on protecting information about a group of respondents. In this paper, we propose a novel technique of providing group anonymity in statistical data using singular spectrum analysis (SSA).Also, we apply SSA to defining hidden patterns in demographic data distribution.

  19. Privacy, anonymity and subjectivity in genomic research.

    Science.gov (United States)

    McGonigle, Ian; Shomron, Noam

    2016-01-01

    The use of non-anonymized human genome data is becoming increasingly popular in research. Here we review the proceedings of a special meeting on this topic that took place at European Molecular Biology Organization (EMBO) in December 2014. The main points discussed centered on how to achieve 'anonymity,' 'trust,' and 'protection of data' in relation to new genomic technologies and research. Following our report of this meeting, we also raise three further issues for future consideration: the harmonization of international law in relation to genetic data protection; the complex issues around the 'dividual' nature of genetic data; and the growing commercial value of personal data. In conclusion, we stress the importance of scientists working in the area of genomic research engaging in interdisciplinary collaborations with humanities and social science scholars and addressing these complicated issues.

  20. Yahtzee: An Anonymized Group Level Matching Procedure

    CERN Document Server

    Jones, Jason J; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam; Marlow, Cameron; Fowler, James H

    2011-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources in order to conduct their research. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects evermore important. However, strict privacy procedures can make joining diverse sources of data that contain information about specific individual behaviors difficult. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as expected theoretically when we apply it to data from Facebook and public voter records.

  1. Graph Based Local Recoding for Data Anonymization

    Directory of Open Access Journals (Sweden)

    K. Venkata Ramana

    2013-08-01

    Full Text Available Releasing person specific data could potentially reveal the sensitive information of an individual. kanonymityis an approach for protecting the individual privacy where the data is formed into set ofequivalence classes in which each class share the same values. Among several methods, local recodingbased generalization is an effective method to accomplish k-anonymization. In this paper, we proposed aminimum spanning tree partitioning based approach to achieve local recoding. We achieve it in twophases. During the first phase, MST is constructed using concept hierarchical and the distances amongdata points are considered as the weights of MST and in the next phase we generate the equivalence classesadhering to the anonymity requirement. Experiments show that our proposed local recoding frameworkproduces better quality in published tables than existing Mondrian global recoding and k-memberclustering approaches.

  2. An Internet Based Anonymous Electronic Cash System

    Directory of Open Access Journals (Sweden)

    Israt Jahan

    2015-04-01

    Full Text Available There is an increase activity in research to improve the current electronic payment system which is parallel with the progress of internet. Electronic cash system is a cryptographic payment system which offers anonymity during withdrawal and purchase. Electronic cash displays serial numbers which can be recorded to allow further tracing. Contrary to their physical counterparts, e-cash have an inherent limitation; they are easy to copy and reuse (double-spending. An observer is a tamper-resistant device, issued by the Internet bank, which is incorporated with the Internet user’s computer that prevents double-spending physically, i.e., the user has no access to her e-cash and therefore he cannot copy them. In this paper, we shall present an anonymous electronic cash scheme on the internet which incorporates tamper-resistant device with user-module.

  3. Anonymity And Accountability In Web Based Transactions

    Directory of Open Access Journals (Sweden)

    H.Jayasree

    2012-04-01

    Full Text Available Decreased privacy is an unavoidable consequence in the drive to make the world a more secure, safer place, according to some analysts. In the on-line world, the conflict between privacy and security manifests itself in a debate between anonymity and accountability. Balance between Anonymity and Accountability is a major concern in web based transactions. The protection of users’ privacy when performing web-based transactions is an important factor in the acceptance and use of Internet and web services. There is a tremendous improvement in the automation of the way we pay for goods and services by the variety and growth of electronic banking services available to the consumers. Hence there is a need for the ultimate structure of the new electronic transaction system that has a substantial impact on the personal privacy as well as on the nature and extent of criminal use of E- transactions. This paper presents an approach for such structure.

  4. Assurances of past donor anonymity are meaningless

    OpenAIRE

    Blyth, Eric

    2005-01-01

    The New Scientist recently recounted the story of an American teenager conceived through ostensibly anonymous donor insemination who had been able to identify his donor through DNA testing and an internet genetic database service (also see BioNews issue 333, at http://www.bionews.org.uk/new.lasso?storyid=2808). In fact, we have known since Barry Stevens' remarkable documentary, Offspring, released in 2001, that with some genetic background information, access to DNA testing and the intern...

  5. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  6. Anonymity, Efficiency Wages and Technological Progress

    OpenAIRE

    Broadberry, Stephen; Ghosal, Sayantan; Proto, Eugenio

    2015-01-01

    Although the Industrial Revolution is often characterized as the culmination of a process of commercialisation, the precise nature of such a link remains unclear. This paper models and analyzes such link: the role of commercialisation in raising efficiency wages as impersonal and anonymous labour market transactions replace personalized customary relations. In the presence of an aggregate capital externality, we show that the resulting shift in relative factor prices leads to higher capital-i...

  7. The BitTorrent Anonymity Marketplace

    CERN Document Server

    Nielson, Seth James

    2011-01-01

    The very nature of operations in peer-to-peer systems such as BitTorrent exposes information about participants to their peers. Nodes desiring anonymity, therefore, often chose to route their peer-to-peer traffic through anonymity relays, such as Tor. Unfortunately, these relays have little incentive for contribution and struggle to scale with the high loads that P2P traffic foists upon them. We propose a novel modification for BitTorrent that we call the BitTorrent Anonymity Marketplace. Peers in our system trade in k swarms obscuring the actual intent of the participants. But because peers can cross-trade torrents, the k-1 cover traffic can actually serve a useful purpose. This creates a system wherein a neighbor cannot determine if a node actually wants a given torrent, or if it is only using it as leverage to get the one it really wants. In this paper, we present our design, explore its operation in simulation, and analyze its effectiveness. We demonstrate that the upload and download characteristics of c...

  8. Universally composable anonymous Hash certification model

    Institute of Scientific and Technical Information of China (English)

    ZHANG Fan; MA JianFeng; SangJae MOON

    2007-01-01

    Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore,inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives.

  9. Disease severity, self-reported experience of workplace discrimination and employment loss during the course of chronic HIV disease: differences according to gender and education.

    OpenAIRE

    Dray-Spira, Rosemary; Gueguen, Alice; Lert, France; Study Group, Vespa

    2008-01-01

    International audience OBJECTIVES: Evidence for the existence of a harmful effect of chronic disease on employment status has been provided. Although this effect of chronic illness on employment has been reported to be higher among the groups with the lowest position on the labour market, the mechanisms of such inequalities are poorly understood. The present study aimed at investigating social inequalities in the chances of maintaining employment during the course of HIV infection and at e...

  10. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    Science.gov (United States)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  11. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    Science.gov (United States)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  12. Essential Safety Measures for Accident and Injury Reduction in the Workplace

    OpenAIRE

    Ulinfun, Charles

    2002-01-01

    One of the problems in organizations, especially in hospitals, is that injury rates are increasing because most safety programs lack the essential safety measures for accident reduction in the workplace. The study examined the safety measures that played a role in accident and injury reduction in the workplace. Specifically, the old and new safety programs of an anonymous company was investigated to identify the safety measures that distinguished both programs, their impact on injury rates,...

  13. Anonymity: an impediment to performance in healthcare.

    Science.gov (United States)

    Karlsberg, Daniel W; Pierce, Read G

    2014-01-01

    Many teaching hospitals employ a care team structure composed of a broad range of healthcare providers with different skill sets. Each member of this team has a distinct role and a different level of training ranging from attending physician to resident, intern, and medical student. Often times, these different roles lead to greater complexity and confusion for both patients and nursing staff. It has been demonstrated that patients have a great degree of difficulty in identifying members of their care team. This anonymity also exists between nursing staff and other care providers. In order to better understand the magnitude of anonymity within the teaching hospital, a ten-question survey was sent to nurses across three different departments. Results from this survey demonstrated that 71% of nurses are "Always" or "Often" able to identify which care team is responsible for their patients, while 79% of nurses reported that they either "Often" or "Sometimes" page a provider who is not currently caring for a given patient. Furthermore, 33% of nurses felt that they were either "Rarely" or "Never" able to recognize, by face and name, attending level providers. Residents were "Rarely" or "Never" recognized by face and name 37% of the time, and interns 42% of the time. Contacting the wrong provider repeatedly leads to de facto delays in medication, therapy, and diagnosis. Additionally, these unnecessary interruptions slow workflow for both nurses and members of the care team, making hospital care less efficient and safe overall. Technological systems should focus on reducing anonymity within the hospital in order to enhance healthcare delivery. PMID:25114570

  14. Anonymizing Binary Tables is APX-hard

    CERN Document Server

    Bonizzoni, Paola; Dondi, Riccardo

    2007-01-01

    The problem of publishing personal data without giving up privacy is increasingly important. An interesting formalization is the $k$-anonymization, where all rows in a table are clustered in sets of at least $k$ records, and all the entries for which records in the same cluster have different values are suppressed. The problem has been shown to be NP-hard when the records values are over a ternary alphabet and $k=3$. In this paper we show that the problem is not only NP-hard, but also APX-hard, when the records values are over a binary alphabet and $k=3$.

  15. Sociodemographic factors and prejudice toward HIV and hepatitis B/C status in a working-age population: results from a national, cross-sectional study in Japan.

    Directory of Open Access Journals (Sweden)

    Hisashi Eguchi

    Full Text Available BACKGROUND: In many countries, HIV, hepatitis B virus (HBV, and hepatitis C virus (HCV infected individuals may face discrimination and mistreatment from coworkers. Effective interventions to reduce workplace discrimination are therefore needed to protect these vulnerable populations. The current study investigated potential associations between sociodemographic factors and prejudice toward HIV and HBV/HCV infected colleagues within a Japanese working population. METHODS: An online anonymous, nationwide internet survey was administered to a cross-section of approximately 3,000 individuals in Japan. The survey comprised 14 questions focusing on demographics (five items, basic HIV or HBV/HCV knowledge (eight items, and potential prejudice toward HIV or HBV/HCV infected colleagues (one item. The sociodemographic characteristics evaluated were sex, age, educational level, employment status, and individual income; with multiple logistic regression used for the analysis. RESULTS: In total, 3,055 individuals were recruited for the HIV related survey and 3,129 for the HBV/HCV related survey. Older age was significantly and positively associated with prejudice toward HIV infected colleagues (p<0.01 and negatively associated with prejudice toward HBV/HCV infected colleagues (p<0.01. Statistically significant associations were not observed between other sociodemographic characteristics and potential prejudice toward HIV and HBV/HCV infected coworkers. CONCLUSION: Overall, this study suggests that age may be associated with prejudice toward HIV and HBV/HCV infected colleagues among the working age population of Japan. As such, policy makers should consider the age of participants when formulating efforts to reduce prejudice toward HIV and HBV/HCV infected workers.

  16. [Workplace mobbing].

    Science.gov (United States)

    Soljan, Ivana; Josipović-Jelić, Zeljka; Jelić Kis, I Anita

    2008-03-01

    Workplace mobbing is a hostile and unethical communication, systematically aimed from one or more individuals towards mostly one individual, who are forced into a helpless position and are held in it by constant bullying. This article describes some of the most important characteristics of mobbing: offensive behaviour, organizational and non-organizational causes of this behaviour, the victim and the consequences. Modern business environment is complex, dynamic, volatile, and requires better ability to adjust. Constant changes are a part of organizational reality, but they also produce an ideal environment for all kinds of conflicts. Conflicts are inevitable in every organization, but the task of its management is to identify them and resolve before they affect the workforce, productivity and costs. The idea is to avert psychological abuse and aberrant behaviour such as mobbing which that may cause physical and mental disorders. Mobbing is a problem of the modern society; as a violation of human rights it is relatively new and unrecognised in Croatia. Abuse is mostly psychological: it affects the victim's health and life, quality of work, productivity, profitability, and may lead to significant economic losses in the community. Mobbing can be averted by joint forces that would involve employee and management, medical and legal professionals, and even community as a whole. The more an organization pursues excellence based on trust and business ethics, the higher the probability that mobbing will be averted or stopped. PMID:18411493

  17. Yahtzee: an anonymized group level matching procedure.

    Directory of Open Access Journals (Sweden)

    Jason J Jones

    Full Text Available Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  18. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  19. Complete Bipartite Anonymity for Location Privacy

    Institute of Scientific and Technical Information of China (English)

    董恺; 顾涛; 陶先平; 吕建

    2014-01-01

    Users are vulnerable to privacy risks when providing their location information to location-based services (LBS). Existing work sacrifices the quality of LBS by degrading spatial and temporal accuracy for ensuring user privacy. In this paper, we propose a novel approach, Complete Bipartite Anonymity (CBA), aiming to achieve both user privacy and quality of service. The theoretical basis of CBA is that: if the bipartite graph of k nearby users’ paths can be transformed into a complete bipartite graph, then these users achieve k-anonymity since the set of “end points connecting to a specific start point in a graph”is an equivalence class. To achieve CBA, we design a Collaborative Path Confusion (CPC) protocol which enables nearby users to discover and authenticate each other without knowing their real identities or accurate locations, predict the encounter location using users’ moving pattern information, and generate fake traces obfuscating the real ones. We evaluate CBA using a real-world dataset, and compare its privacy performance with existing path confusion approach. The results show that CBA enhances location privacy by increasing the chance for a user confusing his/her path with others by 4 to 16 times in low user density areas. We also demonstrate that CBA is secure under the trace identification attack.

  20. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni;

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user.......g. redistribution of copy-righted contents, illegal drug trading and so on)....

  1. Promoting contraceptive use among unmarried female migrants in one factory in Shanghai: a pilot workplace intervention

    Directory of Open Access Journals (Sweden)

    Qian Xu

    2007-05-01

    Full Text Available Abstract Background In urban China, more single women are becoming pregnant and resorting to induced abortion, despite the wide availability of temporary methods of contraception. We developed and piloted a workplace-based intervention to promote contraceptive use in unmarried female migrants working in privately owned factories. Methods Quasi-experimental design. In consultation with clients, we developed a workplace based intervention to promote contraception use in unmarried female migrants in a privately owned factory. We then implemented this in one factory, using a controlled before-and-after design. The intervention included lectures, bespoke information leaflets, and support to the factory doctors in providing a contraceptive service. Results 598 women participated: most were under 25, migrants to the city, with high school education. Twenty percent were lost when staff were made redundant, and implementation was logistically complicated. All women attended the initial lecture, and just over half the second lecture. Most reported reading the educational material provided (73%, but very few women reported using the free family planning services offered at the factory clinic (5% or the Family Planning Institute (3%. At baseline, 90% (N = 539 stated that contraceptives were required if having sex before marriage; of those reporting sex in the last three months, the majority reporting using contraceptives (78%, 62/79 but condom use was low (44%, 35/79. Qualitative data showed that the reading material seemed to be popular and young women expressed a need for more specific reproductive health information, particularly on HIV/AIDS. Women wanted services with some privacy and anonymity, and views on the factory service were mixed. Conclusion Implementing a complex intervention with a hard to reach population through a factory in China, using a quasi-experimental design, is not easy. Further research should focus on the specific needs and

  2. Online Piracy, Anonymity and Social Change – Deviance Through Innovation

    OpenAIRE

    Larsson, Stefan; Svensson, Måns; Kaminski, Marcin

    2012-01-01

    This article analyses current trends in the use of anonymity services among younger Swedes (15-25) and focuses on individuals engaging in illegal file sharing in order to better understand the rationale behind both file sharing as well as online anonymity, especially in relation to enforcement of copyright. By comparing the findings of a survey conducted on three different occasions (early 2009, late 2009 and early 2012), we measure the fluctuations in the use of anonymity services among appr...

  3. Depression in the Workplace

    Science.gov (United States)

    ... Balance 5 Myths About Mental Illness Support an Employee Workplace Bullying & Violence Signs of a Healthy Workplace Complementary Medicine ... depression can be successfully treated. With early recognition, intervention, and support, most employees can overcome clinical depression and pick up where ...

  4. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...... model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...

  5. Critters in the cube farm: perceived psychological and organizational effects of pets in the workplace.

    Science.gov (United States)

    Wells, M; Perrine, R

    2001-01-01

    This article reports the findings of an exploratory study examining the perceived functions and psychological and organizational effects of pets in the workplace. Participants were 193 employees from 31 companies allowing pets in the workplace who completed anonymous questionnaires. Results indicated that participants perceived pets in the workplace to reduce stress and to positively affect employee health and the organization. Participants who brought their pets to work perceived greater benefits than participants who did not bring their pets to work and participants who did not own pets. PMID:11199259

  6. Classification via Clustering for Anonymization Data

    Directory of Open Access Journals (Sweden)

    Sridhar Mandapati

    2014-02-01

    Full Text Available Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data Mining (PPDM techniques aim at protecting the sensitive data and mining results. In this study, the different Clustering techniques via classification with and without anonymization data using mining tool WEKA is presented. The aim of this study is to investigate the performance of different clustering methods for the diabetic data set and to compare the efficiency of privacy preserving mining. The accuracy of classification via clustering is evaluated using K-means, Expectation-Maximization (EM and Density based clustering methods.

  7. Gregory Bateson, Alcoholics Anonymous, and stoicism.

    Science.gov (United States)

    Brundage, V

    1985-02-01

    In 1971 Gregory Bateson put forward an "entirely new epistemology," or view of the world, that he described as cybernetic. In a very influential article, which appeared in this journal, Bateson claimed that his cybernetic epistemology "coincides closely" with the epistemology of Alcoholics Anonymous (AA), for which he claimed "the only outstanding record of success" in the treatment of alcoholism (1971, p. 310). However, Bateson's discussion of AA dealt with only four of the Twelve Steps of AA's program. Although the epistemology of cybernetics and AA congrue in some respects, they contradict each other in many others. Common ground is found in the ancient philosophical tradition of Stoicism. In Stoicism the contradictions between the two are sources for an ethics and psychology of great power. Stoicism offers the cybernetic epistemologist a solid base for theory. It offers the clinician who deals with chemical dependency practical insights into the process of recovery.

  8. HIV-Related Discrimination in European Health Care Settings

    OpenAIRE

    Nöstlinger, Christiana; Rojas Castro, Daniela; Platteau, Tom; Dias, Sonia; Le Gall, Jean

    2014-01-01

    This cross-sectional European study assessed self-reported HIV-related discrimination and its associated factors in health care settings. Socio-demographics, health status, support needs relating to sexual and reproductive health (SRH), and self-reported HIV-related discrimination were measured using an anonymous survey in a sample of 1549 people living with HIV from 14 countries. Thirty-two per cent of the participants had experienced HIV-related discrimination during the previous 3 years; a...

  9. Drug injection and HIV prevalence in inmates of Glenochil prison.

    OpenAIRE

    Gore, S M; Bird, A G; Burns, S M; Goldberg, D J; Ross, A.J.; MacGregor, J

    1995-01-01

    OBJECTIVE--To determine prevalence of HIV infection and drug injecting behaviour among inmates of Glenochil Prison on a specified date a year after an outbreak of hepatitis B and HIV infection. DESIGN--Cross sectional: voluntary, anonymous HIV salivary antibody surveillance and linked self completion questionnaire on risk factors. SETTING--Glenochil prison, Scotland, a year after an outbreak of hepatitis B and HIV transmission related to drug injection. SUBJECTS--352 prisoners, of whom 295 (8...

  10. Comments on “Anonymous reviewers” [“Anonymous reviews: Self-serving, counterproductive, and unacceptable”

    Science.gov (United States)

    Robinove, Charles J.

    Mryl Beck's Forum article denouncing anonymous reviews (Eos, 1 July 2003) is right on the money. Perhaps he read my letter in Applied Physics in 1990 also denouncing anonymous reviews.Some years ago, I received an anonymous review of a paper I had submitted for journal publication. The reviewer raised such interesting questions that I wanted to discuss them with him. I phoned the editor of the journal and asked if he would tell me the name of the reviewer. He politely declined, but when I told him I thought I recognized the handwriting of the reviewer and named him, he relented and said I was correct! I called the reviewer and he was generous enough to spend a wonderful hour on the phone with me discussing the paper. The paper was published with great consideration given to his ideas, much to its betterment. Now that's a reviewer whose interest is in improving the paper and helping the author, not just showing how smart he is or slapping down a junior colleague. The AGU motto,“unselfish cooperation in research,” can be well exemplified by those who wish to help rather than to tear down.

  11. P-Sensitive K-Anonymity with Generalization Constraints

    Directory of Open Access Journals (Sweden)

    Alina Campan

    2010-08-01

    Full Text Available Numerous privacy models based on the k-anonymity property and extending the k-anonymity model have been introduced in the last few years in data privacy research: l-diversity, p-sensitive k-anonymity, (a, k anonymity, t-closeness, etc. While differing in their methods and quality of their results, they all focus first on masking the data, and then protecting the quality of the data as a whole. We consider a new approach, where requirements on the amount of distortion allowed on the initial data are imposed in order to preserve its usefulness. Our approach consists of specifying quasiidentifiers' generalization constraints, and achieving p-sensitive k-anonymity within the imposed constraints. We think that limiting the amount of allowed generalization when masking microdata is indispensable for real life datasets and applications. In this paper, the constrained p-sensitive k-anonymity model is introduced and an algorithm for generating constrained p-sensitive k-anonymous microdata is presented. Our experiments have shown that the proposed algorithm is comparable with existing algorithms used for generating p-sensitive k-anonymity with respect to the results' quality, and obviously the obtained masked microdata complies with the generalization constraints as indicated by the user.

  12. On the Utility of Anonymized Flow Traces for Anomaly Detection

    CERN Document Server

    Burkhart, Martin; May, Martin

    2008-01-01

    The sharing of network traces is an important prerequisite for the development and evaluation of efficient anomaly detection mechanisms. Unfortunately, privacy concerns and data protection laws prevent network operators from sharing these data. Anonymization is a promising solution in this context; however, it is unclear if the sanitization of data preserves the traffic characteristics or introduces artifacts that may falsify traffic analysis results. In this paper, we examine the utility of anonymized flow traces for anomaly detection. We quantitatively evaluate the impact of IP address anonymization, namely variations of permutation and truncation, on the detectability of large-scale anomalies. Specifically, we analyze three weeks of un-sampled and non-anonymized network traces from a medium-sized backbone network. We find that all anonymization techniques, except prefix-preserving permutation, degrade the utility of data for anomaly detection. We show that the degree of degradation depends to a large exten...

  13. Improving Security Architecture of Anonymous Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2012-01-01

    As users of networks increasingly aware of their privacy needs, the importance of anonymity is gaining popularity. The reason behind it is that anonymity can hide the actual identity of end users while allowing their to access services of network or web site. More over they are allowed to do so...... without being traced. This usage is prevailing in P2P systems and also payment based networks like e-cash. Achieving anonymity and being able to trace misbehaving users are the two conflicting requirements. This paper proposes a security architecture that is aimed at providing complete anonymity to honest...... users while tracing misbehaving users thus resolving the conflict between anonymity and traceability requirements. In addition to these, this paper also focuses on basic security requirements such as nonrepudiation, data integrity, confidentiality, and authentication. The empirical results revealed that...

  14. “We are Anonymous.” Anonymity in the Public Sphere – Challenges of Free and Open Communication

    Directory of Open Access Journals (Sweden)

    Saskia Sell

    2013-05-01

    Full Text Available Anonymity, the stealth mode of public communication, challenges different actors who deal with freedom of communication issues in their day to day life – be it professional journalists, information and communication scientists, technicians or political activists. This article aims to deliver theoretical background on the concept of anonymity on the macro-level, as well as to shed light on how different communicators deal with anonymity on the micro-level. Based on the example of the Anonymous movement, communicative actions are put in relation to media technological artifacts and their surrounding media environment with a focus on journalistic practice and public response to the phenomenon. The analysis concludes with the need for a preservation of options for anonymous public communication as a dimension of freedom of communication after carefully considering both the advantages and the potential risks connected to that mode of private-public communication.

  15. Global Trends in Workplace Learning

    Science.gov (United States)

    Lee, Lung-Sheng; Lai, Chun-Chin

    2012-01-01

    The paradigm of human resource development has shifted to workplace learning and performance. Workplace can be an organization, an office, a kitchen, a shop, a farm, a website, even a home. Workplace learning is a dynamic process to solve workplace problems through learning. An identification of global trends of workplace learning can help us to…

  16. Constructions for Anonymous Secret Sharing Schemes Using Combinatorial Designs

    Institute of Scientific and Technical Information of China (English)

    Ying-pu Deng; Li-feng Guo; Mu-lan Liu

    2007-01-01

    In an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In this paper some constructions of anonymous secret sharing schemes with 2 thresholds by using combinatorial designs are given. Let υ(t, ω, q) denote the minimum size of the set of shares of a perfect anonymous (t, ω) threshold secret sharing scheme with q secrets. In this paper we prove that υ(t, ω, q) = Θ(q) if t and ω are fixed and that the lower bound of the size of the set of shares in [4] is not optimal under certain condition.

  17. A NEW ANONYMITY CONTROLLED E-CASH SCHEME

    Institute of Scientific and Technical Information of China (English)

    Zhang Fangguo; Wang Changjie; Wang Yumin

    2002-01-01

    E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented.

  18. Researching workplace learning

    DEFF Research Database (Denmark)

    Jørgensen, Christian Helms; Warring, Niels

    2007-01-01

    's life history.Moreover we will explain the need to establish a 'double view' by examining learning in the workplace both as an objective and as a subjective reality. The article is mainly theoretical, but can also be of interest to practitioners who wish to understand learning in the workplace both......This article presents a theoretical and methodological framework for understanding and researching learning in the workplace. The workplace is viewed in a societal context and the learner is viewed as more than an employee in order to understand the learning process in relation to the learner...

  19. Workplace Discrimination, A Picture of Hope and Concern. Global Report.

    Science.gov (United States)

    World of Work, 2003

    2003-01-01

    An International Labour Organisation report finds that workplace discrimination is a persistent global problem. Although sex discrimination is most prevalent, discrimination in racial, HIV/AIDS, disability, religious, and age categories is rising. Progress is uneven, and inequalities within groups are widening. (SK)

  20. Financial situation of people living with HIV in Europe

    NARCIS (Netherlands)

    Schrooten, W; Dreezen, C; Borleffs, J; Dijkgraaf, M; Borchert, M; De Graeve, D; Hemmer, R; Fleerackers, Y; Colebunders, R

    2002-01-01

    The objective was to investigate the financial situation of people living with HIV in Europe. Two surveys using an anonymous questionnaire were organized in Europe among people living with HIV, the first in 1996-97 and the second in 1998-99. One thousand one hundred and sixty-one people from the 199

  1. Burnout and workplace deviance among flight attendants in Taiwan.

    Science.gov (United States)

    Liang, Su-Chiun; Hsieh, An-Tien

    2007-10-01

    The relationship between burnout and workplace deviance, identified as a component of job performance, was examined. Burnout was assessed with the Maslach Burnout Inventory which has three dimensions, Emotional Exhaustion, Depersonalization, and Reduced Personal Accomplishment. Workplace deviance was defined as voluntary behavior that violates significant organizational norms and threatens the well-being of an organization, its members, or both. This was assessed with the Workplace Deviance Scale, measuring the extent to which the participants had engaged in workplace deviant behavior such as taking property from work without permission, making fun of someone at work, or cursing at someone at work. Anonymous questionnaires with stamped envelopes were distributed to a sample of 1,470 Taiwanese flight attendants at the Arrival Hall of Taiwan Taoyuan International Airport. A response rate of 22.45% was obtained. After cases with missing data (n = 27) had been eliminated, the sample totaled 303, 17 men and 286 women. The average age was 28.7 yr. (SD = 4.6). Results of hierarchical regression showed that Depersonalization scores were significantly predictive of Workplace Deviance scores but not Emotional Exhaustion and Reduced Personal Accomplishment scores. Possible reasons and implications of these findings were discussed. PMID:18175485

  2. Design and analysis of two-layer anonymous communication system

    Institute of Scientific and Technical Information of China (English)

    WANG Wei-ping; WANG Jian-xin

    2007-01-01

    A new architecture for scalable anonymous communication system(SACS) was proposed. The users were divided into several subgroups managed by different sub-blenders, and all sub-blenders were managed by the main-blender using two layers management scheme. The identity information of members are distributed on different sub-blenders, which makes each member keep much less information and network overload greatly reduce. The anonymity and the overhead of the new scheme were analyzed and compared with that of Crowds, which shows the cost of storage and network overhead for the new scheme largely decreases while the anonymity is little degraded. The experiment results also show that the new system architecture is well scalable. The ratio of management cost of SACS to that of Crowds is about 1:25 while the value of P(I|H1+) only increases by 0.001-0.020, which shows that SACS keeps almost the same anonymity with Crowds.

  3. Anonymity and verifiability in multi-attribute reverse auction

    CERN Document Server

    Srinath, T R; Pais, Alwyn Roshan; 10.5121/ijitcs.2011.1401

    2011-01-01

    The use of e-Auction services has been increasing in recent years. Security requirements in conducting e-Auctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with asymmetric models in which the commercial entity of an auction issuer or registration manager is assumed in addition to the auctioneer. Multi-attribute reverse auctions promise higher market efficiency and effective information exchange. This work extends and uses the existing schemes. This scheme uses scoring function, winner determination in multi-attribute auctions to implement public verifiability. Anonymity is achieved through bidder side pseudonym generation. By results and analysis we say this is very simple and effective scheme. This scheme ensures public verifiability and anonymity in multi-attribute auctions w...

  4. Theoretical Results on De-Anonymization via Linkage Attacks

    Directory of Open Access Journals (Sweden)

    Martin M. Merener

    2012-08-01

    Full Text Available Consider a database D with records containing history of individuals' transactions, that has been de-identified, i.e., the variables that uniquely associate records with individuals have been removed from the data. An adversary de-anonymizes D via a linkage attack if using some auxiliary information about a certain individual in the database, it can determine which record of D corresponds to such individual. One example of this is given in the article Robust De-anonymization of Large Sparse Datasets, by Narayanan and Shmatikov [19], which shows that an anonymized database containing records with ratings of different movies rented by customers of Netflix, could in fact be de-anonymized using very little auxiliary information, even with errors. Besides the heuristic de-anonymization of the Netflix database, Narayanan and Shmatikov provide interesting theoretical results about database de-anonymization that an adversary can produce under general conditions. In this article we revisit these theoretical results, and work them further. Our first contribution is to exhibit different simple cases in which the algorithm Scoreboard, meant to produce the theoretical de-anonymization in [19], fails to do so. By requiring 1-sim to be a pseudo-metric, and that the algorithm producing the de-anonymization outputs a record with minimum support among the candidates, we obtain and prove deanonymization results similar to those described in [19]. We then consider a new hypothesis, motivated by the fact (observed in heuristic de-anonymizations that when the auxiliary information contains values corresponding to rare attributes, the de-anonymization achieved is stronger. We formalize this using the notion on long tail [4], and give new theorems expressing the level of de-anonymization in terms of the parameters of the tail of the database D. The improvement in the deanonymization is reflected in the fact that when at least one value in the auxiliary information

  5. An Anonymous Payment Protocol with Mobile Agents in Hostile Environments

    Institute of Scientific and Technical Information of China (English)

    LIU Yi; XIANG Ming-sen; WANG Yu-min

    2005-01-01

    By using Pedersen' s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous payment protocol which have following features:protecting the confidentiality of sensitive payment information from spying by malicious hosts; using a trusted third party in a minimal way; verifying the validity of the share by the merchant; allowing agent to verify that the product which it is about to receive is the one it is paying for; keeping the customer anonymous.

  6. On the Feasibility of (Practical Commercial Anonymous Cloud Storage

    Directory of Open Access Journals (Sweden)

    Tobias Pulls

    2015-08-01

    Full Text Available Current de facto standard payment and billing models for commercial cloud storage services provide a plethora of information to the cloud provider about its clients. This leads to a hostile environment when seen from a privacy perspective. Motivated by recently leaked facts about large scale governmental surveillance efforts as well as the lack of privacy-preserving measures in existing commercial cloud storage services, in this paper, we investigate the feasibility of so called anonymous cloud storage services which require user payment (which we call commercial anonymous cloud storage. Anonymity in this context can be seen as the absence of information to uniquely identify a provider's client that is storing and manipulating data at the provider while at the same time still allowing fair billing, for both, the clients and the cloud provider. Although encrypting data prior to outsourcing helps to protect data privacy and can be achieved without the cloud provider's consent, the issues we are interested in, do not seem to be achievable that easily. However, while various measures for the latter issue, i.e., realizing access privacy, have been studied in the past, the role of privacy in context of billing and payment for cloud storage has, until now, remained unexplored. We therefore introduce an abstract model for commercial cloud storage services to define various types of anonymous cloud storage, study several payment and billing models for cloud storage services and their impact on the anonymity of the service's clients. Moreover, we discuss several solutions to provide anonymity within the different models. Our findings highlight the importance of anonymous payment for the practical deployment of commercial privacy-friendly cloud storage services. Furthermore, we provide directions for future work in some settings, i.e., when anonymous payment is not available, as interesting open challenges.

  7. Mobile Anonymous Trust Based Routing Using Ant Colony Optimization

    OpenAIRE

    R. KALPANA; N. Rengarajan

    2012-01-01

    Problem statement: Ad hoc networks are susceptible to malicious attacks through denial of services, traffic analysis and spoofing. The security of the ad hoc routing protocol depends upon encryption, authentication, anonymity and trust factors. End-to-end security of data is provided by encryption and authentication, topology information of the nodes can be obtained by studying traffic and routing data. This security problem of ad hoc network is addressed by the use of anonymity mechanisms an...

  8. Anonymization of DICOM Electronic Medical Records for Radiation Therapy

    OpenAIRE

    Newhauser, Wayne; Jones, Timothy; Swerdloff, Stuart; Newhauser, Warren; Cilia, Mark; Carver, Robert (British painter, ca.1730-1791); Halloran, Andy; Zhang, Rui

    2014-01-01

    Electronic medical records (EMR) and treatment plans are used in research on patient outcomes and radiation effects. In many situations researchers must remove protected health information (PHI) from EMRs. The literature contains several studies describing the anonymization of generic Digital Imaging and Communication in Medicine (DICOM) files and DICOM image sets but no publications were found that discuss the anonymization of DICOM radiation therapy plans, a key component of an EMR in a can...

  9. Proactive Copyright: Workplace Compliance

    Science.gov (United States)

    Butler, Rebecca P.; Parker, Preston

    2009-01-01

    Oftentimes, copyright is addressed in the workplace only after a blatant infringement is discovered or a cease-and-desist letter is received. Then, too, some workplaces may feel that they are immune to copyright issues due to their educational nature; while private organizations, businesses, and industry may feel that the term "fair use" will…

  10. Intervention as Workplace Learning

    Science.gov (United States)

    Elkjaer, Bente; Nickelsen, Niels Christian Mossfeldt

    2016-01-01

    Purpose: The purpose of this paper is to illustrate how workplace interventions may benefit from a simultaneous focus on individuals' learning and knowledge and on the situatedness of workplaces in the wider world of changing professional knowledge regimes. This is illustrated by the demand for evidence-based practice in health care.…

  11. Towards a respondent-preferred ki-anonymity model

    Institute of Scientific and Technical Information of China (English)

    Kok-Seng WONG; Myung Ho KIM

    2015-01-01

    Recently, privacy concerns about data collection have received an increasing amount of attention. In data collection process, a data collector (an agency) assumed that all respondents would be comfortable with submitting their data if the published data was anonymous. We believe that this assumption is not realistic because the increase in privacy concerns causes some re-spondents to refuse participation or to submit inaccurate data to such agencies. If respondents submit inaccurate data, then the usefulness of the results from analysis of the collected data cannot be guaranteed. Furthermore, we note that the level of anonymity (i.e., k-anonymity) guaranteed by an agency cannot be verified by respondents since they generally do not have access to all of the data that is released. Therefore, we introduce the notion of ki-anonymity, where ki is the level of anonymity preferred by each respondent i. Instead of placing full trust in an agency, our solution increases respondent confidence by allowing each to decide the preferred level of protection. As such, our protocol ensures that respondents achieve their preferred ki-anonymity during data collection and guarantees that the collected records are genuine and useful for data analysis.

  12. Employment discrimination and HIV stigma: survey results from civil society organisations and people living with HIV in Africa.

    Science.gov (United States)

    Sprague, Laurel; Simon, Sara; Sprague, Courtenay

    2011-01-01

    The article presents findings from three surveys of people living with HIV (PLHIV) and civil society organisations about the experience of employment discrimination and stigma in the workplace. The work seeks to contribute to efforts by businesses and other organisations to effectively respond to the HIV epidemic within the world of work, and to deepen our understanding of the ways in which HIV stigma and employment discrimination persist in the workplace. The findings of global and regional surveys indicate the existence of high levels of employment discrimination based on HIV status worldwide, including forced disclosure of HIV status, exclusion in the workplace, refusals to hire or promote, and terminations of people known to be living with HIV. The survey findings show that employment discrimination based on HIV status is experienced in all African subregions. Country-level surveys conducted in Kenya and Zambia indicated that PLHIV face marked barriers to employment, including discrimination in hiring, loss of promotions, and termination because of HIV status. Additionally, large variances were found in the degree of support versus discrimination that employees living with HIV in those two countries received following their disclosure. The discussion emphasises the importance of the workplace as a site for intervention and behaviour change. To address this, we introduce a conceptual framework - the employment continuum - that maps multiple points of entry within the workplace to address HIV-related stigma and discrimination. Additional recommendations include: actions to ensure equal opportunity in hiring for PLHIV; ensuring that HIV testing is voluntary, never mandatory, and that disclosure is not necessary for employment; ensuring confidentiality of HIV status; communicating and enforcing HIV-related antidiscrimination policies; establishing support groups in the workplace; providing safe and confidential processes for resolving complaints of employment

  13. Employee Involvement in Australia: Workplace Transformation or the Disposable Workplace?

    OpenAIRE

    Robert Drago

    1994-01-01

    Theory suggests Employee Involvement (EI) programs will appear either where 'workplace transformation' occurs or where worker bargaining power is low and firms create a 'disposable workplace.' This study explores a sample of Australian workplaces and finds disposable workplace settings have a low probability of EI, but are so common that they account for most EI programs. Workplace transformation settings, while rare, are more likely to exhibit EI. Tentative data suggest EI is more successful...

  14. Does anonymity increase the reporting of mental health symptoms?

    Directory of Open Access Journals (Sweden)

    Fear Nicola T

    2012-09-01

    Full Text Available Abstract Background There is no doubt that the perceived stigma of having a mental disorder acts as a barrier to help seeking. It is possible that personnel may be reluctant to admit to symptoms suggestive of poor mental health when such data can be linked to them, even if their personal details are only used to help them access further care. This may be particularly relevant because individuals who have a mental health problem are more likely to experience barriers to care and hold stigmatizing beliefs. If that is the case, then mental health screening programmers may not be effective in detecting those most in need of care. We aimed to compare mental health symptom reporting when using an anonymous versus identifiable questionnaire among UK military personnel on deployment in Iraq. Methods Survey among UK military personnel using two questionnaires, one was anonymous (n = 315 and one collected contact details (i.e. identifiable, n = 296. Distribution was by alternate allocation. Data were collected in Iraq during January-February 2009. Results No significant difference in the reporting of symptoms of common mental disorders was found (18.1% of identifiable vs. 22.9% of anonymous participants. UK military personnel were more likely to report sub-threshold and probable PTSD when completing questionnaires anonymously (sub-threshold PTSD: 2.4% of identifiable vs. 5.8% of anonymous participants; probable PTSD: 1.7% of identifiable vs. 4.8% of anonymous participants. Of the 11 barriers to care and perceived social stigma statements considered, those completing the anonymous questionnaire compared to those completing the identifiable questionnaire were more likely to endorse three statements: “leaders discourage the use of mental health services” (9.3% vs. 4.6%, “it would be too embarrassing” (41.6% vs. 32.5% and “I would be seen as weak” (46.6% vs. 34.2%. Conclusions We found a significant effect on the reporting of sub

  15. Sexual harassment in the workplace

    OpenAIRE

    Hersch, Joni

    2015-01-01

    Workplace sexual harassment is internationally condemned as sex discrimination and a violation of human rights, and more than 75 countries have enacted legislation prohibiting it. Sexual harassment in the workplace increases absenteeism and turnover and lowers workplace productivity and job satisfaction. Yet it remains pervasive and underreported, and neither legislation nor market incentives have been able to eliminate it. Strong workplace policies prohibiting sexual harassment, workplace tr...

  16. Restricted common data in anonymous E-cash system

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiang-jun; CHEN Ke-fei

    2006-01-01

    Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don't break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems.

  17. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  18. Workplace Concentration of Immigrants

    OpenAIRE

    Monica I. Garcia-Perez; Fredrik Andersson; John Haltiwanger; Fredrik Kristin McCue; Seth Sanders

    2014-01-01

    To what extent do immigrants and the native-born work in separate workplaces? Do worker and firm characteristics explain the degree of workplace concentration? We explore these questions using a matched employer-employee database that extensively covers employers in selected MSAs. We find that immigrants are much more likely to have immigrant coworkers than are natives, and are particularly likely to work with their compatriots. We find much higher levels of concentration for small businesses...

  19. Anonymous pastoral care for problems pertaining to sexuality.

    Science.gov (United States)

    van Drie, A; Ganzevoort, R R; Spiering, M

    2014-12-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria on the other. We analyzed helpseeking questions of two protestant Christian organizations in the Netherlands providing anonymous pastoral care: Refoweb and EO-Nazorg. Sexual themes were addressed in 19 and 2.3 % of the submitted questions, respectively. Of the helpseekers, 56 % is female, 15 % male, and 29 % unknown. Questions and problems for which people seek anonymous pastoral care focus primarily on premarital abstinence, gender roles, contraception, sexual orientation and masturbation. The authority of the Bible seems to be important for questioners, especially when dealing with ethical questions. Different relations between the normativity of the church tradition and sexual and spiritual health are discussed. PMID:23784431

  20. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  1. Anonymous Authorship Control for User-Generated Content

    Directory of Open Access Journals (Sweden)

    Suk-Bong LEE

    2007-12-01

    Full Text Available User-Generated Content (UGC is opening up new large market in content services, and more and more people are visiting web sites to share and enjoy UGCs. These trends make many authors to move into online. Authors want to conserve their authorship and expect to publish their UGC anonymously in cases. To meet the requirements, we propose a new authorship control model based on watermarking and metadata. Authors can embed their authorship into their UGC with identities or with anonym. Even though an author publishes his UGC anonymously, he can prove his authorship without unveiling his identity via 5 methods utilizing the proposed authorship model. The proposed model and methods need no TTP and are robust even based on fragile underlying watermarking scheme.

  2. An Effective Clustering Approach to Web Query Log Anonymization

    CERN Document Server

    Fard, Amin Milani

    2010-01-01

    Web query log data contain information useful to research; however, release of such data can re-identify the search engine users issuing the queries. These privacy concerns go far beyond removing explicitly identifying information such as name and address, since non-identifying personal data can be combined with publicly available information to pinpoint to an individual. In this work we model web query logs as unstructured transaction data and present a novel transaction anonymization technique based on clustering and generalization techniques to achieve the k-anonymity privacy. We conduct extensive experiments on the AOL query log data. Our results show that this method results in a higher data utility compared to the state of-the-art transaction anonymization methods.

  3. Applying l-Diversity in anonymizing collaborative social network

    CERN Document Server

    Prasad, Ajay; Mitra, A; Singh, Arjun; Gour, Deepak

    2010-01-01

    To date publish of a giant social network jointly from different parties is an easier collaborative approach. Agencies and researchers who collect such social network data often have a compelling interest in allowing others to analyze the data. In many cases the data describes relationships that are private and sharing the data in full can result in unacceptable disclosures. Thus, preserving privacy without revealing sensitive information in the social network is a serious concern. Recent developments for preserving privacy using anonymization techniques are focused on relational data only. Preserving privacy in social networks against neighborhood attacks is an initiation which uses the definition of privacy called k-anonymity. k-anonymous social network still may leak privacy under the cases of homogeneity and background knowledge attacks. To overcome, we find a place to use a new practical and efficient definition of privacy called ldiversity. In this paper, we take a step further on preserving privacy in ...

  4. Application of Steganography for Anonymity through the Internet

    CERN Document Server

    Bahi, Jacques M; Friot, Nicolas; Guyeux, Christophe

    2012-01-01

    In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve this goal, we propose an information hiding scheme being stego-secure, which is the highest level of security in a well defined and studied category of attacks called "watermark-only attack". This category of attacks is the best context to study steganography-based anonymity through the Internet. The steganalysis of our steganographic process is also studied in order to show it security in a real test framework.

  5. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  6. On the Definitions of Anonymity for Ring Signatures

    Science.gov (United States)

    Ohkubo, Miyako; Abe, Masayuki

    This paper studies the relations among several definitions of anonymity for ring signature schemes in the same attack environment. It is shown that one intuitive and two technical definitions we consider are asymptotically equivalent, and the indistinguishability-based technical definition is the strongest, i. e., the most secure when achieved, when the exact reduction cost is taken into account. We then extend our result to the threshold case where a subset of members cooperate to create a signature. The threshold setting makes the notion of anonymity more complex and yields a greater variety of definitions. We explore several notions and observe certain relation does not seem hold unlike the simple single-signer case. Nevertheless, we see that an indistinguishability-based definition is the most favorable in the threshold case. We also study the notion of linkability and present a simple scheme that achieves both anonymity and linkability.

  7. Completely anonymous multi-recipient signcryption scheme with public verification.

    Directory of Open Access Journals (Sweden)

    Liaojun Pang

    Full Text Available Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant.

  8. A Study Analyzing the Association between Post-Traumatic Embitterment Disorder and Workplace Bullying

    OpenAIRE

    KARATUNA, Işıl; GÖK, Sibel

    2014-01-01

    The aim of this study was to investigate the association between perceived victimization from workplace bullying and self-reported embitterment reactions. Data were obtained through anonymous questionnaires from 397 participants working in the public sector. Among the participants, 23.9% were labeled as victims of bullying. Significant differences were observed in the mean scores of posttraumatic embitterment disorder between victims and nonvictims and experiencing bullying was found to be...

  9. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  10. Anonymous authentication protocol for multi-services in wireless environments

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.

  11. Workplace in fluency management: factoring the workplace into fluency management.

    Science.gov (United States)

    Cassar, M C; Neilson, M D

    1997-01-01

    This article addresses competency-based standards and guidelines for the involvement of speech-language pathologists in the workplace of clients who stutter. It advocates broadening customary practices in stuttering treatment and suggests that speech-language pathologists should extend their scope of service delivery to the workplace. It presents a sequence for the collaborative involvement of the employer and other workplace members and proposes strategies for evaluating workplace based fluency programs. Issues of fluency management, transfer, maintenance, and efficacy are discussed in the workplace context. Also addressed is workplace communication as well as such factors as stereotypes, discrimination, and resistance to change which may impinge on workplace intervention. It is argued that structured intervention, transfer, and generalization within a collaborative workplace framework facilitates best practice for the fluency clinician and more appropriate outcomes for the diversity of clients who stutter. PMID:9434336

  12. ANONYMOUS OFF-LINE ELECTRONIC PAYMENT SYSTEM WITH MULTIPLE BANKS

    Institute of Scientific and Technical Information of China (English)

    Liang Jian; Ao Qingyun; Chen Ying

    2001-01-01

    This letter presents an anonymous off-line electronic payment model with multiple issuing-banks and gives an implementation scheme based on the discrete logarithm problem and the random oracle model. Comparing with previous works, the proposed scheme benefits from no involvement of customer group authority and its security depends on the known difficulty of resolving general discrete logarithm problem.

  13. "Un-Googling” publications: The ethics and problems of anonymization

    DEFF Research Database (Denmark)

    Shklovski, Irina; Vertesi, Janet

    2013-01-01

    to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...

  14. Father-Daughter Incest: Data from an Anonymous Computerized Survey

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel V. S.; Kommor, Martin J.

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were…

  15. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    A. van Drie; R.R. Ganzevoort; M. Spiering

    2013-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria o

  16. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually cue

  17. Role Engagement and Anonymity in Synchronous Online Role Play

    Directory of Open Access Journals (Sweden)

    Sarah Cornelius

    2011-06-01

    Full Text Available Role play activities provide opportunities for learners to adopt unfamiliar roles, engage in interactions with others, and get involved in realistic tasks. They are often recommended to foster the development of soft skills and a wider perspective of the world. Such activities are widely used as an online teaching approach, with examples ranging from the simple use of email to the employment of virtual worlds and Web 2.0 technologies.This paper provides a case study of a role play activity which employs real-time anonymous discussion forums and aims to improve our understanding of effective role play and the impact of anonymity. This role play has been effective in educating learners about different perspectives on the issue of Quality in Further Education. The context and implementation of the role play are outlined, and the learners’ interactions and experiences are explored using an investigative analysis of discussion transcripts and semi-structured interviews with participants. The findings suggest that role engagement and anonymity are important components for success in synchronous online role play. Evidence is presented that provides an insight into the factors which encourage role engagement, including prior experiences and contributions from peers. The impact of anonymity is also explored since many participants did not regard the study environment as real and attempted to identify their peers.

  18. A Generic Framework for Anonymous Authentication in Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Jing Xu; Wen-Tao Zhu

    2013-01-01

    Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication,processing and storage capabilities.In this paper,we present a generic construction that converts any existing secure password authentication scheme based on a smart card into an anonymous authentication scheme for roaming services.The security proof of our construction can be derived from the underlying password authentication scheme employing the same assumptions.Compared with the original password authentication scheme,the transformed scheme does not sacrifice the authentication efficiency,and additionally,an agreed session key can be securely established between an anonymous mobile user and the foreign agent in charge of the network being visited.Furthermore,we present an instantiation of the proposed generic construction.The performance analysis shows that compared with other related anonymous authentication schemes,our instantiation is more efficient.

  19. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  20. Effects of Help, Anonymity, and Privacy on Children's Academic Expectations.

    Science.gov (United States)

    Bird, Lisa

    This study examined the effect of three aspects of the testing context--physical privacy, anonymity, and offers of help from a tester--on children's expectations. Performance of 96 11-year-old boys and girls on a pictorial recall memory task in a simulated test was evaluated. The subjects were divided into eight different groups varying on the…

  1. Online Role-Play: Anonymity, Engagement and Risk.

    Science.gov (United States)

    Bell, Maureen

    2001-01-01

    Discussion of role-play focuses on a case study of an asynchronous, anonymous online role-play at an Australian university within a WebCT bulletin board that was designed as an alternative to an existing face-to-face workshop to offer more flexible access for participants. Suggests further research needs. (Author/LRW)

  2. Anonymity versus Perceived Patron Identity in Virtual Reference Transcripts

    Science.gov (United States)

    Roper, Kristin Grabarek; Sobel, Karen

    2012-01-01

    Librarians who provide virtual reference services often perceive that their patrons self-identify to some degree, even when transactions are anonymous. They also develop a sense of patrons' greatest research-related needs over time. In this article, two librarians analyze two years' worth of virtual reference transcripts to determine what patrons…

  3. Anonymously Productive and Socially Engaged While Learning at Work

    Science.gov (United States)

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  4. Workplace Safety: Indoor Environmental Quality

    Science.gov (United States)

    ... message, please visit this page: About CDC.gov . Workplace Safety & Health Topics Indoor Environmental Quality Health Hazard ... Pinterest Twitter YouTube NIOSH Homepage NIOSH A-Z Workplace Safety & Health Topics Publications and Products Programs Contact ...

  5. HIV Transmission

    Science.gov (United States)

    ... Abroad Treatment Basic Statistics Get Tested Find an HIV testing site near you. Enter ZIP code or city Follow HIV/AIDS CDC HIV CDC HIV/AIDS See RSS | ... on HIV Syndicated Content Website Feedback HIV/AIDS HIV Transmission Language: English Español (Spanish) Recommend on Facebook ...

  6. The workplace window view

    DEFF Research Database (Denmark)

    Lottrup, Lene Birgitte Poulsen; Stigsdotter, Ulrika K.; Meilby, Henrik;

    2015-01-01

    Office workers’ job satisfaction and ability to work are two important factors for the viability and competitiveness of most companies, and existing studies in contexts other than workplaces show relationships between a view of natural elements and, for example, student performance...... and neighbourhood satisfaction. This study investigates whether relationships between window view, and work ability and job satisfaction also exist in the context of the workplace by focusing on office workers’ view satisfaction. The results showed that a view of natural elements was related to high view...... satisfaction, and that high view satisfaction was related to high work ability and high job satisfaction. Furthermore, the results indicated that job satisfaction mediated the effect of view satisfaction on work ability. These findings show that a view of a green outdoor environment at the workplace can...

  7. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  8. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace. PMID:24724731

  9. Cyclical Fluctuations in Workplace Accidents

    OpenAIRE

    Boone, J.; van Ours, J.C.

    2002-01-01

    This Paper presents a theory and an empirical investigation on cyclical fluctuations in workplace accidents. The theory is based on the idea that reporting an accident dents the reputation of a worker and raises the probability that he is fired. Therefore a country with a high or an increasing unemployment rate has a low (reported) workplace accident rate. The empirical investigation concerns workplace accidents in OECD countries. The analysis confirms that workplace accident rates are invers...

  10. Symptomatic primary HIV infection in a 49-year-old man who has sex with men: Beware of the window phase

    NARCIS (Netherlands)

    H.E. van Oosten; M. Damen; H.J.C. de Vries

    2009-01-01

    A 49-year-old man with a history of receptive unprotected anal intercourse with multiple anonymous men presented with a symptomatic primary HIV infection. Upon his initial visit the rapid HIV antibody screening test was negative but a p24 antigen test suggested a highly infectious phase in the HIV i

  11. Teacher learning as workplace learning

    NARCIS (Netherlands)

    Imants, J.; Van Veen, K.

    2010-01-01

    Against the background of increasing attention in teacher professional development programs for situating teacher learning in the workplace, an overview is given of what is known in general and in educational workplace learning literature on the characteristics and conditions of the workplace. Altho

  12. HIV Risk and Protection among Gay Male Couples: The Role of Gay Community Integration

    Science.gov (United States)

    Fergus, Stevenson; Lewis, Megan A.; Darbes, Lynae A.; Butterfield, Rita M.

    2005-01-01

    This study examined the association between different types of integration in the gay community and HIV risk among gay male couples. Previous research linking gay community integration and involvement among couples to HIV risk has been equivocal. Each partner in 59 gay couples completed a separate anonymous questionnaire that assessed two types of…

  13. Education and Nutritional Status of Orphans and Children of HIV-Infected Parents in Kenya

    Science.gov (United States)

    Mishra, Vinod; Arnold, Fred; Otieno, Fredrick; Cross, Anne; Hong, Rathavuth

    2007-01-01

    We examined whether orphaned and fostered children and children of HIV-infected parents are disadvantaged in schooling, nutrition, and health care. We analyzed data on 2,756 children aged 0-4 years and 4,172 children aged 6-14 years included in the 2003 Kenya Demographic and Health Survey, with linked anonymous HIV testing, using multivariate…

  14. COPEWORK - COPESTRESS Workplace Study

    DEFF Research Database (Denmark)

    Ladegaard, Yun Katrine; Netterstrøm, Bo; Langer, Roy

    2012-01-01

    "COPEWORK – COPESTRESS Workplace Study" er en undersøgelse af hvad der sker på arbejdspladser, når en medarbejder sygemeldes med stress. I undersøgelsen indgik 64 ledere og arbejdsmiljørepræsentanter fra fra 38 danske arbejdspladser. Alle arbejdspladser havde haft minimum én stresssygemeldt medar...

  15. Workplace Safety and Women

    Centers for Disease Control (CDC) Podcasts

    2009-05-11

    This women's health podcast focuses on four important issues for women at work: job stress, work schedules, reproductive health, and workplace violence.  Created: 5/11/2009 by Office of Women's Health (OWH) and National Institute for Occupational Safety and Health (NIOSH).   Date Released: 5/11/2009.

  16. Workplace Diversity Issues.

    Science.gov (United States)

    1999

    This document contains three symposium papers on workplace diversity issues. "Expanding Theories of Career Development: Adding the Voices of African American Women in the White Academy" (Mary V. Alfred) questions the validity of existing career development models for women and minority groups and examines the professional development of five…

  17. Multilingualism in European Workplaces

    Science.gov (United States)

    Gunnarsson, Britt-Louise

    2014-01-01

    This state-of-the-art article includes a review of past and recent studies on multilingualism at work in European environments. One aim is to provide the reader with a cross-cultural picture of workplace studies on various languages in Europe, another to discuss both positive and problem-based accounts of multilingualism at work. The overview…

  18. Making the Workplace Work

    Centers for Disease Control (CDC) Podcasts

    2007-11-01

    This podcast demonstrates the importance of workplace support in managing diabetes in a corporate diabetes program.  Created: 11/1/2007 by National Diabetes Education Program (NDEP), a joint program of the Centers for Disease Control and Prevention and the National Institutes of Health.   Date Released: 11/8/2007.

  19. Perspective Taking in Workplaces

    Directory of Open Access Journals (Sweden)

    Zappalà Salvatore

    2014-07-01

    Full Text Available Workplaces are often described as places in which individuals are motivated by their self-interests and in which negative events like time pressure, anxiety, conflict with co-workers, miscomprehensions, difficulties in solving problems, not-transmitted or not-exchanged information that lead to mistakes, and in some cases to injuries, stress or control, are part of everyday life (Dormann & Zapf, 2002; Schabracq, Winnubst and Cooper, 2003. Such situations are often the result of the limited comprehension of needs, skills, or information available to colleagues, supervisors, subordinates, clients or providers. However, workplaces are also places in which employees take care of clients, support colleagues and subordinates (Rhoades & Eisenberger, 2002, are enthusiastic about their job (Bakker et al., 2008, are motivated by leaders that encourage employees to transcend their own self-interests for the good of the group or the organization and provide them with the confidence to perform beyond expectations (Bass, 1997. Thus positive relationships at work are becoming a new interdisciplinary domain of inquiry (Dutton & Ragins, 2006. Within this positive relationships framework, in this paper we focus on a positive component of workplaces, and particularly on an individual cognitive and emotional process that has an important role in the workplace because it facilitates interpersonal relations and communications: it is the perspective taking process. In order to describe perspective taking, we will refer to some empirical studies and particularly to the review published by Parker, Atkins and Axtell in 2008 on the International Review of Industrial and Organizational Psychology.

  20. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    OpenAIRE

    Youngsook Lee; Juryon Paik

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreig...

  1. Anonymous Card Shuffling and its Applications to Parallel Mixnets

    CERN Document Server

    Goodrich, Michael T

    2012-01-01

    We study the question of how to shuffle $n$ cards when faced with an opponent who knows the initial position of all the cards {\\em and} can track every card when permuted, {\\em except} when one takes $K< n$ cards at a time and shuffles them in a private buffer "behind your back," which we call {\\em buffer shuffling}. The problem arises naturally in the context of parallel mixnet servers as well as other security applications. Our analysis is based on related analyses of load-balancing processes. We include extensions to variations that involve corrupted servers and adversarially injected messages, which correspond to an opponent who can peek at some shuffles in the buffer and who can mark some number of the cards. In addition, our analysis makes novel use of a sum-of-squares metric for anonymity, which leads to improved performance bounds for parallel mixnets and can also be used to bound well-known existing anonymity measures.

  2. Anonymous voting for multi-dimensional CV quantum system

    Science.gov (United States)

    Rong-Hua, Shi; Yi, Xiao; Jin-Jing, Shi; Ying, Guo; Moon-Ho, Lee

    2016-06-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519), the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012), and the MEST-NRF of Korea (Grant No. 2012-002521).

  3. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    Science.gov (United States)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-06-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  4. Compromising Tor Anonymity Exploiting P2P Information Leakage

    CERN Document Server

    Manils, Pere; Blond, Stevens Le; Kaafar, Mohamed Ali; Castelluccia, Claude; Legout, Arnaud; Dabbous, Walid

    2010-01-01

    Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak information that may compromise the identity of its users. In this paper, we first present three attacks targeting BitTorrent users on top of Tor that reveal their real IP addresses. In a second step, we analyze the Tor usage by BitTorrent users and compare it to its usage outside of Tor. Finally, we depict the risks induced by this de-anonymization and show that users' privacy violation goes beyond BitTorrent traffic and contaminates other protocols such as HTTP.

  5. Secure Web Transaction with Anonymous Mobile Agent over Internet

    Institute of Scientific and Technical Information of China (English)

    WANG ChangJie(王常杰); ZHANG FangGuo(张方国); WANG YuMin(王育民)

    2003-01-01

    A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, a new secure anonymous mobile agent scheme is proposed for the prevention of agent tempering without compromising the mobility or autonomy of the agent. In the scheme, a mobile agent can produce valid signature on website's bid (it means to transact a contact with the web site) on behalf of its customer, without revealing the customer's real private key. In addition, the anonymity of the customer is also achieved when its agent transacts with the websites. Furthermore, the customer who issues a malicious agent or denies the transaction can be identified and detected by Agent Management Center (AMC). Therefore, the scheme is practical in the future electronic commerce over Internet.

  6. FreeRec: an Anonymous and Distributed Personalization Architecture

    OpenAIRE

    Boutet, Antoine; Frey, Davide; Jégou, Arnaud; Kermarrec, Anne-Marie; Ribeiro, Heverson B.

    2013-01-01

    International audience; We present and evaluate FreeRec, an anonymous decentral- ized peer-to-peer architecture, designed to bring personalization while protecting the privacy of its users. FreeRec's decentralized approach makes it independent of any entity wishing to collect personal data about users. At the same time, its onion-routing-like gossip-based overlay protocols e ectively hide the association between users and their inter- est pro les without a ecting the quality of personalizatio...

  7. Discrimination and nepotism: the efficiency of the anonymity rule.

    OpenAIRE

    Fershtman, C.; Gneezy, U.; Verboven, Frank

    2002-01-01

    The Paper considers two categories of discrimination: ‘discrimination against’ and ‘discrimination in favour’, which Becker coins ‘nepotism’. The Paper develops an experimental test to distinguish between these two types of discrimination. The experiment compares the behaviour towards individuals of different groups with the behaviour towards anonymous individuals (those having no clear group affiliation). We illustrate the two attitudes by considering two segmented societies: Belgian society...

  8. Accountable Anonymous Service Usage in Mobile Communication Systems

    OpenAIRE

    Buttyan, Levente; Hubaux, Jean-Pierre

    1999-01-01

    We introduce a model that allows of anonymous yet accountable service usage in mobile communication systems. This model is based on the introduction of a new business role, called the customer care agency, and a ticket based mechanism for service access. We motivate the introduction of customer care agencies by analyzing their role and emphasizing their advantages. We introduce the general idea of ticket based service access, present a categorization of ticket types and ticket acquisi...

  9. Anonymity in a Limit-Order Market: An Experimental Analysis

    OpenAIRE

    Majois, Christophe

    2008-01-01

    In this paper, we adopt an experimental approach to evaluate the impact of pre-trade anonymity in order-driven markets. More specifically, we build an experimental design of an electronic limit-order market, and compare two settings: one in which traders observe the identities of agents placing orders in the order book, and the other one where this information is not available on market screens. We find that ID code disclosure does not alter liquidity, efficiency or traders’ pr...

  10. Guaranteeing anonymity when sharing medical data, the Datafly System.

    OpenAIRE

    Sweeney, L.

    1997-01-01

    We present a computer program named Datafly that maintains anonymity in medical data by automatically generalizing, substituting, and removing information as appropriate without losing many of the details found within the data. Decisions are made at the field and record level at the time of database access, so the approach can be used on the fly in role-based security within an institution, and in batch mode for exporting data from an institution. Often organizations release and receive medic...

  11. On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

    OpenAIRE

    Tobias Pulls; Daniel Slamanig

    2015-01-01

    Current de facto standard payment and billing models for commercial cloud storage services provide a plethora of information to the cloud provider about its clients. This leads to a hostile environment when seen from a privacy perspective. Motivated by recently leaked facts about large scale governmental surveillance efforts as well as the lack of privacy-preserving measures in existing commercial cloud storage services, in this paper, we investigate the feasibility of so called anonymous clo...

  12. Best-Reply Dynamics in Large Anonymous Games

    OpenAIRE

    Yakov Babichenko

    2012-01-01

    We consider small-influence anonymous games with a large number of players $n$ where every player has two actions. For this class of games we present a best-reply dynamic with the following two properties. First, the dynamic reaches Nash approximate equilibria fast (in at most $cn\\ log n$ steps for some constant $c>0$). Second, Nash approximate equilibria are played by the dynamic with a limit frequency of at least $1-e^{-c'n}$ for some constant $c'>0$.

  13. Mobile Anonymous Trust Based Routing Using Ant Colony Optimization

    Directory of Open Access Journals (Sweden)

    R. Kalpana

    2012-01-01

    Full Text Available Problem statement: Ad hoc networks are susceptible to malicious attacks through denial of services, traffic analysis and spoofing. The security of the ad hoc routing protocol depends upon encryption, authentication, anonymity and trust factors. End-to-end security of data is provided by encryption and authentication, topology information of the nodes can be obtained by studying traffic and routing data. This security problem of ad hoc network is addressed by the use of anonymity mechanisms and trust levels. Identification information like traffic flow, network topology, paths from malicious attackers is hidden in anonymous networks. Similarly, trust plays a very important role in the intermediate node selection in ad hoc networks. Trust is essential as selfish and malicious nodes not only pose a security issue but also decreases the Quality of Service. Approach: In this study, a routing to address anonymous routing with a trust which improves the overall security of the ad hoc network was proposed. A new approach for an on demand ad-hoc routing algorithm, which was based on swarm intelligence. Ant colony algorithms were a subset of swarm intelligence and considered the ability of simple ants to solve complex problems by cooperation. The interesting point was, that the ants do not need any direct communication for the solution process, instead they communicate by stigmergy. The notion of stigmergy means the indirect communication of individuals through modifying their environment. Several algorithms which were based on ant colony problems were introduced in recent years to solve different problems, e.g., optimization problems. Results and Conclusion: It is observed that the overall security in the network improves when the trust factor is considered. It is seen that non performing nodes are not considered due to the proposed ACO technique.

  14. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    Nováková, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  15. Enhancing Censorship Resistance in the Tor Anonymity Network

    OpenAIRE

    Winter, Philipp

    2014-01-01

    Baksidestext The Tor network was originally designed as low-latency anonymity network.However, as the years progressed, Tor earned a reputation as also being a useful tool to circumvent Internet censorship. At times, the network counted 30,000 users only from China. Censors reacted by tightening their grip on the national communication infrastructure. In particular, they developed techniques to prevent people from being able to access the Tor network. This arms race now counts several iterati...

  16. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  17. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%. PMID:27091755

  18. AATCT: Anonymously Authenticated Transmission on the Cloud with Traceability

    Directory of Open Access Journals (Sweden)

    Maged Hamada Ibrahim

    2015-09-01

    Full Text Available In Cloud computing, anonymous authentication is an important service that must be available to users in the Cloud. Users have the right to remain anonymous as long as they behave honestly. However, in case a malicious behavior is detected, the system – under court order – must be able to trace the user to his clear identity. Most of the proposed authentication schemes for the Cloud are either password-based authentication schemes that are vulnerable to offline dictionary attacks, or biometric-based authentication schemes that take a long time of execution specially in case of high security requirements. In this paper, we propose an efficient and secure scheme to non-interactively authenticate the users on the Cloud to the remote servers while preserving their anonymity. In case of accusations, the registration authority is able to trace any user to his clear identity. We avoid using low entropy passwords or biometric mechanisms, instead, we employ pseudonym systems in our design. The computation complexity and storage requirements are efficient and suitable to be implemented on smart cards/devices. Our proposed scheme withstands challenging adversarial attacks such as, stolen databases attacks, databases insertion attacks, impersonation attacks, replay attacks and malicious users/servers collaboration attacks.

  19. Anonymous and Non-Repudiation E-Payment Protocol

    Directory of Open Access Journals (Sweden)

    Sattar J. Aboud

    2007-01-01

    Full Text Available There are many proposals offer anonymous and non-repudiation e-payment protocols. But they have the drawbacks that the anonymity can be misused by fraudulent to perform a perfect crimes. Currently, the hot research concentrates on the accepting of e-payment protocols where the anonymity of the coins is cancelable via a trusted authority in the case of criminal entities. In the article we suggest an efficient protocol for e-payment scheme that offers a good level of security with appreciate to its efficiency. The proposed protocol prevents the blind office and the bank from impersonate an entity, so that the entity could not repudiate it when the entity misused a coin. Another benefit is that it is constructed from efficient cryptography schemes so that its security can simply be analyzed. The strength of this scheme is in its easiness. So, we claim that the suggested protocol is more efficient than the existing schemes, since it allows to both a blind office and a bank to impersonate an entity to find and to spend a coin without to be noticed. It might cause a repudiation difficulty where the entity can repudiate his bad activities by proposing that both the bank and the blind office acted inaccurately. Other relevant issues related to the new protocol will be discussed in the section of the security of the scheme.

  20. [E-research: problems with anonymity and consent].

    Science.gov (United States)

    Woolderink, Marla; van Asselt, Antoinette D I; van Schayck, Constant P; van Wijmen, Frans C B

    2013-01-01

    The Medical Research Involving Human Subjects Act (WMO) requires that participants in medical-scientific studies provide written consent. This requirement makes e-research (online research) unnecessarily difficult and sometimes impossible. Much of e-research involves online interventions that focus on sensitive issues such as sexual dysfunction, addiction and child abuse, for which anonymity is an important condition. WMO procedures, however, strictly interpret the word "written" as "on paper", and participants are not permitted to give consent by email, for example. A second requirement, which mainly makes studies among minors between the ages of 12 and 18 more difficult, is that both parents or the guardian must provide written consent. This undermines anonymity to such an extent that virtually no subjects remain. Participants in medical-scientific studies must always be identifiable to the investigator. But, apart from this, he/she should be possible to guarantee anonymity within the regulatory framework. There is good reason to adapt legal regulations to today's needs. PMID:24345359

  1. Reversible Anonymization of DICOM Images using Cryptography and Digital Watermarking

    Directory of Open Access Journals (Sweden)

    Lhoussain ELFADIL

    2012-04-01

    Full Text Available Digital Imaging and Communications in Medicine (DICOM is a standard for handling, storing, printing, and transmitting information in medical images. The DICOM file contains the image data and a number of attributes such as identified patient data (name, age, insurance ID card,…, and non-identified patient data (doctor’s interpretation, image type,…. Medical images serve not only for examination, but can also be used for research and education purposes. For research they are used to prevent illegal use of information; before authorizing researchers to use these images, the medical staff deletes all the data which would reveal the patient identity to prevent patient privacy. This manipulation is called anonymization. In this paper, we propose a reversible anonymization of DICOM images. Identifying patient data with image digest, computed by the well-known SHA-256 hash function, are encrypted using the proposed probabilistic public key crypto-system. After compressing the Least Significant Bit (LSB bitplan of the image using Hofmann coding algorithm, the encrypted data is inserted into a liberated zone of the LSB bitplan of the image. The proposed method allows researchers to use anonymous DICOM images and keep to authorized staff -if necessary- the possibility to return to the original image with all related patient data.

  2. Utility-guided Clustering-based Transaction Data Anonymization

    Directory of Open Access Journals (Sweden)

    Aris Gkoulalas-Divanis

    2012-04-01

    Full Text Available Transaction data about individuals are increasingly collected to support a plethora of applications, spanning from marketing to biomedical studies. Publishing these data is required by many organizations, but may result in privacy breaches, if an attacker exploits potentially identifying information to link individuals to their records in the published data. Algorithms that prevent this threat by transforming transaction data prior to their release have been proposed recently, but they may incur significant utility loss due to their inability to: (i accommodate a range of different privacy requirements that data owners often have, and (ii guarantee that the produced data will satisfy data owners’ utility requirements. To address this issue, we propose a novel clustering-based framework to anonymizing transaction data, which provides the basis for designing algorithms that better preserve data utility. Based on this framework, we develop two anonymization algorithms which explore a larger solution space than existing methods and can satisfy a wide range of privacy requirements. Additionally, the second algorithm allows the specification and enforcement of utility requirements, thereby ensuring that the anonymized data remain useful in intended tasks. Experiments with both benchmark and real medical datasets verify that our algorithms significantly outperform the current state-of-the-art algorithms in terms of data utility, while being comparable in terms of efficiency.

  3. An Analysis of Anonymity in the Bitcoin System

    CERN Document Server

    Reid, Fergal

    2011-01-01

    Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the oneto- many mapping between users and public-keys and associate information external to the system with the users. Bitcoin frustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approx...

  4. The role of quasi-identifiers in k-anonymity revisited

    OpenAIRE

    Bettini, C.; Wang, X S; S. Jajodia

    2006-01-01

    The concept of k-anonymity, used in the recent literature to formally evaluate the privacy preservation of published tables, was introduced based on the notion of quasi-identifiers (or QI for short). The process of obtaining k-anonymity for a given private table is first to recognize the QIs in the table, and then to anonymize the QI values, the latter being called k-anonymization. While k-anonymization is usually rigorously validated by the authors, the definition of QI remains mostly inform...

  5. Reidentification and k-anonymity: a model for disclosure risk in graphs

    OpenAIRE

    Stokes, Klara; Torra, Vicenç

    2011-01-01

    In this article we provide a formal framework for reidentification in general. We define n-confusion as a concept for modelling the anonymity of a database table and we prove that n-confusion is a generalization of k- anonymity. After a short survey on the different available definitions of k- anonymity for graphs we provide a new definition for k-anonymous graph, which we consider to be the correct definition. We provide a description of the k-anonymous graphs, both for the regular and the n...

  6. Sexual Activity Without Condoms and Risk of HIV Transmission in Serodifferent Couples When the HIV-Positive Partner Is Using Suppressive Antiretroviral Therapy

    DEFF Research Database (Denmark)

    Rodger, Alison J; Cambiano, Valentina; Bruun, Tina;

    2016-01-01

    of within-couple HIV transmission (heterosexual and men who have sex with men [MSM]) during periods of sex without condoms and when the HIV-positive partner had HIV-1 RNA load less than 200 copies/mL. DESIGN, SETTING, AND PARTICIPANTS: The prospective, observational PARTNER (Partners of People on ART-A New...... Evaluation of the Risks) study was conducted at 75 clinical sites in 14 European countries and enrolled 1166 HIV serodifferent couples (HIV-positive partner taking suppressive ART) who reported condomless sex (September 2010 to May 2014). Eligibility criteria for inclusion of couple-years of follow-up were...... condomless sex and HIV-1 RNA load less than 200 copies/mL. Anonymized phylogenetic analysis compared couples' HIV-1 polymerase and envelope sequences if an HIV-negative partner became infected to determine phylogenetically linked transmissions. EXPOSURES: Condomless sexual activity with an HIV...

  7. Social media use and HIV transmission risk behavior among ethnically diverse HIV-positive gay men: results of an online study in three U.S. states.

    Science.gov (United States)

    Hirshfield, Sabina; Grov, Christian; Parsons, Jeffrey T; Anderson, Ian; Chiasson, Mary Ann

    2015-10-01

    Though Black and Hispanic men who have sex with men (MSM) are at an increased risk for HIV, few HIV risk reduction interventions that target HIV-positive MSM, and even fewer that use technology, have been designed to target these groups. Despite similar rates of social media and technology use across racial/ethnic groups, online engagement of minority MSM for HIV prevention efforts is low. Since minority MSM tend to have less representation in online HIV prevention studies, the goals of this online anonymous study of HIV-positive gay-identified men were to test the feasibility of conducting targeted recruitment by race/ethnicity and sexual orientation, to assess technology and social media use, and to assess global HIV transmission risk. In 2011, an anonymous online survey was conducted among 463 members of an HIV-positive personals website. Emails were sent to a subset of HIV-positive male members who self-identified as gay. While 57 % were White, substantial proportions of participants were Black (20 %) or Hispanic (18 %). Median age was 46 (range 18-79). Men who reported using 3 or more websites or apps to meet sex partners were significantly more likely to report anal intercourse (AOR 4.43, p social media use, and sexual risk among a diverse sample of HIV-positive gay men. Efficacy trials of technology-based HIV prevention interventions targeting high-risk minority HIV-positive MSM are warranted. PMID:26179596

  8. People With HIV Now Live a Better Life

    Institute of Scientific and Technical Information of China (English)

    China Daily

    2012-01-01

    As a UN Volunteer,working with UNAIDS China,I have the opportunity to get involved in a wide range of areas.From working with community-based organizations,set up by people living with HIV to interacting with the media on topics related to HIV/AIDS to supporting campaigns to fight HIV/AIDS-related discrimination in the workplace,I get to do it all.

  9. Managing Workplace Diversity

    Directory of Open Access Journals (Sweden)

    Harold Andrew Patrick

    2012-04-01

    Full Text Available Diversity management is a process intended to create and maintain a positive work environment where the similarities and differences of individuals are valued. The literature on diversity management has mostly emphasized on organization culture; its impact on diversity openness; human resource management practices; institutional environments and organizational contexts to diversity-related pressures, expectations, requirements, and incentives; perceived practices and organizational outcomes related to managing employee diversity; and several other issues. The current study examines the potential barriers to workplace diversity and suggests strategies to enhance workplace diversity and inclusiveness. It is based on a survey of 300 IT employees. The study concludes that successfully managing diversity can lead to more committed, better satisfied, better performing employees and potentially better financial performance for an organization.

  10. The implications of stigma and anonymity for self-disclosure in health blogs.

    Science.gov (United States)

    Rains, Stephen A

    2014-01-01

    The reported study examines the implications of anonymity and stigma in the form of illness-related embarrassment for self-disclosure in the context of health blogging. Drawing from theorizing about anonymous communication and stigma, anonymity is argued to be strategically used by individuals who are embarrassed by their illness and to moderate the relationship between embarrassment and self-disclosure. Data from 114 individuals who blog about their experiences coping with a health condition were examined to test study hypotheses. Illness-related embarrassment was positively associated with anonymity. Additionally, anonymity moderated the relationship between embarrassment and self-disclosure. Among bloggers with relatively higher levels of anonymity, illness-related embarrassment was positively associated with self-disclosure. The results suggest that anonymity is strategically used and fosters self-disclosure among individuals who are embarrassed by their illness.

  11. Mobbing on the workplace

    OpenAIRE

    Vuković Drenka

    2006-01-01

    A phenomenon of mobbing has become very popular in mass-media, everyday speech, and scientific literature. In recent decades of the previous century, the systematic researches of the problem of mobbing on the workplace have been intensified. Most often, they refer to the research conducted by Henz Leymann, who precisely defined the term, determined the basic features, phases and consequences of mobbing, and also founded a clinic for giving support to the victims of mobbing. Further research o...

  12. Mobbing in the workplace

    OpenAIRE

    Kantorová, Petra

    2015-01-01

    This bachelor thesis deals with the problems of mobbing in the workplace. The aim is to describe the issue of mobbing and based on information obtained from both the theoretical and practical part of this work to identify the features characteristic of mobbing and propose appropriate recommendations that would lead to prevention or early detection of mobbing. The work is divided into three parts, namely theoretical, methodological and practical.The first part is focused on the issue of mobbin...

  13. Sexual inactivity among men who have sex with men living with hiv in europe

    OpenAIRE

    Platteau, Tom; Nostlinger, Christiana; Schrooten, Ward; Kenyon, Chris; van Lankveld, Jacques J. D. M.; Colebunders, Robert

    2015-01-01

    Objectives: Most people living with HIV stay sexually active, but some remain inactive. This study investigated prevalence and correlates of sexual inactivity among European HIV-positive men who have sex with men (MSM). Methods: An anonymous sexual health questionnaire was distributed in 17 HIV outpatient clinics throughout Europe. Ninety-seven (11.6%) of 838 respondents reported absence of sexual activity. Results: Multivariable regression analysis identified older age, relationship status, ...

  14. Workplace harassment prevention in Finland

    OpenAIRE

    Lorek, Angelika

    2015-01-01

    The proposed research concerns the engagement of companies operating in Finland in prevention of workplace harassment. The main target of the thesis is to understand the importance of the prevention of workplace harassment in the work environment. Research analyses what measures companies take in order to prevent workplace harassment and how is it monitored. As a primary research, interview findings of four Finnish companies (“Company X”, DHL Finland, ISS Palvelut and Management Institute...

  15. Workplace Based Assessment in Psychiatry

    Directory of Open Access Journals (Sweden)

    Ayse Devrim Basterzi

    2009-11-01

    Full Text Available Workplace based assessment refers to the assessment of working practices based on what doctors actually do in the workplace, and is predominantly carried out in the workplace itself. Assessment drives learning and it is therefore essential that workplace-based assessment focuses on important attributes rather than what is easiest to assess. Workplacebased assessment is usually competency based. Workplace based assesments may well facilitate and enhance various aspects of educational supervisions, including its structure, frequency and duration etc. The structure and content of workplace based assesments should be monitored to ensure that its benefits are maximised by remaining tailored to individual trainees' needs. Workplace based assesment should be used for formative and summative assessments. Several formative assessment methods have been developed for use in the workplace such as mini clinical evaluation exercise (mini-cex, evidence based journal club assesment and case based discussion, multi source feedback etc. This review discusses the need of workplace based assesments in psychiatry graduate education and introduces some of the work place based assesment methods.

  16. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  17. Business Information Exchange System with Security, Privacy, and Anonymity

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-01-01

    Full Text Available Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

  18. Distributed anonymous function computation in information fusion and multiagent systems

    CERN Document Server

    Hendrickx, Julien M; Tsitsiklis, John N

    2009-01-01

    We propose a model for deterministic distributed function computation by a network of identical and anonymous nodes, with bounded computation and storage capabilities that do not scale with the network size. Our goal is to characterize the class of functions that can be computed within this model. In our main result, we exhibit a class of non-computable functions, and prove that every function outside this class can at least be approximated. The problem of computing averages in a distributed manner plays a central role in our development.

  19. Virtues and Perils of Anonymity: Should Intermediaries Bear the Burden?

    OpenAIRE

    Zingales, Nicolo

    2014-01-01

    On October 10, 2013, the Chamber of the European Court of Human Rights (ECtHR) handed down a judgment (Delfi v. Estonia) condoning Estonia for a law which, as interpreted, held a news portal liable for the defamatory comments of its users. Amongst the considerations that led the Court to find no violation of freedom of expression in this particular case were, above all, the inadequacy of the automatic screening system adopted by the website and the users’ option to post their comments anonym...

  20. Quantum election scheme based on anonymous quantum key distribution

    Institute of Scientific and Technical Information of China (English)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented,based on which we construct a quantum election scheme without the help of an entanglement state.We show that this election scheme ensures the completeness,soundness,privacy,eligibility,unreusability,fairness,and verifiability of a large-scale election in which the administrator and counter are semi-honest.This election scheme can work even if there exist loss and errors in quantum channels.In addition,any irregularity in this scheme is sensible.

  1. The end of donor anonymity: how genetic testing is likely to drive anonymous gamete donation out of business.

    Science.gov (United States)

    Harper, Joyce C; Kennett, Debbie; Reisel, Dan

    2016-06-01

    Thousands of people worldwide have been conceived using donor gametes, but not all parents tell their children of their origin. Several countries now allow donor-conceived offspring to potentially know their genetic parent if they are informed of their donor-conceived status. At the same time, personal genetic testing is a rapidly expanding field. Over 3 million people have already used direct-to-consumer genetic testing to find information about their ancestry, and many are participating in international genetic genealogy databases that will match them with relatives. The increased prevalence of these technologies poses numerous challenges to the current practice of gamete donation. (i) Whether they are donating in a country that practices anonymous donation or not, donors should be informed that their anonymity is not guaranteed, as they may be traced if their DNA, or that of a relative, is added to a database. (ii) Donor-conceived adults who have not been informed of their status may find out that they are donor-conceived. (iii) Parents using donor conception need to be fully informed that their children's DNA will identify that they are not the biological parents and they should be encouraged to disclose the use of donor gametes to their children. Together, these concerns make urgent a wide-ranging societal conversation about how to best safeguard and promote the interests of donor-conceived offspring and protect the rights of donors. Specifically, there is a need to ensure that new genetic information is communicated in a way that promotes both the safety and the privacy rights of offspring and donors alike. All parties concerned must be aware that, in 2016, donor anonymity does not exist. PMID:27073260

  2. HIV Symptoms

    Science.gov (United States)

    ... Submit Home > HIV/AIDS > What is HIV/AIDS? HIV/AIDS This information in Spanish ( en español ) HIV symptoms Photo courtesy of AIDS.gov More information ... and brain Return to top More information on HIV symptoms Explore other publications and websites Basic Information ...

  3. HIV Testing

    Science.gov (United States)

    ... Abroad Treatment Basic Statistics Get Tested Find an HIV testing site near you. Enter ZIP code or city Follow HIV/AIDS CDC HIV CDC HIV/AIDS See RSS | ... All Collapse All Should I get tested for HIV? CDC recommends that everyone between the ages of ...

  4. Applying Stylometric Analysis Techniques to Counter Anonymity in Cyberspace

    Directory of Open Access Journals (Sweden)

    Jianwen Sun

    2012-02-01

    Full Text Available Due to the ubiquitous nature and anonymity abuses in cyberspace, it’s difficult to make criminal identity tracing in cybercrime investigation. Writeprint identification offers a valuable tool to counter anonymity by applying stylometric analysis technique to help identify individuals based on textual traces. In this study, a framework for online writeprint identification is proposed. Variable length character n-gram is used to represent the author’s writing style. The technique of IG seeded GA based feature selection for Ensemble (IGAE is also developed to build an identification model based on individual author level features. Several specific components for dealing with the individual feature set are integrated to improve the performance. The proposed feature and technique are evaluated on a real world data set encompassing reviews posted by 50 Amazon customers. The experimental results show the effectiveness of the proposed framework, with accuracy over 94% for 20 authors and over 80% for 50 ones. Compared with the baseline technique (Support Vector Machine, a higher performance is achieved by using IGAE, resulting in a 2% and 8% improvement over SVM for 20 and 50 authors respectively. Moreover, it has been shown that IGAE is more scalable in terms of the number of authors, than author group level based methods.

  5. Quantum anonymous voting with unweighted continuous-variable graph states

    Science.gov (United States)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-08-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  6. Private anonymous fingerprinting for color images in the wavelet domain

    Science.gov (United States)

    Abdul, W.; Gaborit, P.; Carré, P.

    2010-01-01

    An online buyer of multimedia content does not want to reveal his identity or his choice of multimedia content whereas the seller or owner of the content does not want the buyer to further distribute the content illegally. To address these issues we present a new private anonymous fingerprinting protocol. It is based on superposed sending for communication security, group signature for anonymity and traceability and single database private information retrieval (PIR) to allow the user to get an element of the database without giving any information about the acquired element. In the presence of a semi-honest model, the protocol is implemented using a blind, wavelet based color image watermarking scheme. The main advantage of the proposed protocol is that both the user identity and the acquired database element are unknown to any third party and in the case of piracy, the pirate can be identified using the group signature scheme. The robustness of the watermarking scheme against Additive White Gaussian Noise is also shown.

  7. IdentiDroid: Android can finally Wear its Anonymous Suit

    Directory of Open Access Journals (Sweden)

    Bilal Shebaro

    2014-04-01

    from applications when the smartphone is used under the anonymous modality. They are re-instated back when the smartphone returns to work in the normal modality. In addition, both solutions offer protection from applications that identify their users through traces left in the application's data storage or through exchanging identifying data messages. We developed IdentiDroid, a customized Android operating system, to deploy these solutions and built IdentiDroid Profile Manager, a profile-based configuration tool that allows one to set different configurations for each installed Android application. With this tool, applications running within the same device are configured to be given different identifications and privileges to limit the uniqueness of device and user information. We analyzed 250 Android applications to determine what information, services, and permissions can identify users and devices. Our experiments show that when IdentiDroid is deployed and properly configured on Android devices, users' anonymity is better guaranteed by either of the proposed solutions with no significant impact on most device applications.

  8. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought. PMID:22908618

  9. Quantum anonymous voting with unweighted continuous-variable graph states

    Science.gov (United States)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-05-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  10. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  11. Almut Koester, Workplace Discourse

    OpenAIRE

    Millot, Philippe,

    2014-01-01

    Almut Koester, Professeur à l’Université de Birmingham et auteur de nombreux travaux sur les discours professionnels, propose, à partir d’une riche bibliographie, une synthèse de plus de trente ans de recherche dans ce domaine, intitulée Workplace Discourse. Elle y présente également son travail, fondé sur le corpus d’anglais professionnel oral Corpus of American and British Office Talk (ABOT), tout en accordant une place importante aux phénomènes plus récents tels que la communication électr...

  12. Conflict Management Strategies in Workplace

    Institute of Scientific and Technical Information of China (English)

    黄玉霞

    2011-01-01

    As we all know, it is inevitable to be confronted with verbal aggressiveness by employees, peers, and supervisors in the workplace. In order to avoid these conflict with others in the future workplace, this paper is to discuss about the management strategies dealing with these conflicts.

  13. Workplace Environment towards Emotional Health

    OpenAIRE

    Zafir Mohd Makhbul

    2013-01-01

    Workplace ergonomics, such as air quality, lighting, furniture and tools, acoustics and building’s general environment, have a significant relationship between worker’s satisfaction and performance. Poor workplace ergonomics or organization comfort level has significant economic implications for the organizations through employee dissatisfaction, lowered productivity and lowered emotional and physical health of the employees. Lower emotional health leads to psychological distress, depression ...

  14. Information Literacy in the workplace

    OpenAIRE

    Inskip, C.

    2015-01-01

    This talk aims to provide an overview of thinking and practice in workplace information literacy, an important developing area. It will consider the semantic gap between education and workplace settings and identify key issues around the challenges to library and information professionals in bridging that gap.

  15. Workplace incivility: a concept analysis.

    Science.gov (United States)

    Abolfazl Vagharseyyedin, Seyyed

    2015-01-01

    This study aimed to describe the meaning of the concept 'workplace incivility' and promote consistency in its application in nursing research and practice. The methodology introduced by Walker and Avant was used to analyze this concept. A total number of 50 studies that had essentially addressed the concept of incivility in employees' work environment was selected. Ambiguous intent, violation of mutual respect, low intensity and lack of physical assault were identified as the defining attributes of workplace incivility. The necessary antecedent of workplace incivility consisted of the presence of two or more people, with one or more as the source of the incivility, and another or others as its target in the workplace. Moreover, certain individual and organisational factors were the potential antecedents of workplace incivility. Possible negative outcomes for victims, witnesses, organisations, society and perpetrators of such behaviours, such as increased cost for the organisation, reduced citizenship performance, psychological distress and anxiety were identified as outcomes of workplace incivility. Results of the current concept analysis can guide nurse managers to design interventions so that the occurrence of workplace incivility can be reduced. Further studies can focus on testing the psychometric properties of the existing workplace incivility scales, especially uncivil behaviours experienced by nurses across different societies or cultures. PMID:26213258

  16. Communication Skills for Workplace Assessors.

    Science.gov (United States)

    Corbett, Deborah

    This document is designed to help develop the communication skills of individuals training for the position of workplace assessor in Australia's National Training Framework and practicing workplace assessors who require additional assistance with on-the-job communication skills. The document consists of 11 units of study that each contain some or…

  17. The Workplace and Mental Health.

    Science.gov (United States)

    Pierre, Karin Domnick

    1986-01-01

    Findings of the Canadian Mental Health and the Workplace Project are that (1) the quality of interpersonal relations in the workplace is a major factor in emotional well-being and (2) work must be balanced with other parts of one's life. These findings imply the need for social support networks and alternative work patterns. (SK)

  18. The Toll of Workplace Bullying

    Science.gov (United States)

    Killoren, Robert

    2014-01-01

    Bullying may be more common than most people think. According to a study commissioned by the Workplace Bullying Institute, one in three employees experience bullying in the workplace either as a victim or as a witness suffering collateral damage. Bullying is a serious problem. Directors, managers, and staff members need to ensure that it does not…

  19. AIDS and the workplace: signs of hope from Zimbabwe.

    Science.gov (United States)

    Williams, G; Ray, S

    1994-01-01

    Strategies for Hope is a series of booklets and videos about innovative and practical approaches to AIDS management and prevention in developing countries. It is published by the UK development agency ACTIONAID and the African Medical and Research Foundation with technical and financial support from the World Health Organization Global Program on AIDS. More than 500,000 booklets and 5000 videos have been distributed worldwide. The authors describe what they learned while researching the eighth booklet in the series, Work Against AIDS, analyzing seven workplace-based AIDS programs in Zimbabwe. They argue that the workplace can play a far greater role in AIDS awareness and prevention than is generally realized. AIDS is already affecting the health and productivity of the workforce in Zimbabwe, where in some areas more than 15% of adults are estimated to be HIV-positive. Morbidity and mortality are rising with concomitant worker absenteeism, yet most workplaces in Zimbabwe do not have even a poster about AIDS on display. There are, however, some impressive education programs under way. These programs, run by a significant number of volunteer peer educators, are working to reduce the stigma attached with sexually transmitted diseases and promote low-cost or free treatment. The authors also note as most promising the program of the Zimbabwe Congress of Trade Unions training 700 Health and Safety representatives at shop-floor and branch levels in AIDS-related human rights issues at the workplace as well as AIDS awareness and prevention. PMID:12318814

  20. Workplaces as Transformative Learning Spaces

    DEFF Research Database (Denmark)

    Maslo, Elina

    2010-01-01

    words: learning, lifelong learning, adult learning, workplace learning, transformative learning spaces During many years of research on lifelong foreign language learning with very different groups of learners, we found some criteria, which make learning process successful. Since then we tried to find...... of the ASEM LLL Hub network 2 Survey on Workplace Learning in Asia and Europe. We will present the work of researchers on the survey as the first transformative learning space and workplace learning we discovered in the enterprises in Latvia as a second example on the transformative learning space. We......Abstract to the Vietnam Forum on Lifelong Learning: Building a Learning Society Hanoi, 7-8 December 2010 Network 2: Competence development as Workplace Learning Title of proposal: Workplaces as Transformative Learning Spaces Author: Elina Maslo, dr. paed., University of Latvia, elina@latnet.lv Key...

  1. A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards

    Institute of Scientific and Technical Information of China (English)

    LU Rong-xing; CAO Zhen-fu; SU Ren-wang

    2006-01-01

    Remote user authentication is essential in distributed network environment to protect unauthorized access of a networked system. However, most of those existing remote user authentication schemes have not provided the user identity anonymity, while user anonymity is particularly important in some practical applications.Therefore, based on self-encryption mechanism, a new remote user authentication scheme was proposed. The scheme not only has no need of maintaining a password table at the remote server, but also can protect the user's anonymity.

  2. Mobbing on the workplace

    Directory of Open Access Journals (Sweden)

    Vuković Drenka

    2006-01-01

    Full Text Available A phenomenon of mobbing has become very popular in mass-media, everyday speech, and scientific literature. In recent decades of the previous century, the systematic researches of the problem of mobbing on the workplace have been intensified. Most often, they refer to the research conducted by Henz Leymann, who precisely defined the term, determined the basic features, phases and consequences of mobbing, and also founded a clinic for giving support to the victims of mobbing. Further research of the problem resulted in a significant number of studies regarding the prevalence of the phenomenon, risk groups, motives and final aims of mobbing. Multidisciplinary approach to the problem encouraged the development of programs of aid and support to the victims, and also a number of regulations sanctioning the mobbing on the work-place were enacted. The paper is structured within the thematic parts, in order to define the term, and determine the procedures, characteristics of mobbing, prevalence of the phenomenon and its consequences. The used results of the empirical research confirm the national specifics and general characteristics of this problem in the European countries, while the data for Serbia are missing. .

  3. Anonymization of Electronic Medical Records to Support Clinical Analysis

    CERN Document Server

    Gkoulalas-Divanis, Aris

    2013-01-01

    Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for su...

  4. ANDaNA: Anonymous Named Data Networking Application

    CERN Document Server

    DiBenedetto, Steven; Tsudik, Gene; Uzun, Ersin

    2011-01-01

    Content-centric networking -- also known as information-centric networking (ICN) -- shifts emphasis from hosts and interfaces (as in today's Internet) to data. Named data becomes addressable and routable, while locations that currently store that data become irrelevant to applications. Named Data Networking (NDN) is a large collaborative research effort that exemplifies the content-centric approach to networking. NDN has some innate privacy-friendly features, such as lack of source and destination addresses on packets. However, as discussed in this paper, NDN architecture prompts some privacy concerns mainly stemming from the semantic richness of names. We examine privacy-relevant characteristics of NDN and present an initial attempt to achieve communication privacy. Specifically, we design an NDN add-on tool, called ANDaNA, that borrows a number of features from Tor. As we demonstrate via experiments, it provides comparable anonymity with lower relative overhead.

  5. Talking about suicide: confidentiality and anonymity in qualitative research.

    Science.gov (United States)

    Gibson, Susanne; Benson, Outi; Brand, Sarah L

    2013-02-01

    While it is acknowledged that there is a need for more qualitative research on suicide, it is also clear that the ethics of undertaking such research need to be addressed. This article uses the case study of the authors' experience of gaining ethics approval for a research project that asks people what it is like to feel suicidal to (a) analyse the limits of confidentiality and anonymity and (b) consider the ways in which the process of ethics review can shape and constrain suicide research. This leads to a discussion of the ways in which ethics committees assess and monitor qualitative research more generally and some preliminary suggestions for how this might be improved.

  6. Challenges of educational and cultural diversity in the workplace.

    Science.gov (United States)

    Hyde, S; White, S

    1993-01-01

    In South Africa, the estimate of HIV-infected population was 300,000 in September 1993, with 500 new infections occurring daily, mostly in poor neighborhoods with illiteracy rates of 25-50%. The AIDS Education and Training (AET) targeted low-literate groups by developing an educational package for the workplace. The methodology included repetition of key messages, stories from their own culture with pictures, interaction in groups, and visual aids to retain information. The content involved biomedical aspects of HIV/AIDS, testing and counseling, safe sex, traditional healers, the needs of the infected, and workplace/community issues. The pictures depicted men and women of all racial varieties to drive home the message that the infection can infect everybody. 31 colorful laminated posters were developed for the AIDS flip chart kit, and over 100 flip chart sessions were conducted at workplaces. An evaluation of the flip chart sessions queried 143 English- and 897 Tswana-speaking people at one company. 58% of respondents considered condom use and reducing the number of partners the most important message. 28% deemed biomedical facts and latency of the infection important, 25% the deadly nature of the disease, and 15% the modes of transmission. 44% desired to learn about prevention and 30% appreciated the interactive method of learning. All participants sought more information on STDs, where to get an HIV test, and how to have safer sex. AET provides assistance to clients to become educators themselves by means of policy development, refresher courses for educators, and action planning (condom distribution, STD control, referral for testing, and follow-up). The flip chart is also used for other health and lifestyle education regarding family planning, tuberculosis, sexuality, and communication skills aimed at company managers, union officials, and supervisors.

  7. Challenges of educational and cultural diversity in the workplace.

    Science.gov (United States)

    Hyde, S; White, S

    1993-01-01

    In South Africa, the estimate of HIV-infected population was 300,000 in September 1993, with 500 new infections occurring daily, mostly in poor neighborhoods with illiteracy rates of 25-50%. The AIDS Education and Training (AET) targeted low-literate groups by developing an educational package for the workplace. The methodology included repetition of key messages, stories from their own culture with pictures, interaction in groups, and visual aids to retain information. The content involved biomedical aspects of HIV/AIDS, testing and counseling, safe sex, traditional healers, the needs of the infected, and workplace/community issues. The pictures depicted men and women of all racial varieties to drive home the message that the infection can infect everybody. 31 colorful laminated posters were developed for the AIDS flip chart kit, and over 100 flip chart sessions were conducted at workplaces. An evaluation of the flip chart sessions queried 143 English- and 897 Tswana-speaking people at one company. 58% of respondents considered condom use and reducing the number of partners the most important message. 28% deemed biomedical facts and latency of the infection important, 25% the deadly nature of the disease, and 15% the modes of transmission. 44% desired to learn about prevention and 30% appreciated the interactive method of learning. All participants sought more information on STDs, where to get an HIV test, and how to have safer sex. AET provides assistance to clients to become educators themselves by means of policy development, refresher courses for educators, and action planning (condom distribution, STD control, referral for testing, and follow-up). The flip chart is also used for other health and lifestyle education regarding family planning, tuberculosis, sexuality, and communication skills aimed at company managers, union officials, and supervisors. PMID:12345400

  8. Workplace Communication Practices and Policies

    DEFF Research Database (Denmark)

    Kirilova, Marta; Angouri, Jo

    2017-01-01

    This chapter addresses the issue of communication policy in the workplace. Modern workplaces are multinational and multilingual. Both white and blue collar employees interact in languages other than their L1 as part of their daily reality at work. At the same time a number of workplaces have...... studies from socio and applied linguistics research. Special attention is paid to the notions of symbolic capital and power as well as to language attitudes particularly in relation to linguistic evaluation and ‘common sense’ perceptions of language practice. We explore the relationship between language...

  9. Antiferromagnetic character of workplace stress

    Science.gov (United States)

    Watanabe, Jun-Ichiro; Akitomi, Tomoaki; Ara, Koji; Yano, Kazuo

    2011-07-01

    We study the nature of workplace stress from the aspect of human-human interactions. We investigated the distribution of Center for Epidemiological Studies Depression Scale scores, a measure of the degree of stress, in workplaces. We found that the degree of stress people experience when around other highly stressed people tends to be low, and vice versa. A simulation based on a model describing microlevel human-human interaction reproduced this observed phenomena and revealed that the energy state of a face-to-face communication network correlates with workplace stress macroscopically.

  10. Ten-year trends in HIV prevalence among visitors to public health centers under the National HIV Surveillance System in Korea, 2000 to 2009

    Directory of Open Access Journals (Sweden)

    Kee Mee-Kyung

    2012-09-01

    Full Text Available Abstract Background Korea saw a sharp increase in HIV diagnosis from 2000. This serious public health concern must be monitored diligently. We identified the characteristics and trends in HIV prevalence among visitors to public health centers (PHCs from 2000 to 2009. Methods We retrieved ten-year data of HIV tests from 253 PHCs. The HIV prevalence was analyzed by gender, age, nationality, region, and reason for HIV testing. Data were analyzed using logistic regression and score test for trend. Results HIV prevalence among PHCs’ visitors has rapidly increased for six years since 2000, decreased from 2006, and then remained stable. Approximately 50% of total HIV tests were performed for sexually transmitted infection risk group (STI RG, who were tested 1.4 times within a year. Women and the 20s comprised approximately 70% and 40% of PHCs’ visitors, respectively. The prevalence of voluntary test takers was the highest and showed most rapid increase (P = 0.007, but that of prisoners declined (P = 0.003. The prevalence of STI RG was lower than those of the other groups and remained stable throughout the ten-year period (P = 0.606. Percentage of anonymous tests was 2–3% of a total HIV tests, but overall HIV-positive rate showed a rapid increase (P  Conclusions As voluntary or anonymous testing groups are actively engaged in learning their status of HIV, these groups showed the highest in HIV infection. Groups in the population with these characteristics should be located and encouraged to be tested, and offered anonymity. This study suggests that it is important to ascertain the characteristics of people choosing to take voluntary testing.

  11. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    Science.gov (United States)

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback.

  12. Toward Analysis of the Relations Among the Youth Counterculture, Telephone Hotlines, and Anonymity

    Science.gov (United States)

    Baizerman, Michael

    1974-01-01

    During the 1960's, there emerged innovative human service programs for youth. Among the actual differences in these programs compared to their older, established human service agencies was (is) the prominent position of the social value of client anonymity. This anonymity is examined in an attempt to understand its role. (RC)

  13. Diversity management: the treatment of HIV-positive employees.

    Science.gov (United States)

    Yap, Matthew H T; Ineson, Elizabeth M

    2012-01-01

    Socio-demographic dimensions such as age, gender, sexual orientation, race and ethnicity are commonly included in diversity studies. With a view to helping Asian hospitality managers to manage HIV-positive employees in their workplaces through diversity management (DM) theory, this research extends the boundaries of previous diversity studies by considering Human Immunodeficiency Virus (HIV) infection as a diverse characteristic. Both quantitative and qualitative primary data were collected from purposively selected Asian hospitality managers through postal questionnaire and follow-up telephone interviews. Transformed raw data were analysed using summary statistics and template analysis. Asian hospitality managers agreed that DM would be appropriate in the management of HIV-positive employees and that it could generate substantial benefits for employees and employers. However, they believe that the successful adoption and implementation of DM is not easy; it requires training and, ideally, the recruitment of experienced directors. Nevertheless, Asian hospitality managers are confident that implementing DM to manage HIV-positive employees can enhance tolerance, improve understanding and promote equality. The purposive sampling technique and the small number of respondents have impacted the external validity of the study. However, this exploratory study initiates an equality discussion to include HIV-positive employees in DM discourse beyond antidiscrimination legislation. It also supplements the sparse literature addressing HIV-positive employees in the Asian hospitality workplace. Asian hospitality managers are advised to understand and employ DM to treat HIV-positive employees fairly to overcome hospitality workplace marginalisation, discrimination and stigmatisation. PMID:22293097

  14. Middle East and North Africa : Epidemiology and Economics Intelligence to Inform Policy Decisions on Resource Allocation for HIV/AIDS Programs

    OpenAIRE

    World Bank

    2014-01-01

    This survey, the first of its kind in Djibouti, was based on linked anonymous HIV, syphilis and behavioral surveys to examine the magnitude and risk factors for HIV infection among female sex workers (FSWs) and long-distance truck drivers (LDTDs).

  15. Anonimos: An LP based Approach for Anonymizing Weighted Social Network Graphs

    CERN Document Server

    Das, Sudipto; Abbadi, Amr El

    2010-01-01

    The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Anonymization of these social graphs is important to facilitate publishing these data sets for analysis by external entities. Prior work has concentrated mostly on node identity anonymization and structural anonymization. But with the growing interest in analyzing social networks as a weighted network, edge weight anonymization is also gaining importance. We present An\\'onimos, a Linear Programming based technique for anonymization of edge weights that preserves linear properties of graphs. Such properties form the foundation of many important graph-theoretic algorithms such as shortest paths problem, k-nearest neighbors, minimum cost spanning tree, and maximizing information spread. As a proof of concept, we apply An\\'onimos to the shortest paths problem and its extensions, prove the correctness, analyze complexity, and experimentally evaluate it using real social network data sets. O...

  16. Negotiating leave in the workplace

    DEFF Research Database (Denmark)

    Bloksgaard, Lotte

    2014-01-01

    In Denmark leave entitlement is not only regulated by law but is also part of the various collective agreements established in the respective occupational sectors and at the local workplace level. Consequently, Danish fathers have very different leave entitlements, depending on the sector, branch...... men’s negotiations of parental leave at work place level and secondly, to explore and discuss how Danish fathers construct leave practices – and individual male identities – in the workplace....

  17. The Ethics of Workplace Interventions

    DEFF Research Database (Denmark)

    Hasle, Peter; Limborg, Hans Jørgen

    2004-01-01

    A discussion of the ethical dilemmas confronting occupational health and safety professionals when they are involved in workplace interventions. Case stories from the Danish occupational health service are used as the emperical point of departure for paper.......A discussion of the ethical dilemmas confronting occupational health and safety professionals when they are involved in workplace interventions. Case stories from the Danish occupational health service are used as the emperical point of departure for paper....

  18. Stress within the academic workplace.

    Science.gov (United States)

    Kenner, Carole A; Pressler, Jana L

    2014-01-01

    Many new nursing leaders assuming deanships, assistant deanships, or interim deanships have limited education, experience, or background to prepare them to deal with workplace stress. To assist new deans and those aspiring to be deans, the authors of this department offer survival tips based on their personal experiences and insights. They address common issues such as time management, handling workplace bullying, and negotiating deadlines and assignments. The authors welcome counterpoint discussions with readers. PMID:24743171

  19. LGBT Workplace Climate in Astronomy

    Science.gov (United States)

    Gaudi, B. S.; Danner, R.; Dixon, W. V.; Henderson, C. B.; Kay, L. E.

    2013-01-01

    The AAS Working Group on LGBTIQ Equality (WGLE) held a town hall meeting at the 220th AAS meeting in Anchorage to explore the workplace climate for LGBTIQ individuals working in Astronomy and related fields. Topics of discussion included anti-discrimination practices, general workplace climate, and pay and benefit policies. Four employment sectors were represented: industry, the federal government, private colleges, and public universities. We will summarize and expand on the town hall discussions and findings of the panel members.

  20. Stress within the academic workplace.

    Science.gov (United States)

    Kenner, Carole A; Pressler, Jana L

    2014-01-01

    Many new nursing leaders assuming deanships, assistant deanships, or interim deanships have limited education, experience, or background to prepare them to deal with workplace stress. To assist new deans and those aspiring to be deans, the authors of this department offer survival tips based on their personal experiences and insights. They address common issues such as time management, handling workplace bullying, and negotiating deadlines and assignments. The authors welcome counterpoint discussions with readers.

  1. Workplace analysis and radiation protection

    International Nuclear Information System (INIS)

    This document gathers the slides of the available presentations given during this conference day. Fifteen presentations out of 16 are assembled in the document and deal with: 1 - the evolution of doses received by workers (J. Feuardent); 2 - evaluation of extremities dosimetry among interventional radiology practitioners (L. Donadille); 3 - practical guide for the realisation of workplace dosimetry studies presenting a ionizing radiation exposure risk: and example in nuclear medicine (J.L. Rehel); 4 - workplace studies in radiotherapy-curietherapy (D. Donnarieix); 5 - from dosimetry to physical intensity: the case of heat insulation activities (A. Garrigou and C. Piccadaci); 6 - the consideration of human factor during facility modifications (V. Gauthereau); 7 - how to carry out a workplace analysis in gamma-graphy? (F. Truchi); 8 - workplace studies in the framework of dismantling activities (J. Chardin); 9 - team synergy (F. Debouck); 10 - adaptation of individual dosimetry to the workplace: the case of external exposure (I. Clairand); 11 - technical aspects of the evaluation of ionizing radiations exposure induced by a new interventional radiology procedure (J.C. Amabile); 12 - the point of view of a radioprotection skilled person in a nuclear medicine service (J.M. Vrigneaud); 13 - workplace studies for the unique document (F. Roussille); 14 - occupational exposure to manufactured nano-particles: issues and knowledge status (O. Witschger); 15 - toxicological risk of nano-particles: 'health impact'? (S. Chevillard). (J.S.)

  2. Knowledge Level about HIV/AIDS among Reproductive Men in Five Counties in China

    Institute of Scientific and Technical Information of China (English)

    Jun-qing WU; Bin-yi LIU; Wen-ying LI; Yu-yan LI; Zong-min JIANG

    2007-01-01

    Objective To understand the HIV/IDS knowledge level and its influential factors among reproductive men in China so as to provide scientific evidence for preventive measures.Methods Cross-sectional survey, system random sample and constructed questionnaire were used in this study. There were 1 285 male subjects who had filled in anonymous questionnaires.Results There were significant differences on the HIV/IDS knowledge level in different counties and different demographic characteristic people. Major influential factors included area, urban/rural, marriage, educational level, age, consultation about HIV/AIDS.Conclusion It is necessary to strengthen the training of HIV/AIDS knowledge among reproductive men.

  3. Summarized data to achieve population-wide anonymized wellness measures.

    Science.gov (United States)

    Clarke, Andrew; Steele, Robert

    2012-01-01

    The growth in smartphone market share has seen the increasing emergence of individuals collecting quantitative wellness data. Beyond the potential health benefits for the individual in regards to managing their own health, the data is highly related to preventative and risk factors for a number of lifestyle related diseases. This data has often been a component of public health data collection and epidemiological studies due to its large impact on the health system with chronic and lifestyle diseases increasingly being a major burden for the health service. However, collection of this kind of information from large segments of the community in a usable fashion has not been specifically explored in previous work. In this paper we discuss some of the technologies that increase the ease and capability of gathering quantitative wellness data via smartphones, how specific and detailed this data needs to be for public health use and the challenges of such anonymized data collection for public health. Additionally, we propose a conceptual architecture that includes the necessary components to support this approach to data collection. PMID:23366349

  4. Sister-sister incest: data from an anonymous computerized survey.

    Science.gov (United States)

    Stroebel, Sandra S; O'Keefe, Stephen L; Griffee, Karen; Kuo, Shih-Ya; Beard, Keith W; Kommor, Martin J

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using a computer-assisted self-interview. Thirty-one participants were victims of sister-sister incest, 40 were victims of brother-sister incest, 19 were victims of father-daughter incest, 8 were victims of sexual abuse by an adult female (including one mother), and 232 were victims of sexual abuse by an adult male other than their father before reaching 18 years of age. The rest (1,203) served as controls. The victims of sister-sister incest had significantly more problematic outcomes than controls on many measures as adults. Victims of sister-sister incest were more depressed and more likely than controls to be distant from the perpetrator-sister and to have traded sex for money, experienced an unplanned pregnancy, engaged in four different types of masturbation, and engaged in 13 different same-sex behaviors. Our findings were consistent with other reports of early eroticization and persistent hypereroticization of incest victims.

  5. Summarized data to achieve population-wide anonymized wellness measures.

    Science.gov (United States)

    Clarke, Andrew; Steele, Robert

    2012-01-01

    The growth in smartphone market share has seen the increasing emergence of individuals collecting quantitative wellness data. Beyond the potential health benefits for the individual in regards to managing their own health, the data is highly related to preventative and risk factors for a number of lifestyle related diseases. This data has often been a component of public health data collection and epidemiological studies due to its large impact on the health system with chronic and lifestyle diseases increasingly being a major burden for the health service. However, collection of this kind of information from large segments of the community in a usable fashion has not been specifically explored in previous work. In this paper we discuss some of the technologies that increase the ease and capability of gathering quantitative wellness data via smartphones, how specific and detailed this data needs to be for public health use and the challenges of such anonymized data collection for public health. Additionally, we propose a conceptual architecture that includes the necessary components to support this approach to data collection.

  6. Delineating social network data anonymization via random edge perturbation

    KAUST Repository

    Xue, Mingqiang

    2012-01-01

    Social network data analysis raises concerns about the privacy of related entities or individuals. To address this issue, organizations can publish data after simply replacing the identities of individuals with pseudonyms, leaving the overall structure of the social network unchanged. However, it has been shown that attacks based on structural identification (e.g., a walk-based attack) enable an adversary to re-identify selected individuals in an anonymized network. In this paper we explore the capacity of techniques based on random edge perturbation to thwart such attacks. We theoretically establish that any kind of structural identification attack can effectively be prevented using random edge perturbation and show that, surprisingly, important properties of the whole network, as well as of subgraphs thereof, can be accurately calculated and hence data analysis tasks performed on the perturbed data, given that the legitimate data recipient knows the perturbation probability as well. Yet we also examine ways to enhance the walk-based attack, proposing a variant we call probabilistic attack. Nevertheless, we demonstrate that such probabilistic attacks can also be prevented under sufficient perturbation. Eventually, we conduct a thorough theoretical study of the probability of success of any}structural attack as a function of the perturbation probability. Our analysis provides a powerful tool for delineating the identification risk of perturbed social network data; our extensive experiments with synthetic and real datasets confirm our expectations. © 2012 ACM.

  7. Parameterized Complexity of the k-anonymity Problem

    CERN Document Server

    Bonizzoni, Paola; Dondi, Riccardo; Pirola, Yuri

    2009-01-01

    The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization that has been recently proposed is the $k$-anonymity. This approach requires that the rows of a table are partitioned in clusters of size at least $k$ and that all the rows in a cluster become the same tuple, after the suppression of some entries. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is known to be APX-hard even when the records values are over a binary alphabet and $k=3$, and when the records have length at most 8 and $k=4$ . In this paper we study how the complexity of the problem is influenced by different parameters. In this paper we follow this direction of research, first showing that the problem is W[1]-hard when parameterized by the size of the solution (and the value $k$). Then we exhibit a fixed parameter algorithm, when the problem is parameterized by the size of the alphabet and the number of columns. Finally...

  8. Women and HIV

    Science.gov (United States)

    ... Consumer Information by Audience For Women Women and HIV Share Tweet Linkedin Pin it More sharing options ... HIV? What should pregnant women know about HIV? HIV Quick Facts What is HIV? HIV is the ...

  9. Ombuds’ corner: Workplace incivility

    CERN Multimedia

    Vincent Vuillemin

    2012-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   In 2011, the Canadian HR Reporter published several articles by Sharone Bar-David on workplace incivility (I would encourage you to read them here). These articles can shed some light on an internal issue here at CERN: what happens when there are violations of the Code of Conduct that we may face every day? Such incivilities can fly under the organizational radar and are not up to the level of any administrative or disciplinary action foreseen in the CERN Staff Rules and Regulations. However, if such breaches in respectful behaviour are tolerated continuously and nothing is done about them, they can create a toxic work climate. Furthermore, such a distortion of human relations...

  10. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure. PMID:26267063

  11. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  12. HIV Awareness and Knowledge among Viewers of a Documentary Film about HIV among Racial- or Ethnic-Minority Older Adults.

    Science.gov (United States)

    Ebor, Megan; Murray, Ashley; Gaul, Zaneta; Sutton, Madeline

    2015-08-01

    A documentary film on HIV was developed based on social cognitive theory and entertainment educational methods in an effort to increase awareness and encourage protective behavior change related to HIV among older adults. The documentary includes perspectives from racial- or ethnic-minority older adults who are living with HIV and those of health care providers, and was screened in several venues. Authors of this article conducted thematic content analysis of anonymous, written, open-ended responses from 341 film viewers (clinicians and laypeople) who described what they learned about HIV after viewing the film. Four key themes emerged from the analysis: (1) increased awareness about the epidemiology of HIV among older, minority groups and about sexuality among older people; (2) improved general HIV knowledge, including risk reduction strategies and details about HIV testing; (3) awareness of lack of sexual health education among health care providers, and that a call to action is needed; and (4) awareness that HIV reinfection can occur in certain circumstances with people who are already infected. Findings suggest that an educational documentary can be used to effectively increase awareness and knowledge about the impact of HIV among minority older adults, and may also encourage HIV prevention action steps by providers. PMID:26285361

  13. Workplace Environment towards Emotional Health

    Directory of Open Access Journals (Sweden)

    Zafir Mohd Makhbul

    2013-01-01

    Full Text Available Workplace ergonomics, such as air quality, lighting, furniture and tools, acoustics and building’s general environment, have a significant relationship between worker’s satisfaction and performance. Poor workplace ergonomics or organization comfort level has significant economic implications for the organizations through employee dissatisfaction, lowered productivity and lowered emotional and physical health of the employees. Lower emotional health leads to psychological distress, depression and anxiety, whereas lower physical health leads to heart disease, insomnia, headaches, and infections. A field study of 40 academicians through questionnaire explored selected workplace ergonomics design and their effects on physical and emotional health. Research finding shows that there is a significant relationship between building’s general environment of the organizations and the health complaints from the employees. The findings also confirmed that there is significant relationship between the workplace ergonomics and the health complaints from the employees. This study will support a better evaluation of development policies of workplace ergonomics design by management. In the long term such action taken by management authorities to increase organizations comfort level (air quality, lighting, furniture and tools, acoustics and building’s general environment would produce benefits for the institution in terms of improved physical and emotional health.

  14. Healthcare Workers and Workplace Violence

    Directory of Open Access Journals (Sweden)

    Tevfik Pinar

    2013-06-01

    Full Text Available Workplace violence is a threatening worldwide public health problem. Healthcare workers have under particular risk of workplace violence, and they are being exposed to violence 4-16 times more than other service workers. The frequency of violence in the health sector in the world has indicated in different range of results since there is no consistent definition of workplace violence and differences in research methodology (any type of violence: 22,0% - 60,0%; physical violence: 2,6% - 57,0%; verbal violence: 24,3% - 82,0%; sexual harassment: %1,9 - 10,5%. All healthcare workers have right to work in a safe working place. The safety of healthcare workers should deserve the same priority as patient safety. Various risk factors including social, cultural, environmental, organizational and personal elements play a role in the formation of workplace violence that is very important for our country. Considering all those factors, the workplace violence in health sector should be seriously handled and the strategies and policies must be developed for prevention. [TAF Prev Med Bull 2013; 12(3.000: 315-326

  15. Employee Anonymous Online Dissent: Dynamics and Ethical Challenges for Employees, Targeted Organisations, Online Outlets and Audiences

    DEFF Research Database (Denmark)

    Ravazzani, Silvia; Mazzei, Alessandra

    2015-01-01

    This paper aims to enhance understanding of dissent expressive acts that employees voice via anonymous online public contexts. Based on literature on organisational dissent, anonymity and online disclosure, we first point out key dynamics of employee anonymous online dissent, and then present...... remaining accountable for them and avoiding emotion-focused and defensive disclosure. Targeted organisations need to prevent external disclosure while ensuring freedom of speech and employee privacy, and to respond effectively when overt criticism is found online. Other tensions concern online outlet...

  16. Radon in the workplace

    International Nuclear Information System (INIS)

    This Guide has been prepared for the Health and Safety Executive (HSE) by the Building Research Establishment (BRE). Following the guidance is not compulsory and you are free to take other action. However if you do follow the guidance you will normally be doing enough to comply with the law. Health and Safety Inspectors seek to secure compliance with the law and may refer to this guidance as illustrating good practice. In the past, concern about exposure of employees to radon has largely centred on the mining environment. In recent times, with increased knowledge and mapping of radon levels in homes, attention has increasingly turned to radon exposure in buildings used for work purposes. Now there is a considerable fund of information to show that employees in some buildings can receive very significant radiation doses from radon. Surveys show that levels of radon tend to be higher in buildings with small rooms, such as offices rather than larger factory and warehouse constructions. The particular problem is that the nature of the work process gives no clue as to the radon hazard that may exist, and the employer may be unaware of its presence and how to deal with it. This Guide is aimed principally at employers and those who control buildings used for work purposes, or their representatives. It offers guidance on practical measures for reducing radon levels in workplaces. The guidance should also be of interest and assistance to those, such as surveyors and builders, concerned with specifying and carrying out the necessary remedial measures. Advice is provided for the majority of building types and construction situations likely to be encountered in larger non-domestic buildings. For buildings where construction is similar to that found in dwellings the guidance published by BRE on remedial measures for dwellings should be used. BRE prepared this Guide with assistance from the National Radiological Protection Board (NRPB) and Cornwall County Council under contract

  17. Sex in the Workplace

    Institute of Scientific and Technical Information of China (English)

    村边

    1996-01-01

    读西方出版物上写Sex的文章,我们的心难免会“咯噔”一下。而Sex in the Workplace(工作场合的性)一文却别开生面,值得一读。近年来,工作场合的“性骚扰”(Sexual Harassment)问题的议论也时占我报刊一隅,然比较而言,Sex in the Workplace一文剖精析微、辨证全面,更具警策性。诸如,文章谈及——As a woman, you’re responsible for the signals you send. And when you wear revealing miniskirts, the message men get is ’Look at me.’女性在工作场合着超短裙被认定不宜,本文对男性提出独到的劝言——Just as men often respond intensely to what women wear, women often react strongly to what men say. 在body language(身势语)一节,文章提及女性有25种以上的姿势在男性心目中是provocative(具有挑逗性)的;本文还认为:work intimacy(工作亲密)≠sexual intimacy(性亲密);末尾,本文提出:Before you tell a risque(有伤风化的)joke, ask yourself how your mother or wife might react. If you are wondering whether you should buy an off-color(黄色下流的)card for a male colleague, think about how your father or husband might feel. 这两句议论倒让读者联想到汉语“苦口婆心”之说。 全

  18. HIV Prevention

    Science.gov (United States)

    ... PrEP PEP Living With HIV Opportunistic Infections Travel Abroad Treatment Basic Statistics Get Tested Find an HIV ... kill or neutralize viruses and bacteria. Researchers are studying both vaginal and rectal microbicides to see if ...

  19. Healthy eating strategies in the workplace

    DEFF Research Database (Denmark)

    Quintiliani, Lisa; Poulsen, Signe; Sorensen, Glorian

    2010-01-01

    through research examples. Findings - Through case studies and published research, it is found that workplace dietary interventions are generally effective, especially fruit and vegetable interventions. There is less consistent evidence on the long-term effectiveness of workplace weight management...

  20. Innovation in Australian Workplaces: An Empirical Analysis.

    Science.gov (United States)

    Rogers, Mark

    1999-01-01

    The determinants of innovation were examined using data from 698 Australian workplaces. Results suggest that better employee-management communications are associated with more change and that workplaces with higher levels of training undergo more change. (Author/JOW)

  1. Skin Exposures & Effects in the Workplace

    Science.gov (United States)

    ... message, please visit this page: About CDC.gov . Workplace Safety & Health Topics Skin Exposures and Effects Recommendations ... Pinterest Twitter YouTube NIOSH Homepage NIOSH A-Z Workplace Safety & Health Topics Publications and Products Programs Contact ...

  2. Scabies: Workplace Frequently Asked Questions (FAQs)

    Science.gov (United States)

    ... CDC.gov . Parasites - Scabies Parasites Home Share Compartir Workplace Frequently Asked Questions (FAQs) On This Page If ... local health department. We would like to create workplace guidelines in case an employee is diagnosed with ...

  3. Negotiating leave in the workplace

    DEFF Research Database (Denmark)

    Bloksgaard, Lotte

    In Denmark leave entitlement is not only regulated by law but is also part of the various collective agreements established in the respective occupational sectors and at the local workplace level. Consequently, Danish fathers have very different leave entitlements, depending on the sector, branch...... and workplace in which they are employed. The paper focuses on fathers’ negotiations of parental leave in three large Danish work places, offering men different opportunities for leave. With a focus on the differences in the work place contexts/opportunities for leave, the aim of the paper is firstly to explore...... men’s negotiations of parental leave at work place level and secondly, to explore and discuss how Danish fathers construct leave practices – and individual male identities – in the workplace....

  4. Workplace bullying and sickness presenteeism

    DEFF Research Database (Denmark)

    Conway, Paul Maurice; Clausen, Thomas; Hansen, Åse Marie;

    2016-01-01

    Purpose: The aim of this study is to investigate exposure to workplace bullying as a potential risk factor for sickness presenteeism (SP), i.e., working while ill. Methods: This study is based on data collected through self-reported questionnaires in a 2-year prospective study on employees...... with missing values, the final samples were composed of 2,865 and 1,331participants in the cross-sectional and prospective analyses, respectively. Results: Modified poisson regression analyses showed that frequent (i.e., daily or weekly) exposure to workplace bullying was associated with reporting 8 or more...... indications of a significant relationship between exposure to frequent workplace bullying and SP, although causal connections could not be established. Methodological and theoretical considerations about study findings are provided, which could be of benefit to future studies examining the impact of being...

  5. Workplace Performance, Worker Commitment and Loyalty

    OpenAIRE

    Brown, Sarah; McHardy, Jolian; McNabb, Robert; Taylor, Karl

    2011-01-01

    Using matched employer-employee level data drawn from the 2004 UK Workplace and Employee Relations Survey, we explore the determinants of a measure of worker commitment and loyalty (CLI) and whether CLI influences workplace performance. Factors influencing employee commitment and loyalty include age and gender, whilst workplace level characteristics of importance include human resource practices. With respect to the effects of employee commitment and loyalty upon the workplace, higher CLI is ...

  6. Workplace support for employees with cancer

    OpenAIRE

    Nowrouzi, B.; Lightfoot, N.; Cote, K.; R. Watson

    2009-01-01

    Objective The aim of the present study was to survey human resources personnel about how their northeastern Ontario workplaces assist employees with cancer. Study Design and Setting This cross-sectional study was conducted from December 2007 to April 2008. Surveys were sent to 255 workplaces in northeastern Ontario with 25 or more employees, and 101 workplaces responded (39.6% response rate). Logistic regression modelling was used to identify factors associated with more or less workplace sup...

  7. Workplace monitoring: overview and objectives

    International Nuclear Information System (INIS)

    This work reviews the literature on overview of workplace monitoring and objectives and specifies requirements for the evaluation of equipment and procedures used in workplace monitoring of workers occupationally exposed to radioactive substances. It presents procedures and assumptions for the standardized interpretation of monitoring data, in order to achieve acceptable levels of reliability. The procedures allow the quantification of exposures for the documentation of compliance with regulations and radiation protection programmes. Performance characteristics of some selected instruments for ambient dose rate and contamination assessment have been presented. (author)

  8. Security analysis and improvement of an anonymous authentication scheme for roaming services.

    Science.gov (United States)

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330

  9. Atomic and anonymous e-Cash transaction protocol with off-line TTP

    Institute of Scientific and Technical Information of China (English)

    王茜; 李朝阳; 杨德礼

    2004-01-01

    Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants' interests. But there are conflicts between these two properties. In this paper, an atomic and anonymous e-Cash transaction protocol with off-line TTP (Trust Third Party) based on the extended CEMBS is presented. The novel protocol is analyzed for its atomicity and anonymity. The results of the analysis show that it not only provides atomicity and anonymity under unreliable communication and dishonest partici-pants, but also features high efficiency and practicability. The new protocol also avoids transaction from a am-biguous state. Furthermore, it will be referenced often for the application of the atomic e-Cash transaction proto-col.

  10. The Role of the Anonymous Voice in Post-Publication Peer Review Versus Traditional Peer Review

    Directory of Open Access Journals (Sweden)

    Jaime A. Teixeira da Silva

    2015-12-01

    Full Text Available Traditional peer review (TPR has several limitations and weaknesses. Post-publication peer review is one practical way to repair the ills of TPR and reinforce it. A literature that is marked by errors is unhealthy and should, if given the opportunity, be corrected or further improved. The anonymous voice is one source of critique and differs from the blind peer review in TPR in which the reviewer remains anonymous to the authors and/or vice versa, but the identity is known to the editor. If unregulated, the anonymous voice can pose a threat to established editorial norms in TPR, to one of the most important criteria of science publishing, i.e., transparency, and to worthwhile discussion. Yet, if the anonymous voice is not heard, then a vast and potentially valuable pool of untapped opinions may be lost, opinions that may provide valuable solutions to improving TPR.

  11. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  12. Workplace Learning of High Performance Sports Coaches

    Science.gov (United States)

    Rynne, Steven B.; Mallett, Clifford J.; Tinning, Richard

    2010-01-01

    The Australian coaching workplace (to be referred to as the State Institute of Sport; SIS) under consideration in this study employs significant numbers of full-time performance sport coaches and can be accurately characterized as a genuine workplace. Through a consideration of the interaction between what the workplace (SIS) affords the…

  13. Mobbing: Workplace Violence in the Academy

    Science.gov (United States)

    Keim, Jeanmarie; McDermott, J. Cynthia

    2010-01-01

    Incidents of workplace violence are becoming all too common at colleges and universities. Generally, one thinks of shootings and assaults in relation to campus workplace violence. However, mobbing and bullying of faculty by other faculty are types of workplace violence that, while very common, are rarely discussed or reported. This article raises…

  14. Gratitude in Workplace Research: A Rossian Approach

    Science.gov (United States)

    Gibbs, Paul

    2009-01-01

    Workplace learning is complex in form. It is explorative, social and creative enquiry, and because it is carried out in the socio-political domain of the workplace, it is potentially exploitative of all who contribute. This paper suggests that the workplace researcher might conceptualise the contributions of participants as benefits and/or gifts,…

  15. Research on Inequalities Exists in the Workplace

    Institute of Scientific and Technical Information of China (English)

    布乃鹏; 樊晶晶; 刘淑华

    2013-01-01

    The is ue of inequalities exists in the workplace has been widely debated in our community recently. And then this essay wil argue inequalities exist in the workplace, in terms of ethnic, gender, and disability. This es ay would of er four perspectives about the view inequalities exist in the workplace and discuss the response from the state, employers and unions.

  16. Firefighter Workplace Learning: An Exploratory Case Study

    Science.gov (United States)

    Tracey, Edward A.

    2014-01-01

    Despite there being a significant amount of research investigating workplace learning, research exploring firefighter workplace learning is almost nonexistent. The purpose of this qualitative multi-case study was to explore how firefighters conceptualize, report, and practice workplace learning. The researcher also investigated how firefighters…

  17. Workplace Learning in Malaysia: The Learner's Perspective

    Science.gov (United States)

    Muhamad, Mazanah; Idris, Khairuddin

    2005-01-01

    This paper offers a scenario of workplace learning as practiced in Malaysia. Based on survey research, the article describes learner profiles, learning provision and pattern. The analysis shows that Malaysians participate in formal workplace learning as part of their employment activities. Workplace learning in Malaysia is contextual, promoted by…

  18. Cognitive factors associated with the willingness for HIV testing among pregnant women in China

    Institute of Scientific and Technical Information of China (English)

    Li Chunrong; Yang Liu; Kong Jinwang

    2014-01-01

    Background The spread of human immunodeficiency virus/acquired immunodeficiency syndrome (HIV/AIDS) epidemic in the worldwide trend is not contained effectively.The pregnant women infected HIV seriously in the high HIV epidemic areas in China.The transmission of HIV to child may be cut off if HIV positive mother was found early by HIV testing.Pregnant women mandatorily received the HIV counseling and testing services.Most of them did not know the knowledge about HIV prevention and were not willing to receive HIV testing actively.Willingness for HIV testing among pregnant women was investigated,which can help to promote them to take up HIV testing actively.This study assessed the prevalence of the willingness for HIV testing and cognitive factors associated with it.Methods A cross-sectional survey was conducted to 500 pregnant women via face-to-face interviews with anonymous structured questionnaire guided by the Health Belief Model (HBM).Results The prevalence of the willingness for HIV testing was 58.60%.Perceived higher susceptibility to HIV (multivariateadjusted odds ratio (ORm)=2.02,95% confidence interval (CI):1.40-5.06),more knowledge for HIV (ORm=1.92,95% CI:1.11-3.87) and perceived less social stigma (ORm=0.80,95% CI:0.34-0.91) were associated with higher willingness for HIV testing among pregnant women.Conclusion To prevent HIV mother to children transmission,it is necessary to enhance knowledge for HIV,change cognitive factors and increase willingness for HIV testing among pregnant women.

  19. Health challenges in South African automotive companies: Wellness in the workplace

    Directory of Open Access Journals (Sweden)

    Anna Meyer-Weitz

    2015-03-01

    Full Text Available Orientation: In South Africa, workplace programmes in the automotive industry focus predominantly on occupational health and safety and HIV and AIDS. The implementation of focused workplace interventions might be hampered when companies are not convinced that the condition (i.e. HIV and AIDS is the main negative health influencing factor responsible for increased production costs.Research purpose: The study investigated the health influencing conditions perceived to negatively impact company production costs and related interventions.Motivation for the study: Apart from HIV and AIDS, little information is available about the health challenges in the South African workplace and focused HIV and AIDS programmes might only partly respond to the key health challenges of workplaces. The inter-relatedness of various risky lifestyle factors linked to health conditions necessitates a comprehensive health promotion approach.Research approach, design and method: A cross-sectional survey was conducted amongst 74 companies selected through stratified random sampling. Non-parametric tests were conducted to investigate the health influencing factors perceived to impact production costs, the monitoring thereof, extent of containment and the implementation of interventions in terms of company size and ownership.Main findings: The health factors perceived to have a moderate to large impact were HIV and AIDS, smoking, alcohol use, stress, back and neck ache and tuberculosis, also reported to be better monitored and managed by medium and large organisations. Small organisations reported a smaller impact, fewer efforts and less success. HIV and AIDS programmes were more evident in large companies and those with wellness programmes (52%. Workplace programmes enabled better monitoring and managing of impacting health conditions. Smaller organisations were not convinced of the benefits of interventions in addressing health challenges.Practical/managerial implications

  20. [Quality of anonymous delivery procedures: analysis of practices and ethical issues.

    OpenAIRE

    Fassy-Colcombet, Marion; Tsatsaris, Vassilis; Moutel, Grégoire; Cabrol, Dominique; Hervé, Christian

    2006-01-01

    OBJECTIVES: The purpose of this study was to assess implementation of procedures for anonymous delivery and also to determine the awareness of the medical team. MATERIAL: and method. We reviewed retrospectively all deliveries performed in a Paris maternity ward during the years 2000-2003 where the mother requested application of the anonymous procedure. A questionnaire was also addressed to all physicians and midwives in the same institution in order to evaluate their knowledge of the procedu...

  1. Mesh Technique for Nymble Architecture Sustaining - Secrecy and Security in Anonymizing Networks

    OpenAIRE

    J.Praveen Kumar; B Shyam Kumar

    2013-01-01

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks, however, hasbeen limited by users employing this secrecy for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing ne...

  2. PHENOMENAL EXPLORATION INTO IMPACT OF ANONYMITY ON LAW AND ORDER IN CYBERSPACE

    OpenAIRE

    Li, Xingan

    2015-01-01

    While information systems provide modern society with great convenience, it also poses new problems in maintaining social order. One of its negative influences is the anonymity of cyberspace, which makes identity tracing a noteworthy predicament which poses obstacles in detection and investigations. It has been found that cyber anonymity has critical impacts on criminal motivation, and the phenomena of victimization, and should be tackled on different layers including technology and law enfor...

  3. The Impact of anonymity in elicitation of brand associations : theoretical and empirical developments

    OpenAIRE

    Supphellen, Magne

    1998-01-01

    Effective brand management requires a thorough understanding of the consumer. In particular, managers need to know which associations consumers have for their brands. In this study, we address the role of anonymity in interviews designed to elicit brand associations from consumers' memories. First, the concept of anonymity is examined in order to arrive at a useful definition. Based on a review ofpotential psychological motives for response distortion and a review of the nature...

  4. 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community

    OpenAIRE

    Bernstein, Michael; Monroy-Hernández, Andrés; Harry, Drew; André, Paul; Panovich, Katrina; Vargas, Greg

    2011-01-01

    We present two studies of online ephemerality and anonymity based on the popular discussion board /b/ at 4chan.org: a website with over 7 million users that plays an influential role in Internet culture. Although researchers and practitioners often assume that user identity and data permanence are central tools in the design of online communities, we explore how /b/ succeeds despite being almost entirely anonymous and extremely ephemeral. We begin by describing /b/ and performing a content an...

  5. A secure and effective anonymous authentication scheme for roaming service in global mobility networks

    OpenAIRE

    Dawei ZHAO; Peng, Haipeng; Li, Lixiang; Yang, Yixian

    2013-01-01

    Recently, Mun et al. analyzed Wu et al.'s authentication scheme and proposed a enhanced anonymous authentication scheme for roaming service in global mobility networks. However, through careful analysis, we find that Mun et al.'s scheme is vulnerable to impersonation attacks, off-line password guessing attacks and insider attacks, and cannot provide user friendliness, user's anonymity, proper mutual authentication and local verification. To remedy these weaknesses, in this paper we propose a ...

  6. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    Directory of Open Access Journals (Sweden)

    Tomas A. Lipinski

    2002-01-01

    Full Text Available This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has altered the traditional legal paradigm of responsibility and as a result creates potential problems for the future of anonymous speech on the Internet.  As a result plaintiffs are no longer pursuing litigation against service providers but taking their dispute directly to the anonymous speaker. Second, several cases have arisen in the United States where plaintiffs have requested that the identity of an anonymous Internet speaker be revealed.  These cases are surveyed.  Third, the cases are analyzed in order to determine the factors that courts require to be present before the identity of an anonymous speaker will be revealed.  The release is typically accomplished by the enforcement of a discovery subpoena instigated by the party seeking the identity of the anonymous speaker. The factors courts have used are as follows: jurisdiction, good faith (both internal and external, necessity (basic and sometimes absolute, and at times proprietary interest. Finally, these factors are applied in three scenarios--e-commerce, education, and employment--to guide institutions when adopting policies that regulate when the identity of an anonymous speaker--a customer, a student or an employee--would be released as part of an internal initiative, but would nonetheless be consistent with developing legal standards.

  7. Verbal Venting in the Social Web: Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments

    Directory of Open Access Journals (Sweden)

    Leonie Rösner

    2016-08-01

    Full Text Available Scholars often blame the occurrence of aggressive behavior in online discussions on the anonymity of the Internet; however, even on today’s less anonymous platforms, such as social networking sites, users write plenty of aggressive comments, which can elicit a whole wave of negative remarks. Drawing on the social identity and deindividuation effects (SIDE model, this research conducts a laboratory experiment with a 2 (anonymity vs. no anonymity × 2 (aggressive norm vs. non-aggressive norm between-subjects design in order to disentangle the effects of anonymity, social group norms, and their interactions on aggressive language use in online comments. Results reveal that participants used more aggressive expressions in their comments when peer comments on a blog included aggressive wording (i.e., the social group norm was aggressive. Anonymity had no direct effect; however, we found a tendency that users’ conformity to an aggressive social norm of commenting is stronger in an anonymous environment.

  8. Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge

    CERN Document Server

    Narayanan, Arvind; Rubinstein, Benjamin I P

    2011-01-01

    This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on real-world link prediction, and the dataset was a graph obtained by crawling the popular Flickr social photo sharing website, with user identities scrubbed. By de-anonymizing much of the competition test set using our own Flickr crawl, we were able to effectively game the competition. Our attack represents a new application of de-anonymization to gaming machine learning contests, suggesting changes in how future competitions should be run. We introduce a new simulated annealing-based weighted graph matching algorithm for the seeding step of de-anonymization. We also show how to combine de-anonymization with link prediction---the latter is required to achieve good performance on the portion of the test set not de-anonymized---for example by training the predictor on the de-anonymized portion of the test set, and combining probabilistic predictions from de-anony...

  9. Serbs in the poetry of Theodore Prodromos and anonymous Manganeios

    Directory of Open Access Journals (Sweden)

    Stanković Vlada

    2006-01-01

    Full Text Available Numerous rhetorical writings of the Comnenian period constitute a fruitful field of research, both with respect to historical data, i.e. hard historical facts hidden, though still recognizable, behind the peculiar and somewhat abstract mode of expression of the authors of the twelfth century, and with regard to the poetics of the literary works themselves, i.e. the internal elements characteristic not only for the genre chosen, but also for each particular author. A comparative, historical and literary approach to these works renders their sense clearer and their complex allusions more readily understood. This is a matter of some importance, since allusions constitute one of the basic elements of historical rhetoric, which reached its peak at the time of Emperor Manuel Komnenos (1143-1180, especially during the first half of his reign, i.e. till the end of the fifties of the twelfth century. The poetry of Theodore Prodromes and of the somewhat younger Anonymous ('Prodromos' Manganeios is an excellent example of this intertwining of historical and literary elements, i.e. of the presentation of historical data through rhetorical patterns. One has to concentrate on individual works attempting to determine, as far as possible, the date of composition, the circumstances of writing and the purpose of a particular poem, the occasion for which it was written and the character of the expected audience, in order to better understand both the poetry written by these two rhetoricians and the individual features of the authors, as well as their respective positions in the circle around Emperor Manuel Komnenos. The poems dealt with in the present paper stand out for calling the Serbs by their real name. This naming practice was invariably employed by both rhetoricians in cases when new achievements of the basileus were to be announced and proclaimed immediately after the event, on the occasions of first reports, first celebrations of the new victories and

  10. Diversity in the Workplace. Symposium.

    Science.gov (United States)

    2002

    Three papers comprise this symposium on diversity in the workplace. "Factors That Assist and Barriers That Hinder the Success of Diversity Initiatives in Multinational Corporations" (Rose Mary Wentling) reports that factors that assisted in the success were classified under diversity department, human, and work environment; barriers were those of…

  11. Internet Gambling in the Workplace

    Science.gov (United States)

    Griffiths, Mark

    2009-01-01

    Purpose: This paper seeks to overview the issues, concerns and challenges relating to gambling--and more specifically internet gambling--in the workplace. Design/methodology/approach: Using psychological literature, this paper outlines a number of important and inter-related areas including brief overviews of gambling and problem gambling,…

  12. Evaluating Workplace English Language Programs

    Science.gov (United States)

    Ekkens, Kristin; Winke, Paula

    2009-01-01

    Companies across the United States provide workplace English classes to non-native-English-speaking employees to increase productivity, retention, and on-the-job safety. Institutions that financially support the programs often require evidence of learning through standardized tests as a prerequisite for continued funding. However, the tests…

  13. Enochs of the modern workplace

    DEFF Research Database (Denmark)

    Campbell, Robert H.; Grimshaw, Mark

    2015-01-01

    Users often resist information system implementations and it has been established that this can cause an implementation to fail. In this paper, the behaviours through which end users commonly obstruct information system implementations in their workplace are exposed. Interviews with information...

  14. Th economics of workplace charging

    DEFF Research Database (Denmark)

    Fetene, Gebeyehu Manie; Hirte, Georg; Kaplan, Sigal;

    2016-01-01

    To overcome the range-anxiety problem and further shortcomings associated with electric vehicles, workplace charging (WPC) is gaining increasing attention. We propose a microeconomic model of WPC and use the approach to shed light on the incentives and barriers employees and employers face when...

  15. Workplace Readiness for Communicating Diversity.

    Science.gov (United States)

    Muir, Clive

    1996-01-01

    Proposes a model for communicating change about diversity using a workplace-readiness approach. Discusses ways organizational change agents can assess the company's current interpersonal and social dynamics, use appropriate influence strategies, and create effective messages that will appeal to employees and help to achieve the desired acceptance…

  16. Information Literacy in the Workplace

    Science.gov (United States)

    Kirton, Jennifer; Barham, Lyn

    2005-01-01

    Information literacy has been a subject of interest for academic librarians for nearly thirty years, however special librarians have written comparatively little on the topic of information literacy in the workplace. It is an important issue as it provides an opportunity for special librarians to enhance their role in their organisation. This…

  17. Interpersonal Relationships in the Workplace.

    Science.gov (United States)

    Danner, Jean Ortowski; And Others

    This curriculum guide on interpersonal relations in the workplace give techniques for instructors to use in evaluating these skills in their students. Eighteen competencies are included in this guide: adaptability; attendance; attitude; communication (nonverbal); communication (verbal); communication (written); confidence; cooperation; enthusiasm;…

  18. Workplace Education: The Changing Landscape.

    Science.gov (United States)

    Taylor, Maurice C., Ed.

    The 23 chapters of this book are as follows: "A Framework for Developing Partnerships" (Wendy M. Doughty); "Partnership Building in Nova Scotia" (Marjorie Davison, Paul Temple); "What Makes a Successful Workplace Education Partnership?" (Rob Despins et al.); "Building Linkages in Large Organizations: The Syncrude Canada Ltd. Experience" (Lloyd…

  19. Workshop III: Improving the Workplace Environment

    Science.gov (United States)

    Gledhill, Igle; Butcher, Gillian

    2015-12-01

    Research has shown that companies with more diversity and a better workplace perform better. So what makes a good workplace in physics, where women and men can work to their full potential? In the Improving the Workplace Environment workshop of the 5th IUPAP International Conference on Women in Physics, participants heard about initiatives taking place in Canada, the UK, Japan, and India to improve the workplace environment and shared good practices from around the world. Some of the less tangible aspects of the workplace environment, such as unconscious bias and accumulation of advantage and disadvantage, were explored.

  20. HIV Treatment: The Basics

    Science.gov (United States)

    HIV Treatment HIV Treatment: The Basics (Last updated 3/1/2016; last reviewed 3/1/2016) Key Points Antiretroviral therapy (ART) ... reduces the risk of HIV transmission . How do HIV medicines work? HIV attacks and destroys the infection- ...

  1. Workplace bullying: an emergent issue.

    Science.gov (United States)

    Essen, S Donovan; Esquivel, Cynthia; Jha, Pankaj

    2014-09-01

    All companies, including dentists, rely on their staff to represent their firms in the most positive and effective manner. Today's managers face a multitude of issues, and as such, they must walk a fine line of fostering a productive, harmonious and safe working environment for their employees. Over the last several decades it is apparent that on the- job sexual harassment is no longer the leading issue of employee complaints. Rather, the organization issue which was investigated is workplace bullying, also commonly referred to as employee harassment. Risk management is no longer limited to avoiding malpractice issues but also preventing litigation created by poor organizational behavior. The primary purpose of this paper is to explore the background of workplace bullying and how it affects today's managers and their employees, customers and suppliers. In other words, the scope of this paper will feature research on past studies, results and conclusions. Since workplace bullying affects all levels of a corporation, it must be stated that the concern and focus of this paper is for today's manager to understand the background and history of workplace bullying, and what they can do to foster a safe working environment and prevent the bully from creating mental and physical harm to their employees. This paper details the history of workplace bullying and how management, employees and suppliers deal with and address the issue. Lastly, this treatise looks at risk management from a manger/dentist's perspective, the assessment/conclusion summarizes the implications for managers regarding how they must handle the issue or risk harm to the employee and/or serious legal ramifications. PMID:25284567

  2. Understanding Patients’ Perspectives on Opt-Out, Incentivized, and Mandatory HIV Testing

    Science.gov (United States)

    Noland, Carey M; Vaughn, Nicole A; Sun, Sirena; Schlecht, Hans P

    2015-01-01

    Background Currently, widespread HIV testing is the best preventive action against further spread of the HIV epidemic. However, over 40% of the U.S. population has never been tested for HIV and 25% of those with HIV have never been tested. To increase testing rates, in 2006 the CDC advised healthcare settings to conduct testing on an opt-out basis. Methods Qualitative, semi-structured interviews with ten seropositive patients and ten seronegative were conducted to address the lack of studies investigating patients’ acceptance of and attitude towards this and more novel testing models, e.g. incentivized or anonymous mandatory testing. Participants were asked about their HIV testing history and attitudes towards opt-out, incentivized, and mandatory anonymous HIV testing. Results Major themes were identified using grounded theory data analysis. All participants were receptive to opt-out testing, and saw the removal of separate written consent as beneficial as long as patients were given the opportunity to consent in some form. Conclusion Ultimately, both mandatory and opt-out testing were equally indicated by participants as being the most effective testing model at increasing testing rates. A firm understanding of patients’ perspectives allows for development of effective HIV testing initiatives that are patient-sensitive and can substantially reduce HIV infection rates. PMID:26609294

  3. HIV/AIDS-related Discrimination in Shanxi Rural Areas of China

    Institute of Scientific and Technical Information of China (English)

    YI YANG; KONG-LAI ZHANG

    2004-01-01

    In order to explore the features of discrimination against people with HIV/AIDS in rural areas, a community-based intervention was carried out in two pilot communities of X County of Shanxi Province from September 2002 to October 2003. Methods Data were collected using qualitative methods (in-depth interview and focus group discussion) and anonymously structured questionnaires. Results (1) Severe discrimination against people infected with HIV/AIDS was revealed in the target communities. However, the response to HIV/AIDS was different in each community. (2) People were reluctant to disclose their HIV status or get tested for HIV, which endangered their sexual partners to contract HIV through unprotected sexual intercourses. (3) Attitudes towards people infected with HIV/AIDS varied. (4) Public education promoted a better understanding of HIV/AIDS which in turn improved community attitudes and behaviors towards people with HIV/AIDS. Conclusion HIV/AIDS-related discrimination undermines both individuals' and communities' responses to HIV/AIDS and may be a serious obstacle towards effective HIV/AIDS prevention and control.

  4. HIV Prevention

    Centers for Disease Control (CDC) Podcasts

    2012-02-01

    Dr. Kevin Fenton, Director of CDC’s National Center for HIV/AIDS, Viral Hepatitis, STD, and TB Prevention, talks about steps people can take to protect their health from HIV.  Created: 2/1/2012 by National Center for HIV/AIDS, Viral Hepatitis, STD, and TB Prevention (NCHHSTP).   Date Released: 2/1/2012.

  5. High uptake of HIV testing in pregnant women in Ontario, Canada.

    Directory of Open Access Journals (Sweden)

    Robert S Remis

    Full Text Available In 1999, Ontario implemented a policy to offer HIV counseling and testing to all pregnant women and undertook measures to increase HIV testing. We evaluated the effectiveness of the new policy by examining HIV test uptake, the number of HIV-infected women identified and, in 2002, the HIV rate in women not tested during prenatal care. We analyzed test uptake among women receiving prenatal care from 1999 to 2010. We examined HIV test uptake and HIV rate by year, age and health region. In an anonymous, unlinked study, we determined the HIV rate in pregnant women not tested. Prenatal HIV test uptake in Ontario increased dramatically, from 33% in the first quarter of 1999 to 96% in 2010. Test uptake was highest in younger women but increased in all age groups. All health regions improved and experienced similar test uptake in recent years. The HIV rate among pregnant women tested in 2010 was 0.13/1,000; in Toronto, the rate was 0.28 per 1,000. In the 2002 unlinked study, the HIV rate was 0.62/1,000 among women not tested in pregnancy compared to 0.31/1,000 among tested women. HIV incidence among women who tested more than once was 0.05/1,000 person-years. In response to the new policy in Ontario, prenatal HIV testing uptake improved dramatically among women in all age groups and health regions. A reminder to physicians who had not ordered a prenatal HIV test appeared to be very effective. In 2002, the HIV rate in women who were not tested was twice that of tested women: though 77% of pregnant women had been tested, only 63% of HIV-infected women were tested. HIV testing uptake was estimated at 98% in 2010.

  6. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  7. An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products

    Science.gov (United States)

    Zhang, Zhen; Kim, K. H. (Kane); Kang, Myeong-Ho; Zhou, Tianran; Chung, Byung-Ho; Kim, Shin-Hyo; Lee, Seok-Joon

    The rapid growing of online purchasing of information products poses challenges of how to preserve the customer's privacy during the online transactions. The current widely used way of online shopping does not consider the customer's privacy protection. It exposes the customer's sensitive information unnecessarily. We propose a new five-party implementation model called 5PAPS that provides much enhanced protection of the customer's privacy. The model combines the advantages of the e-cash techniques, the mix technique, the anonymous-honoring merchant model, and the anonymity-protecting payment gateway model. It is aimed for protecting the customer's anonymity in all applicable aspects. Security and anonymity issues of the model have been analyzed. The results show that the model is robust against varieties of common attacks and the customer's anonymity can be protected even in the presence of some collusion among the parties involved in the transactions. Experimental prototyping of the essential parts yields partial validation of the practical nature of the 5PAPS model, and it has also produced reliable estimates of the storage and messaging volume requirements present in sizable purchasing systems.

  8. 可追踪的匿名证书%The Traceable Anonymous Certificate

    Institute of Scientific and Technical Information of China (English)

    王兵

    2014-01-01

    This paper introduces the traceable anonymous certificate, and analyzes the proposed traceable anonymous certificate is⁃suing and tracing protocol in detail, the traceable anonymous certificate should possess two core characteristics: anonymity and non-repudiation, the two features ensure that users can prove the identity himself but without revealing his true identity, this certificate can be used to provide anonymous service in network application.%该文介绍了可追踪匿名证书,并对提出的可追踪匿名证书的发布和追踪协议进行了详细的分析,可追踪匿名证书应该具有匿名性和不可否认性两个核心特点,这两个特点保证了用户可以在不泄露自己的真实身份的情况下来证明用户的身份,这样的证书可以被用于需要提供匿名服务的网络应用中。

  9. AIDS Impact special issue 2009: Mirror, Mirror on the Wall: The Face of HIV+ Women in Europe Today

    OpenAIRE

    Nöstlinger, Christiana Maria; Nideröst, Sibylle; Woo, Rebecca; Loos, Jasna; Platteau, Tom; Colebunders, Robert

    2010-01-01

    Abstract Sexual and reproductive health (SRH) and rights are important components of quality of life. This cross-sectional study describes HIV positive women?s SRH aspirations and needs and the predictive value of selected SRH factors on condom use with steady sexual partners. Data were collected in a European multi-centre study in 17 HIV centres in 14 European countries by a standardized anonymous self-administered questionnaire. Descriptive statistics and hierarchical regression ...

  10. A Men's Workplace Health Intervention

    Science.gov (United States)

    Johnson, Steven T.; Stolp, Sean; Seaton, Cherisse; Sharp, Paul; Caperchione, Cristina M.; Bottorff, Joan L.; Oliffe, John L.; Jones-Bricker, Margaret; Lamont, Sonia; Medhurst, Kerensa; Errey, Sally; Healy, Theresa

    2016-01-01

    Objective: To explore physical activity and eating behaviors among men following the implementation of a gender-sensitive, workplace health promotion program. Methods: Using a pre-post within-subjects design, computer-assisted telephone interviewing (CATI) was used to collect health-related information along with physical activity and fruit/vegetable intake at baseline and after 6 months. Results: At baseline, participants (N = 139) consumed 3.58 servings of fruit and vegetables/day and engaged in an average of 229.77 min/week moderate-vigorous physical activity (MVPA). At 6 months, daily fruit/vegetable intake did not increase, whereas MVPA increased by 112.3 min/week. Conclusions: The POWERPLAY program successfully increased weekly MVPA. Engaging men in health promotion can be a challenge; here, the workplace served as a valuable environment for achieving positive change. PMID:27281710

  11. Health correlates of workplace bullying

    DEFF Research Database (Denmark)

    Bonde, Jens Peter; Gullander, Maria; Hansen, Åse Marie;

    2016-01-01

    OBJECTIVE: This study aimed to examine the course of workplace bullying and health correlates among Danish employees across a four-year period. METHODS: In total, 7502 public service and private sector employees participated in a 3-wave study from 2006 through 2011. Workplace bullying over the past......-labelled bullying at baseline using logistic regression. RESULTS: Reports of bullying were persistent across four years in 22.2% (57/257) of employees who initially reported bullying. Baseline associations between self-labelled bullying and sick-listing, poor self-rated health, poor sleep, and depressive symptoms...... were significant with adjusted odds ratios (OR) ranging from 1.8 [95% confidence interval (95% CI) 1.5-2.4] for poor sleep quality among those bullied "now and then" to 6.9 (95% CI 3.9-12.3) for depression among those reporting being bullied on a daily to monthly basis. In longitudinal analyses...

  12. Workplace bullying and sleep difficulties

    DEFF Research Database (Denmark)

    Hansen, Åse Marie; Hogh, Annie; Garde, Anne Helene;

    2014-01-01

    PURPOSE: The aims of the present study were to investigate whether being subjected to bullying and witnessing bullying at the workplace was associated with concurrent sleep difficulties, whether frequently bullied/witnesses have more sleep difficulties than occasionally bullied....../witnesses, and whether there were associations between being subjected to bullying or witnessing bullying at the workplace and subsequent sleep difficulties. METHODS: A total of 3,382 respondents (67 % women and 33 % men) completed a baseline questionnaire about their psychosocial work environment and health....... The overall response rate was 46 %. At follow-up 2 years later, 1671 of those responded to a second questionnaire (49 % of the 3,382 respondents at baseline). Sleep difficulties were measured in terms of disturbed sleep, awakening problems, and poor quality of sleep. RESULTS: Bullied persons and witnesses...

  13. Condom negotiation, HIV testing, and HIV risks among women from alcohol serving venues in Cape Town, South Africa.

    Directory of Open Access Journals (Sweden)

    Eileen V Pitpitan

    Full Text Available BACKGROUND: Women in South Africa are at particularly high-risk for HIV infection and are dependent on their male partners' use of condoms for sexual risk reduction. However, many women are afraid to discuss condoms with male partners, placing them at higher risk of HIV infection. PURPOSE: To examine the association between fear of condom negotiation with HIV testing and transmission risk behaviors, including alcohol use and sexual risks among South African women. METHOD: Women (N = 1333 residing in a primarily Xhosa-speaking African township in Cape Town and attending informal alcohol-serving venues (shebeens completed anonymous surveys. Logistic regression was used to test the hypothesis that fear of condom negotiation would be associated with increased risk for HIV. RESULTS: Compared to women who did not fear condom negotiation, those who did were significantly less likely to have been tested for HIV, were more likely to have experienced relationship abuse, and to report more alcohol use and more unprotected sex. CONCLUSIONS: For women in South Africa, fear of condom negotiation is related to higher risk of HIV. HIV prevention efforts, including targeted HIV counseling and testing, must directly address gender issues.

  14. Workplace Devaluation: Learning from Experience

    OpenAIRE

    Klunk, Clare Dvoranchik

    1999-01-01

    Many successful professionals, recognized for their experience, knowledge, competence and commitment to their field, experience a contradiction when they realize that their contributions are no longer valued by decision-makers in their organizations. Professionals, regardless of gender, position, education, race or profession, who experience workplace devaluation agree that this experience devalues their contributions and demeans their sense of self. This study illuminates the professio...

  15. MOBBING: HARASSMENT IN THE WORKPLACE

    OpenAIRE

    Bulut, Sefa; Göktürk, Gamze Yeşim

    2012-01-01

    Mobbing (Harassment in the Workplace) is considered as a psychological terror by colleagues or superiors to indivudals in a sistematic and repeated manners. This process starts with disrecpectful behaviors and the victim becomes the target of harmful actions and to be attacked by the other employers or supervisors. Eventhough mobbing is a common phenomenon in all over the world, frequency in our country has been reported higher than European countries. Therefore; in the present study a ...

  16. Peer Effects in the Workplace

    OpenAIRE

    Cornelissen, Thomas; Dustmann, Christian; Schönberg, Uta

    2013-01-01

    Existing evidence on peer effects in a work environment stems from either laboratory experiments or from real-word studies referring to a specific firm or specific occupation. Yet, it is unclear to what extent these findings apply to the labor market in general. In this paper, therefore, we investigate peer effects in the workplace for a representative set of workers, firms, and occupations with a focus on peer effects in wages rather than productivity. Our estimation strategy – which links t...

  17. Developing a healthy OR workplace.

    Science.gov (United States)

    Parsons, Mickey L; Newcomb, Marie

    2007-06-01

    Innovation is required to develop a positive work environment in the OR. Components of a healthy or workplace identified by staff members of three surgical departments are quality practice standards, excellence in patient care systems, a functional physical environment, effective staff systems, meaningful role definition and clarity, and identified guidelines for teamwork. In one or, staff members working on a communication team developed and implemented an action plan to enhance respect in the OR setting. PMID:17560859

  18. Impact of Anonymity on Information Sharing through Internal Psychological Processes: A Case of South Korean Online Communities

    OpenAIRE

    Ho Lee; Jaewon Choi; Kyung Kyu Kim; Ae Ri Lee

    2014-01-01

    Many web users post their opinions and information without revealing their identities (i.e., demographics, social standing, and/or expertise); anonymity has become a common form of information exchange in online communities such as social media sites and Internet forums. In the meantime, negative social consequences have resulted from anonymous activities in online communities. Existing literature reports largely mixed results about the impact of online anonymity on online community outcomes....

  19. Nurses′ workplace stressors and coping strategies

    Directory of Open Access Journals (Sweden)

    Vickie A Lambert

    2008-01-01

    Full Text Available Prior research has suggested that nurses, regardless of workplace or culture, are confronted with a variety of stressors. As the worldwide nursing shortage increases, the aged population becomes larger, there is an increase in the incidence of chronic illnesses and technology continues to advance, nurses continually will be faced with numerous workplace stressors. Thus, nurses, especially palliative care nurses, need to learn how to identify their workplace stressors and to cope effectively with these stressors to attain and maintain both their physical and mental health. This article describes workplace stressors and coping strategies, compares and contrasts cross-cultural literature on nurses′ workplace stressors and coping strategies, and delineates a variety of stress management activities that could prove helpful for contending with stressors in the workplace.

  20. Motivation in a multigenerational radiologic science workplace.

    Science.gov (United States)

    Kalar, Traci

    2008-01-01

    For the first time in history, radiologic science (RS) workplaces consist of 4 generational cohorts. As each cohort possess their own attitudes, values, work habits, and expectations, motivating a generational diverse workplace is challenging. Through the understanding of generational differences, managers are better able to accommodate individual as well as generational needs and help create a more productive and higher performing workplace. The purpose of this paper is to assist managers in the understanding and utilization of generational differences to effectively motivate staff in an RS workplace. Generational cohorts will be defined and discussed along with an in-depth discussion on each of the generations performing in today's RS workplace. Motivators and how they impact the different generational cohorts will be addressed along with how to best motivate a multigenerational RS workplace. PMID:18714760

  1. RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks

    Science.gov (United States)

    Wei, Yu-Chih; Chen, Yi-Ming; Shan, Hwai-Ling

    In Vehicular Networks, for enhancing driving safety as well as supporting other applications, vehicles periodically broadcast safety messages with their precise position information to neighbors. However, these broadcast messages make it easy to track specific vehicles and will likely lead to compromise of personal privacy. Unfortunately, current location privacy enhancement methodologies in VANET, including Pseudonymization, K-anonymity, Random silent period, Mix-zones and path confusion, all suffer some shortcomings. In this paper, we propose a RSSI (Received Signal Strength Indicator)-based user centric anonymization model, which can significantly enhance the location privacy and at the same time ensure traffic safety. Simulations are performed to show the advantages of the proposed method. In comparison with traditional random silent period method, our method can increase at least 47% of anonymity in both simple and correlation tracking.

  2. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  3. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions. PMID:26785867

  4. Human immunodeficiency virus, hepatitis B and hepatitis C in an Indonesian prison: prevalence, risk factors and implications of HIV screening.

    NARCIS (Netherlands)

    Nelwan, E.J.; Crevel, R. van; Alisjahbana, B.; Indrati, A.K.; Dwiyana, R.F.; Nuralam, N.; Pohan, H.T.; Jaya, I.; Meheus, A.; Ven, A.J.A.M. van der

    2010-01-01

    OBJECTIVE: To determine the prevalence and behavioural correlates of HIV, HBV and HCV infections among Indonesian prisoners and to examine the impact of voluntary counselling and testing for all incoming prisoners on access to antiretroviral treatment (ART). METHODS: In a non-anonymous survey in an

  5. Happiness in the workplace: an appreciative inquiry

    OpenAIRE

    McGonagle, Catherine

    2015-01-01

    Maximising employee wellbeing is a challenge for managers at any time. The current economic climate of austerity and the resulting financial constraints within the public sector increase this challenge. Promoting happiness in the workplace is potentially relevant to improving productivity, creativity and retention of staff. Previous research on happiness in the workplace has focused on job satisfaction and employee engagement however happiness in the workplace is an understudied area and offe...

  6. Do temporary agency workers affect workplace performance?

    OpenAIRE

    Bryson, Alex

    2013-01-01

    Using nationally representative workplace data we find the use of temporary agency workers (TAW) is positively associated with financial performance in the British private sector and weakly associated with higher sales per employee. However TAW is not associated with value added per employee. Employees in workplaces with TAW receive higher wages than observationally equivalent employees in non-TAW workplaces. But the presence of TAW in the employee’s occupation is associated with lower wages ...

  7. Does worker wellbeing affect workplace performance?

    OpenAIRE

    Bryson, Alex; Forth, John; Stokes, Lucy

    2015-01-01

    This paper uses linked employer-employee data to investigate the relationship between employees' subjective well-being and workplace performance in Britain. The analyses show a clear, positive and statistically-significant relationship between the average level of job satisfaction at the workplace and workplace performance. This finding is present in both cross-sectional and panel analyses and is robust to various estimation methods and model specifications. In contrast, we find no associatio...

  8. Flexible Employment Arrangements and Workplace Performance

    OpenAIRE

    Giovanis, Eleftherios

    2016-01-01

    There is an increasing concern on the quality of jobs and productivity that is witnessed in the flexible employment arrangements. However, the effects of the employment flexible types on workplace performance has not been explored in Britain. In this study the relationship between two employment arrangements and the workplace performance is examined. More specifically, teleworking and compress hours are two main employment types examined using the Workplace Employee R...

  9. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.

    Science.gov (United States)

    Bushnag, Anas; Abuzneid, Abdelshakour; Mahmood, Ausif

    2016-01-01

    Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques. PMID:27355948

  10. 电子投票匿名性分析%Anonymity Analysis of Electronic Voting

    Institute of Scientific and Technical Information of China (English)

    黄福人; 屈玉贵

    2011-01-01

    电子投票公布计票结果会影响投票者的匿名性.针对该问题,定义匿名性为投票选择的不确定度,利用熵衡量投票系统的投票者匿名性,比较计票结果公布前后投票者的匿名性变化.分析结果表明,投票规模越小,投票者匿名性在结果公布后受到的损失越大;在小规模电子投票情况下,计票结果应该选择只公布获胜者,不公布具体得票数,以减少投票者匿名的损失.%The disclosure of the number of votes can compromise the voters' anonymity of the electronic voting. Aiming at this problem, this paper defines anonymity by using the uncertainty of the voting choices and measures the anonymity of the whole voting system by entropy. It compares the anonymity after the release of the voting results with that before releasing the voting results. Analysis result shows that the smaller the voting scale is, the more the voters' anonymity loses. In the design of small-scale electronic-voting scheme, releasing the winner instead of the number of votes that candidates gained decreases the loss of anonymity.

  11. The French bioethics public consultation and the anonymity doctrine: empirical ethics and normative assumptions.

    Science.gov (United States)

    Spranzi, Marta; Brunet, Laurence

    2015-03-01

    The French bioethics laws of 1994 contain the principles of the anonymity and non commodification of all donations of body parts and products including gametes in medically assisted reproduction. The two revisions of the law, in 2004 and 2011 have upheld the rule. In view of the latest revision process, the French government organized a large public consultation in 2009 ("Etats généraux de la bioéthique"). Within the event a "consensus conference" was held in Rennes about different aspects of assisted reproduction (access, anonymity, gratuity and surrogacy). In what follows we shall first describe the anonymity clause for gamete donations in the French law and the debates surrounding it. We shall then analyse the procedure used for the 2009 public consultation and the related consensus conference, as well as its upshot concerning the anonymity doctrine. In this respect we shall compare the citizens' own recommendations on the gamete anonymity issue and its translation in the consultation's final report drafted by a philosopher mandated by the organizing committee. Whereas the final report cited some fundamental ethical arguments as reason for upholding the provisions of the law-most notably the refusal of the 'all biological' approach to reproductive issues-citizens were more careful and tentative in their position although they also concluded that for pragmatic reasons the anonymity rule should continue to hold. We shall argue that the conservative upshot of the public consultation is due to some main underlying presuppositions concerning the citizens' role and expertise as well as to the specific design of the consensus conference. Our conclusion will be that public consultations and consensus conferences can only serve as an empirical support for devising suitable bioethics norms by using second-order normative assumptions. PMID:25783454

  12. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  13. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.

    Science.gov (United States)

    Bushnag, Anas; Abuzneid, Abdelshakour; Mahmood, Ausif

    2016-01-01

    Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  14. Determination of the Internet Anonymity Influence on the Level of Aggression and Usage of Obscene Lexis

    OpenAIRE

    Potapova, Rodmonga; Gordeev, Denis

    2015-01-01

    This article deals with the analysis of the semantic content of the anonymous Russian-speaking forum 2ch.hk, different verbal means of expressing of the emotional state of aggression are revealed for this site, and aggression is classified by its directions. The lexis of different Russian-and English- speaking anonymous forums (2ch.hk and iichan.hk, 4chan.org) and public community "MDK" of the Russian-speaking social network VK is analyzed and compared with the Open Corpus of the Russian lang...

  15. Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET

    Science.gov (United States)

    Park, Youngho; Sur, Chul; Jung, Chae Duk; Rhee, Kyung-Hyune

    In this paper, we propose an efficient authentication protocol with conditional privacy preservation for secure vehicular communications. The proposed protocol follows the system model to issue on-the-fly anonymous public key certificates to vehicles by road-side units. In order to design an efficient message authentication protocol, we consider a key-insulated signature scheme for certifying anonymous public keys of vehicles to such a system model. We demonstrate experimental results to confirm that the proposed protocol has better performance than other protocols based on group signature schemes.

  16. Workplace Learning: Changing Times, Changing Practices.

    Science.gov (United States)

    Watkins, Karen

    1995-01-01

    Contrasts definitions of workplace learning and human resource development and addresses emerging issues that affect the field: professionalization, increased litigation, diffusion, technology, globalization, and reengineering. (SK)

  17. Workplace Bullying Prevention: A Critical Discourse Analysis

    Science.gov (United States)

    JOHNSON, Susan L.

    2016-01-01

    Aim To analyze the discourses of workplace bullying prevention of hospital nursing unit managers and in the official documents of the organizations where they worked. Background Workplace bullying can be a self-perpetuating problem in nursing units. As such, efforts to prevent this behavior may be more effective than efforts to stop the behavior. There is limited research on how healthcare organizations characterize their efforts to prevent workplace bullying. Design This was a qualitative study. Method Critical discourse analysis and Foucault’s writings on governmentality and discipline were used to analyze data from interviews with hospital nursing unit managers (n=15) and organizational documents (n=22). Data were collected in 2012. Findings The discourse of workplace bullying prevention centered around three themes: prevention of workplace bullying through managerial presence, normalizing behaviors and controlling behaviors. All three are individual level discourses of workplace bullying prevention. Conclusion Current research indicates that workplace bullying is a complex issue with antecedents at the individual, departmental and organizational level. However, the discourse of the participants in this study only focused on prevention of bullying by moulding the behaviors of individuals. The effective prevention of workplace bullying will require departmental and organizational initiatives. Leaders in all types of organizations can use the results of this study to examine their organizations’ discourses of workplace bullying prevention to determine where change is needed. PMID:26010268

  18. Experiments in transforming the global workplace: Incentives for and impediments to improving workplace conditions in China

    OpenAIRE

    O'Rourke, D; Brown, G. D.

    2003-01-01

    This article highlights current economic conditions in China and analyzes existing obstacles to improving workplace conditions and labor practices. There are significant disincentives to strengthening workplace protections, and downward pressures are currently worsening conditions in a number of economic sectors. However, there are also potential strategies for motivating multinational corporations (MNCs) and Chinese government agencies to improve workplace conditions and to implement interna...

  19. Workplace Environment Characteristics as Antecedents of Affective Well-being in the Workplace

    OpenAIRE

    Waratta Authayarat; Hiroyuki Umemuro

    2012-01-01

    Workplace environment characteristics may positively or negatively evoke an individual’s affective experiences, and these experiences can influence affective experiences of others. This study investigates the relations between employees’ affective experiences and workplace environment characteristics. A questionnaire-based investigation was conducted with employees in Thai companies. Participants were asked to evaluate various aspects of their own workplace environments and their affective we...

  20. Relevance of workplace social mixing during influenza pandemics: an experimental modelling study of workplace cultures.

    Science.gov (United States)

    Timpka, T; Eriksson, H; Holm, E; Strömgren, M; Ekberg, J; Spreco, A; Dahlström, Ö

    2016-07-01

    Workplaces are one of the most important regular meeting places in society. The aim of this study was to use simulation experiments to examine the impact of different workplace cultures on influenza dissemination during pandemics. The impact is investigated by experiments with defined social-mixing patterns at workplaces using semi-virtual models based on authentic sociodemographic and geographical data from a North European community (population 136 000). A simulated pandemic outbreak was found to affect 33% of the total population in the community with the reference academic-creative workplace culture; virus transmission at the workplace accounted for 10·6% of the cases. A model with a prevailing industrial-administrative workplace culture generated 11% lower incidence than the reference model, while the model with a self-employed workplace culture (also corresponding to a hypothetical scenario with all workplaces closed) produced 20% fewer cases. The model representing an academic-creative workplace culture with restricted workplace interaction generated 12% lower cumulative incidence compared to the reference model. The results display important theoretical associations between workplace social-mixing cultures and community-level incidence rates during influenza pandemics. Social interaction patterns at workplaces should be taken into consideration when analysing virus transmission patterns during influenza pandemics. PMID:26847017

  1. Relationship between HIV stigma and self-isolation among people living with HIV in Tennessee.

    Directory of Open Access Journals (Sweden)

    Carolyn M Audet

    Full Text Available INTRODUCTION: HIV stigma is a contributing factor to poor patient outcomes. Although HIV stigma has been documented, its impact on patient well-being in the southern US is not well understood. METHODS: Thirty-two adults participated in cognitive interviews after completing the Berger HIV or the Van Rie stigma scale. Participant responses were probed to ensure the scales accurately measured stigma and to assess the impact stigma had on behavior. RESULTS: Three main themes emerged regarding HIV stigma: (1 negative attitudes, fear of contagion, and misperceptions about transmission; (2 acts of discrimination by families, friends, health care providers, and within the workplace; and (3 participants' use of self-isolation as a coping mechanism. Overwhelming reluctance to disclose a person's HIV status made identifying enacted stigma with a quantitative scale difficult. DISCUSSION: Fear of discrimination resulted in participants isolating themselves from friends or experiences to avoid disclosure. Participant unwillingness to disclose their HIV status to friends and family could lead to an underestimation of enacted HIV stigma in quantitative scales.

  2. Development and Challenge of HIV/AIDS Testing Laboratory Network and Quality Assurance System in China

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    This paper describes the development and challenge of HIV/AIDS testing laboratory network and quality assurance system in China. At present, the HIV/AIDS testing laboratories includes three classes, the National AIDS Reference Laboratory, HIV/AIDS confirmatory laboratories and HIV/AIDS screening laboratories. All of them are accredited by the health authorities, and each class of laboratories take charge of their function strictly according to the "National Management of HIV/AIDS Detection (2006)". A complete quality assurance and quality control system for HIV/AIDS testing has been developed, which includes technical training, strict laboratory monitoring and approval,examination or proficiency testing on HIV/AIDS detection, and quality evaluation and supervision of HIV/AIDS diagnostic kits. Besides conduct the routine anti-HIV antibody test, more and more laboratories began to conduct other tests, such as CD4+ T lymphocyte cell counting, HIV viral load, HIV DNA PCR, genotyping, drug resistance, and HIV-1 recent infection test. The primary challenges faced by the HIV/AIDS testing laboratory network are in the areas of laboratory management and quality control. For example, the provincial PT program is inefficient, the internal quality control is conducted perfunctorily, personnel training can not met the needs of the workplace, which need to be improved.

  3. HIV/AIDS and Croatian migrant workers.

    Science.gov (United States)

    Stulhofer, Aleksandar; Brouillard, Pamela; Nikolić, Nebojga; Greiner, Nina

    2006-12-01

    Due to their geographical mobility and long periods of separation from intimate partners, migrant workers are at increased risk for a variety of sexually transmitted infections (STIs) including HIV/AIDS. This study sought to investigate patterns in HIV/AIDS related knowledge, attitudes and sexual behaviour in migrant workers in Croatia. In 2003, 566 male migrant workers were recruited during regular required medical examinations and surveyed at seven locations throughout the country. Each participant was asked to complete a self-administered KABP (sexual knowledge, attitudes, beliefs and practices) questionnaire. The average age of respondents was 38.2 years and the majority worked as seafarers (77.3%) and construction workers (20.5%). Only 18.5% of respondents were able to correctly answer all 13 questions assessing knowledge of HIV/AIDS. Seafarers reported higher levels of knowledge than did construction workers. The average respondent reported having had two sexual partners in the last 12 months, with slightly over half of the respondents (55.3%) reporting condom use at their last intercourse with a casual partner. One fifth of the respondents (20.3%) who reported having had intercourse with a sex worker during the last year reported not using condoms at last intercourse. The number of sexual partners was correlated with age, marital status, faith in God, and personal HIV risk assessment. Attitudes toward condom use, co-workers' HIV/AIDS concerns and the duration of migrant status (within the last two years) were shown to be significant correlates of condom use at last intercourse with a casual partner. The effect of HIV/AIDS related knowledge on analyzed behaviors did not reach statistical significance. Inadequate patterns of migrant workers' condom use, gaps in knowledge about HIV transmission and modes of protection, as well as widespread ignorance regarding available anonymous HIV testing found by this study suggest a critical need for expert intervention to

  4. HIV/AIDS

    Science.gov (United States)

    HIV stands for human immunodeficiency virus. It harms your immune system by destroying the white blood cells ... It is the final stage of infection with HIV. Not everyone with HIV develops AIDS. HIV most ...

  5. HIV and Pregnancy

    Science.gov (United States)

    ... Management Education & Events Advocacy For Patients About ACOG HIV and Pregnancy Home For Patients Search FAQs HIV ... HIV and Pregnancy FAQ113, December 2012 PDF Format HIV and Pregnancy Pregnancy What is human immunodeficiency virus ( ...

  6. HIV Medication Adherence

    Science.gov (United States)

    HIV Treatment HIV Medication Adherence (Last updated 3/1/2016; last reviewed 3/1/2016) Key Points Medication adherence means sticking ... exactly as prescribed. Why is adherence to an HIV regimen important? Adherence to an HIV regimen gives ...

  7. HIV and Rheumatic Disease

    Science.gov (United States)

    ... A Patient / Caregiver Diseases & Conditions HIV & Rheumatic Diseases HIV and Rheumatic Disease Fast Facts Rheumatic diseases related ... knows he or she has HIV. What are HIV-associated rheumatic diseases? Some diseases of the joints ...

  8. HIV and AIDS

    Science.gov (United States)

    ... Got Homework? Here's Help White House Lunch Recipes HIV and AIDS KidsHealth > For Kids > HIV and AIDS ... actually the virus that causes the disease AIDS. HIV Hurts the Immune System People who are HIV ...

  9. HIV Antibody Test

    Science.gov (United States)

    ... be limited. Home Visit Global Sites Search Help? HIV Antibody and HIV Antigen (p24) Share this page: Was this page helpful? Also known as: HIV Screening Tests; AIDS Test; AIDS Screen; HIV Serology; ...

  10. Stress reduction in the workplace.

    Science.gov (United States)

    DiPaola, Daniel

    2014-01-01

    The modern radiology department operates within an environment of competition, increased regulation, and decreasing budgets. Functioning in this setting may lead the radiology manager to experience job related stress. Stress in the workplace has been linked to cardiovascular and musculoskeletal disorders. While there are a number of triggers for job related stress, it is important to identify the early warning signs and knee-jerk reactions. Emotional intelligence (EI) is one of several techniques that can be used to reduce job related stress. The key components of EI are self-awareness, self-management, social awareness, and relationship management. PMID:24605441

  11. Workplace prevention and promotion strategies.

    Science.gov (United States)

    Vézina, Michel; Bourbonnais, Renée; Brisson, Chantal; Trudel, Louis

    2004-01-01

    Psychosocial factors refer to all organizational factors and interpersonal relationships in the workplace that may affect the health of the workers. Currently, two psychosocial risk models are universally recognized for producing solid scientific knowledge regarding the vital link between social or psychological phenomena at work and the development of several diseases, such as cardiovascular diseases or depression. The first is the "job demand-contro-support" model, which was defined by Karasek and to which the concept of social support has been added; the second is the "effort/reward imbalance" model defined by Siegrist. The public health perspective calls for theoretical models based on certain psychosocial attributes of the work environment for which there is empirical evidence of their pathogenic potential for exposed workers. Not only do these models reduce the complexity of the psychosocial reality of the work to components that are significant in terms of health risks, but they also facilitate the development and implementation of workplace interventions. Psychosocial risk intervention strategies currently implemented by companies are predominantly individual-oriented and aim chiefly at reducing the effects of stressful work situations by improving individual ability to adapt to the situation and manage stress. Like personal protection equipment for exposure to physical or chemical risks, these secondary prevention measures are commendable but insufficient, because they aim to reduce only the symptoms and not the cause of problems. Any intervention program for these risks should necessarily include a primary prevention component with a view to eliminating, or at least reducing, the psychosocial pathogenic agents in the workplace. Several authors have suggested that well-structured organizational approaches are most effective and should generate more important, longer-lasting effects than individual approaches. However, the evidence should be strengthened by

  12. [HIV lipodystrophy].

    Science.gov (United States)

    Snopková, S; Matýsková, M; Povolná, K; Polák, P; Husa, P

    2010-12-01

    Combined antiretroviral therapy results in extraordinary decrease of morbidity and mortality of HIV-infected patients and in an essential change of the HIV/AIDS disease prognosis. However, long-term intake of antiretroviral medicaments is related to occurrence of metabolic and morphological abnormalities, of which some have been combined into a new syndrome--the so called HIV lipodystrophy. The HIV lipodystrophy syndrome covers metabolic and morphological changes. Metabolic changes include dyslipidaemia with hypercholesterolaemia and/or hypertriglyceridaemia, insulin resistance with hyperinsulinaemia and hyperlaktataemia. Morphological changes have the nature of lipoatrophia (loss of subcutaneous fat--on the cheeks, on extremities, on buttocks and marked prominence of surface veins) or lipohypertrophia (growth of fat tissue--on the chest, in the dorsocervical area, lipomatosis of visceral tissues and organs, fat accumulation in the abdominal area). Several HIV lipodystrophy features are very similar to the metabolic syndrome of the general population. That is why this new syndrome represents a prospective risk of premature atherosclerosis and increase of the cardiovascular risk in young HIV positive individuals. The article mentions major presented studies dealing with the relation of antiretroviral treatment and the cardiovascular risk. The conclusions of the studies are not unequivocal--this is, among others, given by the reason that their length is short from the viewpoint of atherogenesis. The major risk of subclinical atherosclerosis acceleration seems to be related to the deep immunodeficiency and low number of CD4+ lymphocytes and florid, uncontrolled HIV infection with a high number of HIV-1 RNA copies actually circulating in the plasma. The question, whether metabolic and morphological changes related to HIV and cART carry a similar atherogenic potential as in the general population, remains open for future. PMID:21261108

  13. The Effect of Computer-Mediated Communication on Anonymous End-of-Course Teaching Evaluations

    Science.gov (United States)

    Rhea, Nancy; Rovai, Alfred; Ponton, Michael; Derrick, Gail; Davis, John

    2007-01-01

    The purpose of this study was to determine if the nature of student comments on anonymous end-of-course evaluations differed relative to course delivery medium. Comments evaluated were submitted by 202 graduate students enrolled in face-to-face (F2F) and online versions of research and statistics courses over a four-year period. Results suggested…

  14. Anonymous Search Histories Featuring Personalized Advertisement - Balancing Privacy with Economic Interests

    Directory of Open Access Journals (Sweden)

    Thorben Burghardt

    2011-04-01

    Full Text Available Search engines are key to finding information on the web. Search presently is free for users financed by targeted advertisement. Today, the current search terms determine the ad placement. In the near future, search-engine providers will make use of detailed user profiles for better ad placement. This puts user privacy at risk. Anonymizing search histories, which is a solution in principle, gives way to a trade-off between privacy and the usability of the data for ad placement. This paper studies this tradeoff systematically. To this end, we implement an algorithm for the anonymization of search histories which is flexible regarding the target function. It can retain frequent terms or terms where corresponding ads are clicked with a high probability, keep up the number of users it can derive interests for, etc. We quantify the usefulness of the anonymized log for ad placement in a broad way, e.g., by estimating the number of ad clicks or of ad impressions, based on marketing data from Yahoo! As a result, anonymized search logs are still useful for ad placement, but this very much depends on the target function.

  15. Extended K-Anonymity Model for Privacy Preserving on Micro Data

    Directory of Open Access Journals (Sweden)

    Masoud Rahimi

    2015-11-01

    Full Text Available Today, information collectors, particularly statistical organizations, are faced with two conflicting issues. On one hand, according to their natural responsibilities and the increasing demand for the collected data, they are committed to propagate the information more extensively and with higher quality and on the other hand, due to the public concern about the privacy of personal information and the legal responsibility of these organizations in protecting the private information of their users, they should guarantee that while providing all the information to the population, the privacy is reasonably preserved. This issue becomes more crucial when the datasets published by data mining methods are at risk of attribute and identity disclosure attacks. In order to overcome this problem, several approaches, called p-sensitive k-anonymity, p+-sensitive k-anonymity, and (p, α-sensitive k-anonymity, were proposed. The drawbacks of these methods include the inability to protect micro datasets against attribute disclosure and the high value of the distortion ratio. In order to eliminate these drawbacks, this paper proposes an algorithm that fully protects the propagated micro data against identity and attribute disclosure and significantly reduces the distortion ratio during the anonymity process.

  16. Open and Anonymous Peer Review in a Digital Online Environment Compared in Academic Writing Context

    Science.gov (United States)

    Razi, Salim

    2016-01-01

    This study compares the impact of "open" and "anonymous" peer feedback as an adjunct to teacher-mediated feedback in a digital online environment utilising data gathered on an academic writing course at a Turkish university. Students were divided into two groups with similar writing proficiencies. Students peer reviewed papers…

  17. Improvement of the security of quantum protocols for anonymous voting and surveying

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Several quantum protocols were proposed in a recent paper by Vaccaro,Spring and Chefles for ensuring the anonymous voting in a number of different scenarios.However,it is shown that their protocols are very vulnerable in terms of security.Improved schemes are also presented to recover the security.

  18. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...

  19. Brother-Sister Incest: Data from Anonymous Computer-Assisted Self Interviews

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel; Stroupe, Walter

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self interview. Forty were classified as victims of brother-sister incest, 19 were classified as victims of father-daughter incest, and 232 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The…

  20. Social influence in computer-mediated communication : The effects of anonymity on group behavior

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Sakhel, K; de Groot, D

    2001-01-01

    Two studies examined hypotheses derived from a Social Identity model of Deindividuation Effects (SIDE) as applied to social influence in computer-mediated communication (CMC) in groups. This model predicts that anonymity can increase social influence if a common group identity is salient. In a first

  1. Compatibility of Adlerian Theory and Practice with the Philosophy and Practices of Alcoholics Anonymous.

    Science.gov (United States)

    Carroll, Jane J.

    1999-01-01

    Tenets of Adlerian theory and practice are compatible with the philosophy and practices of Alcoholics Anonymous. Counselors can expect treatment approaches based on Adlerian counseling theory to be congruent with 12-step practices of individuals who are in recovery from alcohol dependence. (Author)

  2. Knowing me, knowing you : Anonymity effects on social identity processes within groups

    NARCIS (Netherlands)

    Lea, M; Spears, R; de Groot, D

    2001-01-01

    The Social Identity Model of Deindividuation Effects (SIDE) proposes that depersonalization of self and others is responsible for the effects of visual anonymity on group behavior The authors investigated these mediating processes by assessing the effects of group-based self-categorization and stere

  3. The Rationality of Alcoholics Anonymous and the Spirituality of Rational Emotive Behavior Therapy.

    Science.gov (United States)

    Velten, Emmett

    1996-01-01

    Argues that Alcoholics Anonymous (AA) and Rational Emotive Behavior Therapy (REBT) share important rational objectives and numerous cognitive-behavioral methods. Both emphasize a philosophical shift as a principal ingredient for change. Provides definitions of rationality and spirituality and explains how REBT and smart recovery are spiritual…

  4. Bayesian modeling of consumer behavior in the presence of anonymous visits

    Science.gov (United States)

    Novak, Julie Esther

    Tailoring content to consumers has become a hallmark of marketing and digital media, particularly as it has become easier to identify customers across usage or purchase occasions. However, across a wide variety of contexts, companies find that customers do not consistently identify themselves, leaving a substantial fraction of anonymous visits. We develop a Bayesian hierarchical model that allows us to probabilistically assign anonymous sessions to users. These probabilistic assignments take into account a customer's demographic information, frequency of visitation, activities taken when visiting, and times of arrival. We present two studies, one with synthetic and one with real data, where we demonstrate improved performance over two popular practices (nearest-neighbor matching and deleting the anonymous visits) due to increased efficiency and reduced bias driven by the non-ignorability of which types of events are more likely to be anonymous. Using our proposed model, we avoid potential bias in understanding the effect of a firm's marketing on its customers, improve inference about the total number of customers in the dataset, and provide more precise targeted marketing to both previously observed and unobserved customers.

  5. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    Science.gov (United States)

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  6. Anonymity and informed consent in artificial procreation: a report from Denmark

    DEFF Research Database (Denmark)

    Lebech, Anne Mette

    1997-01-01

    they reach their majority, to obtain some information pertaining to the health or the identity of their genetic parents. This presents ethical problems. It can be argued that the anonymity of the parents chiefly affects the children, so that an agreement on this point among parents, doctors and others must...

  7. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  8. Evolutionary approach to violating group anonymity using third-party data.

    Science.gov (United States)

    Tavrov, Dan; Chertov, Oleg

    2016-01-01

    In the era of Big Data, it is almost impossible to completely restrict access to primary non-aggregated statistical data. However, risk of violating privacy of individual respondents and groups of respondents by analyzing primary data has not been reduced. There is a need in developing subtler methods of data protection to come to grips with these challenges. In some cases, individual and group privacy can be easily violated, because the primary data contain attributes that uniquely identify individuals and groups thereof. Removing such attributes from the dataset is a crude solution and does not guarantee complete privacy. In the field of providing individual data anonymity, this problem has been widely recognized, and various methods have been proposed to solve it. In the current work, we demonstrate that it is possible to violate group anonymity as well, even if those attributes that uniquely identify the group are removed. As it turns out, it is possible to use third-party data to build a fuzzy model of a group. Typically, such a model comes in a form of a set of fuzzy rules, which can be used to determine membership grades of respondents in the group with a level of certainty sufficient to violate group anonymity. In the work, we introduce an evolutionary computing based method to build such a model. We also discuss a memetic approach to protecting the data from group anonymity violation in this case. PMID:26844025

  9. Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2015-10-01

    Full Text Available In a multi-receiver encryption system, a sender chooses a set of authorized receivers and sends them a message securely and efficiently, as the message is well encrypted and only one ciphertext corresponding to the message is generated no matter how many receivers the sender has chosen. It can be applied to video conferencing systems, pay-per-view channels, remote education, and so forth. Due to privacy considerations, an authorized receiver may not expect that his identity is revealed. In 2010, anonymous multi-receiver identity-based (ID-based encryption was first discussed, and furthermore, many works on the topic have been presented so far. Unfortunately, we find that all of those schemes fail to prove the chosen ciphertext attacks (CCA security in either confidentiality or anonymity. In this manuscript, we propose the first anonymous multi-receiver ID-based authenticated encryption scheme with CCA security in both confidentiality and anonymity. In the proposed scheme, the identity of the sender of a ciphertext can be authenticated by the receivers after a successful decryption. In addition, the proposed scheme also is the first CCA-secure one against insider attacks. Moreover, only one pairing computation is required in decryption.

  10. Leadership Style, Anonymity, and Creativity in Group Decision Support Systems: The Mediating Role of Optimal Flow.

    Science.gov (United States)

    Sosik, John J.; Kahai, Surinder S.; Avolio, Bruce J.

    1999-01-01

    A study involving 159 undergraduates found that flow (a psychological state characterized by concentration, enjoyment, and intrinsic motivation) mediated effects of leadership style on creativity in a Group Decision Support System (GDSS) context, and that its role may be moderated by anonymity. Results also indicated that both flow and anonymity…

  11. Anonymity in giving in a natural context - a field experiment in 30 churches

    NARCIS (Netherlands)

    Soetevent, AR

    2005-01-01

    The role of anonymity in giving is examined in a field experiment performed in 30 Dutch churches. For a period of 29 weeks, the means by which offerings are gathered is determined by chance, prescribing for each offering the use of either 'closed' collection bags or open collection baskets. When usi

  12. Anonymity in giving in a natural context : an economic field experiment in thirty churches

    NARCIS (Netherlands)

    Soetevent, Adriaan R.

    2003-01-01

    The role of anonymity in giving is examined in a field experiment performed in thirty Dutch churches. For a period of 29 weeks, the means by which offerings are gathered is determined by chance, prescribing for each offering the use of either `closed' collection bags or open collection baskets. When

  13. Peer Feedback in Anonymous Peer Review in an EFL Writing Class in Spain

    Science.gov (United States)

    Coté, Robert A.

    2014-01-01

    The present study reports the results of a process of peer feedback through anonymous peer review in an EFL writing class. Numerous studies have reported on the benefits of peer review (PR) in the ESL/EFL writing classroom. However, the literature also identifies social issues that can negatively affect the outcome of face-to-face PR. In this…

  14. Personal Construct Theory and the Transformation of Identity in Alcoholics Anonymous

    Science.gov (United States)

    Young, Lance Brendan

    2011-01-01

    The dominant theoretical approach to alcoholism research presumes linear, causal relationships between individual cognitions and behavioral outcomes. This approach has largely failed to account for the recovery some alcoholics achieve in Alcoholics Anonymous (AA) because AA emphasizes the transformation of identity, framed in terms of…

  15. Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones

    Science.gov (United States)

    Gow, Gordon A.; Parisi, Jennifer

    2008-01-01

    In recent years there has been concern among law enforcement and national security organizations about the use of "anonymous" prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates…

  16. Medical Relabeling in Gamblers Anonymous: The Construction of an Ideal Member.

    Science.gov (United States)

    Turner, David N.; Saunders, Danny

    1990-01-01

    Observed 2 Gamblers Anonymous (GA) groups in South Wales over a 12-month period. Determined 2 broad consequences arose from encountering fellow sufferers: acceptance of diagnosis and commitment to recovery and to will of GA, or rejection of the diagnosis with the knowledge that they are returning to the outside world with a reconstituted…

  17. Modernist Ruins, Filmic Archaeologies. Jane and Louise Wilson’s 'A Free and Anonymous Monument'

    Directory of Open Access Journals (Sweden)

    Giuliana Bruno

    2015-02-01

    Full Text Available Translation of the text originally published in Bruno, Giuliana. 2007. “Modernist Ruins, Filmic Archaeologies. Jane and Louise Wilson’s A Free and Anonymous Monument.” In Public Intimacy: Architecture and the Visual Arts, 43-86. Cambridge: MIT Press.

  18. [HIV and related infections in Italian penal institutions: epidemiological and health organization note].

    Science.gov (United States)

    Babudieri, Sergio; Starnini, Giulio; Brunetti, Bruna; Carbonara, Sergio; D'Offizi, Gian Piero; Monarca, Roberto; Mazzarello, Giovanni; Novati, Stefano; Casti, Aldo; Florenzano, Grazia; Quercia, Giulio; Iovinella, Enzo; Sardu, Celestino; Romano, Anacleto; Dierna, Marinella; Vullo, Serafino; Pintus, Antonio; Maida, Ivana; Dori, Luca; Ardita, Sebastiano; Mura, Maria Stella; Andreoni, Massimo; Rezza, Giovanni

    2003-01-01

    HIV and other infections represent an important health problem in Italian jails. In particular, HIV prevalence is high, due to the characteristics of the prison population, which is constituted by a large proportion of injecting drug users and foreigners. In addition, data from other countries suggest that risky behaviour are not uncommon during imprisonment, and transmission of HIV and other infection in this setting may also occur. Data from surveys conducted by the Penitentiary Authority in Italian jails show a decline of HIV seroprevalence from 9.7% in 1990 to 2.6% in 2001. However, these data are largely incomplete and do not account for possible biases due to self-selection of inmates toward HIV serological testing or to variations in the access to screening activities. More accurate data, possibly obtained through anonymous unlinked surveys, are needed in order to better plan health services and preventive measures.

  19. Drugs + HIV, Learn the Link

    Medline Plus

    Full Text Available ... of HIV in the United States, please visit: https://www.aids.gov/hiv-aids-basics/hiv-aids- ... HIV, STD, and TB Prevention. What Is HIV? ( http://www.cdc.gov/hiv/pubs/faq/faq1.htm ). ...

  20. Distributed Learning: Understanding the Emerging Workplace Knowledge.

    Science.gov (United States)

    Pillay, Hitendra; Elliott, Robert

    2002-01-01

    Explores cognitive attributes that allow individuals to function effectively in the changing nature of society and the workplace. Describes emerging models for learning and suggests that changing workplaces require a distributed cognitive model of human competence which promotes critical thinking and lifelong learning. (Author/LRW)

  1. Surviving (Even Thriving?) in a Toxic Workplace.

    Science.gov (United States)

    White, Paul E; Schoonover-Shoffner, Kathy

    2016-01-01

    Anything toxic is poisonous and harmful-including a toxic workplace. Surveys of hundreds of individuals and organizations reveal three primary areas that are common in unhealthy work environments: sick systems, toxic leaders, and dysfunctional colleagues. This article draws from research and offers practical steps on how to survive, if not change and thrive, in toxic workplaces. PMID:27295230

  2. New workplace practices and firm performance:

    DEFF Research Database (Denmark)

    Cristini, Annalisa; Pozzoli, Dario

    Using data from the 2004 Workplace Employee Relations Survey on British establishments and two surveys on manufacturing firms located in the North of Italy, we look at the diffusion of new workplace practices in the two countries and at their impact on the firm's value added. We find that the ado...

  3. Workplace Friendship in the Electronically Connected Organization

    Science.gov (United States)

    Sias, Patricia M.; Pedersen, Hannah; Gallagher, Erin B.; Kopaneva, Irina

    2012-01-01

    This study examined information communication technologies and workplace friendship dynamics. Employees reported factors that influenced their initiation of friendship with a coworker and reported patterns and perceptions of communication with their workplace friend via different communication methods. Results indicated that personality, shared…

  4. Consider Workplace Needs When Purchasing Office Furniture.

    Science.gov (United States)

    Burton, Bob

    1999-01-01

    Examines furniture-buying tips, involving workplace-needs assessment, that can help make the organization's workplace more effective. Stresses the importance of planning, tying the furniture purchasing into the strategic business, considering alternatives to furniture ownership, evaluating employee health and safety, and understanding any added…

  5. 10 CFR 835.1003 - Workplace controls.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Workplace controls. 835.1003 Section 835.1003 Energy DEPARTMENT OF ENERGY OCCUPATIONAL RADIATION PROTECTION Design and Control § 835.1003 Workplace controls...: (a) The anticipated occupational dose to general employees shall not exceed the limits established...

  6. Routine-Generating and Regenerative Workplace Learning

    Science.gov (United States)

    Kira, Mari

    2010-01-01

    The research discussed in this article focuses on workplace learning in industrial manufacturing work. Everyday work episodes contributing to workplace learning are investigated in four companies operating in the Finnish and Swedish package-supplier sectors. The research adopts a qualitative, interpretive approach. Interviews with employees and…

  7. Federal Workplace Literacy Project. Internal Evaluation Report.

    Science.gov (United States)

    Matuszak, David J.

    This report describes the following components of the Nestle Workplace Literacy Project: six job task analyses, curricula for six workplace basic skills training programs, delivery of courses using these curricula, and evaluation of the process. These six job categories were targeted for training: forklift loader/checker, BB's processing systems…

  8. Workplace innovation in the Netherlands: chapter 8

    NARCIS (Netherlands)

    Pot, F.; Dhondt, S.; Korte, E. de; Oeij, P.; Vaas, F.

    2012-01-01

    Social innovation of work and employment is a prerequisite to achieve the EU2020 objectives of smart, sustainable and inclusive growth. It covers labor market innovation on societal level and workplace innovation on organizational level. This chapter focuses on the latter. Workplace innovations are

  9. The Advising Workplace: Generational Differences and Challenges

    Science.gov (United States)

    Gordon, Virginia; Steele, Peg

    2005-01-01

    The American workplace today is unlike any other in history because for the first time it is made up of four distinct generations. The advising workplaces on today's college campuses mirror this generational diversity. Four generations and their different perceptions of work attitudes and values, management expectations, communication patterns,…

  10. Workplace Learning in Dual Higher Professional Education

    Science.gov (United States)

    Poortman, Cindy L.; Reenalda, Marloes; Nijhof, Wim J.; Nieuwenhuis, Loek F. M.

    2014-01-01

    Workplace learning is considered an effective strategy for the development of vocation, career and professional identity. Dual training programs, in which learning at a vocational school and learning at work in a company are combined, are seen as strong carriers for skill formation processes. In this study we explore workplace learning in dual…

  11. Workplace Engagement and Generational Differences in Values

    Science.gov (United States)

    Schullery, Nancy M.

    2013-01-01

    This article summarizes literature on workplace engagement, an issue that affects organizations' financial results and individuals' personal lives. The newest of the four generations in the workplace, Millennials, were recently shown to have different values than the other two prevalent generations. Surveys taken by 16,000 high school seniors of…

  12. Emergence of Informal Educative Space out of an Anonymous Online Bulletin Board in Korea during the Global Economic Crisis

    Science.gov (United States)

    Kang, Dae Joong; Choi, Seon Joo; Lee, SeungHyeop

    2013-01-01

    This study aimed to understand how people learn and teach informally in an anonymous online bulletin board, the primary purpose of which is not learning and teaching. We conducted a qualitative analysis of comments and replies tagged to the most popular postings of an anonymous online bulletin board, during the global economic crisis in 2008-2009.…

  13. The multiple reals of workplace learning

    Directory of Open Access Journals (Sweden)

    Kerry Harman

    2014-04-01

    Full Text Available The multiple reals of workplace learning are explored in this paper. Drawing on a Foucauldian conceptualisation of power as distributed, relational and productive, networks that work to produce particular objects and subjects as seemingly natural and real are examined. This approach enables different reals of workplace learning to be traced. Data from a collaborative industry-university research project is used to illustrate the approach, with a focus on the intersecting practices of a group of professional developers and a group of workplace learning researchers. The notion of multiple reals holds promise for research on workplace learning as it moves beyond a view of reality as fixed and singular to a notion of reality as performed in and through a diversity of practices, including the practices of workplace learning researchers.

  14. HIV among Women

    Science.gov (United States)

    ... VIH En Español Get Tested Find an HIV testing site near you. Enter ZIP code or city Follow HIV/AIDS CDC HIV CDC HIV/AIDS See RSS | ... Email Updates on HIV Syndicated Content Website Feedback HIV Among Women Language: English Español (Spanish) Format: Select ...

  15. [Serological and Behavioral Survey on HIV/AIDS among prisoners in Nouakchott (Mauritania)].

    Science.gov (United States)

    Ba, K; Keita, M; Fall-Malick, F Z; Mint Beibakar, M; Diallo, M; Lo, B B

    2015-08-01

    In Mauritania, epidemiological data estimate national HIV prevalence to less than 1%. Our study is the first joint survey on HIV/AIDS conducted among prisoners in Mauritania. It is a cross-sectional survey with anonymity and informed consent. The study covered a sample of 296 prisoners enrolled in a population of 706 prisoners held in Nouakchott. The sex ratio was 14.6. The refusal rate of blood sample was 4.7%. HIV prevalence in the sample was 3.9%. 53.37% of prisoners knew the concept of seropositivity but only 7.4% had a perfect knowledge of the ways of HIV transmission untainted by false beliefs. The results showed that 99% of prisoners knew that the condom is a means of protection against HIV infection, but they also showed many false beliefs about protection against HIV in the majority of prisoners. Indeed, 98.49% of respondents said they protected themselves by avoiding sex with strangers and 94.97% of them thought that sex with young girls or virgins are protection against HIV. Nearly one quarter of the prisoners did not have a good perception of risk of contracting HIV in prison although homosexual relations between prisoners have been reported. This study showed that prisoners in Mauritania are a vulnerable group to HIV because the prevalence of HIV in this group was higher than the national prevalence and this sub-population was unfamiliar with the disease and adopt risk behaviors. PMID:26141499

  16. Fatigue management in the workplace

    Directory of Open Access Journals (Sweden)

    Khosro Sadeghniiat-Haghighi

    2015-01-01

    Full Text Available Workers′ fatigue is a significant problem in modern industry, largely because of high demand jobs, long duty periods, disruption of circadian rhythms, and accumulative sleep debt that are common in many industries. Fatigue is the end result of integration of multiple factors such as time awake, time of day, and workload. Then, the full understanding of circadian biologic clock, dynamics of transient and cumulative sleep loss, and recovery is required for effective management of workplace fatigue. It can be more investigated in a new field of sleep medicine called occupational sleep medicine. Occupational sleep medicine is concerned with maintaining best productivity and safety in the industrial settings. The fatigue risk management system (FRMS is a comprehensive approach that is based on applying scientific evidence of sleep knowledge to manage workers fatigue. It is developing rapidly in the highly safety demand jobs; especially truck drivers, pilots, and power plant workers. The objective of this review is to explain about fatigue in the workplace with emphasis on its association work performance and errors/accidents. Also, we discussed about different methods of fatigue measurement and management.

  17. Workplace Bullying: A Tale of Adverse Consequences

    Science.gov (United States)

    Sansone, Lori A.

    2015-01-01

    Workplace bullying is defined as the repetitive and systematic engagement of interpersonally abusive behaviors that negatively affect both the targeted individual and the work organization. According to the findings of 12 studies, being bullied in the workplace affects approximately 11 percent of workers. Victims are frequently blue-collar and unskilled workers. However, there also appear to be gender and milieu/management factors. Emotional/psychological consequences of workplace bullying may include increased mental distress, sleep disturbances, fatigue in women and lack of vigor in men, depression and anxiety, adjustment disorders, and even work-related suicide. Medical consequences of workplace bullying may include an increase in health complaints such as neck pain, musculoskeletal complaints, acute pain, fibromyalgia, and cardiovascular symptoms. Finally, socioeconomic consequences of workplace bullying may include absenteeism due to sick days and unemployment. Clinicians in both mental health and primary care settings need to be alert to the associations between bullying in the workplace and these potential negative consequences, as patients may not disclose workplace maltreatment due to embarrassment or fears of retribution. PMID:25852978

  18. Workplace Health Promotion in Small Enterprises in Denmark

    DEFF Research Database (Denmark)

    Hasle, Peter; Peter, Wissing

    An analysis of the Danish experience with workplace health promotion including preventive activities aiming at a safe and healthy workplace.......An analysis of the Danish experience with workplace health promotion including preventive activities aiming at a safe and healthy workplace....

  19. 22 CFR 1008.635 - Drug-free workplace.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Drug-free workplace. 1008.635 Section 1008.635 Foreign Relations INTER-AMERICAN FOUNDATION GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 1008.635 Drug-free workplace. Drug-free workplace means a site for the...

  20. 28 CFR 83.635 - Drug-free workplace.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Drug-free workplace. 83.635 Section 83.635 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED) GOVERNMENT-WIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (GRANTS) Definitions § 83.635 Drug-free workplace. Drug-free workplace means a site...

  1. 15 CFR 29.635 - Drug-free workplace.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Drug-free workplace. 29.635 Section 29... DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 29.635 Drug-free workplace. Drug-free workplace means a site for the performance of work done in connection with a specific award at...

  2. 22 CFR 133.635 - Drug-free workplace.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Drug-free workplace. 133.635 Section 133.635 Foreign Relations DEPARTMENT OF STATE MISCELLANEOUS GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 133.635 Drug-free workplace. Drug-free workplace means a site for...

  3. 49 CFR 32.635 - Drug-free workplace.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Drug-free workplace. 32.635 Section 32.635 Transportation Office of the Secretary of Transportation GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 32.635 Drug-free workplace. Drug-free workplace means a site for...

  4. 14 CFR 1267.635 - Drug-free workplace.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Drug-free workplace. 1267.635 Section 1267... FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 1267.635 Drug-free workplace. Drug-free workplace means a site for the performance of work done in connection with a specific award at...

  5. 34 CFR 84.635 - Drug-free workplace.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Drug-free workplace. 84.635 Section 84.635 Education Office of the Secretary, Department of Education GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 84.635 Drug-free workplace. Drug-free workplace means a site for...

  6. 40 CFR 36.635 - Drug-free workplace.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Drug-free workplace. 36.635 Section 36... GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 36.635 Drug-free workplace. Drug-free workplace means a site for the performance of work done in connection with a...

  7. 24 CFR 21.635 - Drug-free workplace.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Drug-free workplace. 21.635 Section... Development GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (GRANTS) Definitions § 21.635 Drug-free workplace. Drug-free workplace means a site for the performance of work done in connection with a...

  8. 22 CFR 210.635 - Drug-free workplace.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Drug-free workplace. 210.635 Section 210.635 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 210.635 Drug-free workplace. Drug-free workplace means a site for...

  9. 10 CFR 607.635 - Drug-free workplace.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Drug-free workplace. 607.635 Section 607.635 Energy DEPARTMENT OF ENERGY (CONTINUED) ASSISTANCE REGULATIONS GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 607.635 Drug-free workplace. Drug-free workplace means a site for...

  10. 13 CFR 147.635 - Drug-free workplace.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Drug-free workplace. 147.635... FOR DRUG-FREE WORKPLACE (NONPROCUREMENT) Definitions § 147.635 Drug-free workplace. Drug-free workplace means a site for the performance of work done in connection with a specific award at...

  11. 20 CFR 439.635 - Drug-free workplace.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Drug-free workplace. 439.635 Section 439.635 Employees' Benefits SOCIAL SECURITY ADMINISTRATION GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 439.635 Drug-free workplace. Drug-free workplace means a site for...

  12. 29 CFR 1472.635 - Drug-free workplace.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Drug-free workplace. 1472.635 Section 1472.635 Labor... REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 1472.635 Drug-free workplace. Drug-free workplace means a site for the performance of work done in connection with a specific award...

  13. 43 CFR 43.635 - Drug-free workplace.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Drug-free workplace. 43.635 Section 43.635 Public Lands: Interior Office of the Secretary of the Interior GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 43.635 Drug-free workplace. Drug-free workplace means a...

  14. 45 CFR 1173.635 - Drug-free workplace.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Drug-free workplace. 1173.635 Section 1173.635... HUMANITIES NATIONAL ENDOWMENT FOR THE HUMANITIES GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 1173.635 Drug-free workplace. Drug-free workplace means a site for...

  15. 41 CFR 105-74.635 - Drug-free workplace.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 3 2010-07-01 2010-07-01 false Drug-free workplace. 105... Administration 74-GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 105-74.635 Drug-free workplace. Drug-free workplace means a site for the performance of work done...

  16. 45 CFR 1155.635 - Drug-free workplace.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Drug-free workplace. 1155.635 Section 1155.635... HUMANITIES NATIONAL ENDOWMENT FOR THE ARTS GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 1155.635 Drug-free workplace. Drug-free workplace means a site for the...

  17. 29 CFR 94.635 - Drug-free workplace.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Drug-free workplace. 94.635 Section 94.635 Labor Office of the Secretary of Labor GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 94.635 Drug-free workplace. Drug-free workplace means a site for the performance of work done...

  18. 22 CFR 312.635 - Drug-free workplace.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Drug-free workplace. 312.635 Section 312.635 Foreign Relations PEACE CORPS GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 312.635 Drug-free workplace. Drug-free workplace means a site for the performance of work...

  19. 21 CFR 1405.635 - Drug-free workplace.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Drug-free workplace. 1405.635 Section 1405.635 Food and Drugs OFFICE OF NATIONAL DRUG CONTROL POLICY GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 1405.635 Drug-free workplace. Drug-free workplace means...

  20. 2 CFR 182.635 - Drug-free workplace.

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Drug-free workplace. 182.635 Section 182.635... Reserved GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 182.635 Drug-free workplace. Drug-free workplace means a site for the performance of work done in...

  1. 22 CFR 1509.635 - Drug-free workplace.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true Drug-free workplace. 1509.635 Section 1509.635 Foreign Relations AFRICAN DEVELOPMENT FOUNDATION GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 1509.635 Drug-free workplace. Drug-free workplace means a site for...

  2. 38 CFR 48.635 - Drug-free workplace.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Drug-free workplace. 48...) GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 48.635 Drug-free workplace. Drug-free workplace means a site for the performance of work done in connection with a...

  3. 7 CFR 3021.635 - Drug-free workplace.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Drug-free workplace. 3021.635 Section 3021.635..., DEPARTMENT OF AGRICULTURE GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 3021.635 Drug-free workplace. Drug-free workplace means a site for the performance of work...

  4. 32 CFR 26.635 - Drug-free workplace.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Drug-free workplace. 26.635 Section 26.635... REGULATIONS GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 26.635 Drug-free workplace. Drug-free workplace means a site for the performance of work done in...

  5. 36 CFR 1212.635 - Drug-free workplace.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Drug-free workplace. 1212.635... RULES GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 1212.635 Drug-free workplace. Drug-free workplace means a site for the performance of work done in...

  6. 45 CFR 630.635 - Drug-free workplace.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Drug-free workplace. 630.635 Section 630.635... GOVERNMENTWIDE REQUIREMENTS FOR DRUG-FREE WORKPLACE (FINANCIAL ASSISTANCE) Definitions § 630.635 Drug-free workplace. Drug-free workplace means a site for the performance of work done in connection with a...

  7. Opt-out of voluntary HIV testing: a Singapore hospital's experience.

    Directory of Open Access Journals (Sweden)

    Arlene C Chua

    Full Text Available INTRODUCTION: Since 2008, the Singapore Ministry of Health (MOH has expanded HIV testing by increasing anonymous HIV test sites, as well as issuing a directive to hospitals to offer routine voluntary opt out inpatient HIV testing. We reviewed this program implemented at the end of 2008 at Tan Tock Seng Hospital (TTSH, the second largest acute care general hospital in Singapore. METHODS AND FINDINGS: From January 2009 to December 2010, all inpatients aged greater or equal than 21 years were screened for HIV unless they declined or were not eligible for screening. We reviewed the implementation of the Opt Out testing policy. There were a total of 93,211 admissions; 41,543 patients were included based on HIV screening program eligibility criteria. Among those included, 79% (n = 32,675 opted out of HIV screening. The overall acceptance rate was 21%. Majority of eligible patients who were tested (63% were men. The mean age of tested patients was 52 years. The opt out rate was significantly higher among females (OR: 1.5, 95%CI: 1.4-1.6, aged >60 years (OR: 2.3, 95%CI: 2.2-2.4 and Chinese ethnicity (OR: 1.7, 95%CI:1.6-1.8. The false positive rate of the HIV screening test is 0.56%. The proportion of patients with HIV infection among those who underwent HIV screening is 0.18%. All 16 confirmed HIV patients were linked to care. CONCLUSION: The default opt-in rate of inpatient HIV testing was low at Tan Tock Seng Hospital, Singapore. Efforts to address individual HIV risk perception and campaigns against HIV stigma are needed to encourage more individuals to be tested for HIV.

  8. Assessing business responses to HIV / AIDS in Kenya.

    Science.gov (United States)

    Roberts, M; Wangombe, J

    1995-01-01

    A consulting firm conducted interviews with managers of 16 businesses in 3 Kenyan cities, representatives of 2 trade unions, focus groups with workers at 13 companies, and an analysis of financial/labor data from 4 companies. It then did a needs assessment. The business types were light industry, manufacturing companies, tourism organizations, transport firms, agro-industrial and plantation businesses, and the service industry. Only one company followed all the workplace policy principles recommended by the World Health Organization and the International Labor Organization. Six businesses required all applicants and/or employees to undergo HIV testing. All their managers claimed that they would not discriminate against HIV-infected workers. Many workers thought that they would be fired if they were--or were suspected to be--HIV positive. Lack of a non-discrimination policy brings about worker mistrust of management. 11 companies had some type of HIV/AIDS education program. All the programs generated positive feedback. The main reasons for not providing HIV/AIDS education for the remaining 5 companies were: no employee requests, fears that it would be taboo, and assumptions that workers could receive adequate information elsewhere. More than 90% of all companies distributed condoms. 60% offered sexually transmitted disease diagnosis and treatment. About 33% offered counseling. Four companies provided volunteer HIV testing. Almost 50% of companies received financial or other external support for their programs. Most managers thought AIDS to be a problem mainly with manual staff and not with professional staff. Almost all businesses offered some medical benefits. The future impact of HIV/AIDS would be $90/employee/year (by 2005, $260) due to health care costs, absenteeism, retraining, and burial benefits. The annual costs of a comprehensive workplace HIV/AIDS prevention program varied from $18 to $54/worker at one company. PMID:12289839

  9. Equal opportunity in the workplace.

    Science.gov (United States)

    Allen, A

    1992-04-01

    The Equal Employment Opportunity Commission (EEOC) was created by the Civil Rights Act of 1964. The commission encourages voluntary compliance with equal employment opportunity practices, and has authority to investigate complaints alleging discrimination in hiring, firing, wage rates, testing, training, apprenticeship, and other conditions of employment. In October 1991, during the Senate Judiciary Committee hearings, the confirmation of Judge Clarence Thomas for a seat on the United States Supreme Court was placed in jeopardy by a charge of sexual harassment while Thomas was head of the EEOC. This article focuses on aspects of sexual harassment in the workplace, the role of the EEOC, and offers some suggestions for keeping the work environment free of abusive behavior.

  10. Linguistic Diversity in Blue‐Collar Workplaces

    DEFF Research Database (Denmark)

    Lønsmann, Dorte; Kraft, Kamilla

    In this paper we examine the management of linguistic diversity in blue‐collar workplaces and its implications. The blue‐collar context is somewhat neglected in studies of globalisation and its consequences for the workplace. Hence, our focus here is on blue‐collar workplaces in the context of th...... now."Harvard Business Review 90(5): 116–124........Kraft, Kamilla and Dorte Lønsmann. Forthcoming. A language ideological landscape: The complex map in international companies in Denmark. English in Business and Commerce: Interactions and Policies. Berlin: Mouton de Gruyter.Neeley, Tsedal. 2012. Global business speaks English: Why you need a language strategy...

  11. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    Directory of Open Access Journals (Sweden)

    Sills Eric

    2010-08-01

    Full Text Available Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF and embryo transfer (ET where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  12. The spatial distribution of workplace accidents in Spain: assessing the role of workplace inspections

    OpenAIRE

    Bande, Roberto; López-Mourelo, Elva

    2014-01-01

    This paper analyses the spatial distribution of workplace accidents in Spain and analyses the role of economic and institutional variables in this geographical outcome. After estimating an econometric model that explains regional variation in job accidents incidence, we compute conditional regional distributions of workplace accidents under the assumption of no regional variation in workplace inspections. Results show that much of the regional differences in severe and fatal accidents are exp...

  13. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs. PMID:25352490

  14. Using t-closeness anonymity to control for non-discrimination

    Directory of Open Access Journals (Sweden)

    Salvatore Ruggieri

    2014-08-01

    Full Text Available We investigate the relation between t-closeness, a well-known model of data anonymization against attribute disclosure, and a-protection, a model of the social discrimination hidden in data. We show that t-closeness implies bd f (t-protection, for a bound function bd f ( depending on the discrimination measure f( at hand. This allows us to adapt inference control methods, such as the Mondrian multidimensional generalization technique and the Sabre bucketization and redistribution framework, to the purpose of non-discrimination data protection. The parallel between the two analytical models raises intriguing issues on the interplay between data anonymization and non-discrimination research in data protection.

  15. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  16. Design on PKI-Based Anonymous Mobile Agent Security in E-Commerce

    Institute of Scientific and Technical Information of China (English)

    MENG Xiangsong; HAN Fengwu

    2006-01-01

    The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI(public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA(certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit.

  17. An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-02-01

    With the development of wireless networks and medical sensors, wireless body area networks are playing more and more important role in the field of healthcare service. The data transmitted in WBANs is very sensitive since it will be used in clinical diagnoses or measurements. Therefore, security and privacy of communication in WBANs derive increasing attentions from the academia and industry. In this paper, we propose an identity (ID)-based efficient anonymous authentication scheme for WBANs using elliptic curve cryptosystem (ECC). Due to the ID-based concept, there is no certificate is needed in the proposed scheme. Moreover, the proposed scheme not only provides mutual authentication between the client and the application provider but also provides client anonymity. Performance analysis shows that improvements of 50.58% and 3.87% in the client side and the application provider side separately. Then the proposed scheme is more suitable for WBANs. PMID:24481718

  18. Targeted and anonymized smartphone-based public health interventions in a participatory sensing system.

    Science.gov (United States)

    Clarke, Andrew; Steele, Robert

    2014-01-01

    Public health interventions comprising information dissemination to affect behavioral adjustment have long been a significant component of public health campaigns. However, there has been limited development of public health intervention systems to make use of advances in mobile computing and telecommunications technologies. Such developments pose significant challenges to privacy and security where potentially sensitive data may be collected. In our previous work we identified and demonstrated the feasibility of using mobile devices as anonymous public health data collection devices as part of a Health Participatory Sensing Network (HPSN). An advanced capability of these networks extended in this paper would be the ability to distribute, apply, report on and analyze the usage and effectiveness of targeted public health interventions in an anonymous way. In this paper we describe such a platform, its place in the HPSN and demonstrate its feasibility through an implementation. PMID:25570789

  19. THE WIKILEAKS´S CASE AND ANONYMITY: EFFECTS ON THE INFORMATION FREEDOM

    Directory of Open Access Journals (Sweden)

    Marlus Heriberto Arns de Oliveira

    2015-10-01

    Full Text Available The Constitution of the Federative Republic of Brazil, enacted in 1988 during the democratization process of the country after the end of an authoritarian regime preceded by several others that show a non-democratic tradition in the Brazilian Republic, remained still remnants an authoritarian Patronizing and Paternalist state, the example of the final part of the Article 5, item IV, which claims to be the free expression of thought, but forbids anonymity, prohibition which deserves to be rethought, especially on the internet, where the navigation data of people deserve protection, as well as their rights to remain anonymous, a fact which entails the need for reflection on the scope and how best to interpret the constitutional provision cited, a debate that, in the proposed article will deal think the ideas of paternalism, authoritarianism and freedom, whose focus will be about within the Internet, social networks and the Knowledge Society.

  20. Distributed anonymous data perturbation method for privacy-preserving data mining

    Institute of Scientific and Technical Information of China (English)

    Feng LI; Jin MA; Jian-hua LI

    2009-01-01

    Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment.

  1. A new authentication protocol for revocable anonymity in ad-hoc networks

    OpenAIRE

    Wierzbicki, Adam; Zwierko, Aneta; Kotulski, Zbigniew

    2005-01-01

    This paper describes a new protocol for authentication in ad-hoc networks. The protocol has been designed to meet specialized requirements of ad-hoc networks, such as lack of direct communication between nodes or requirements for revocable anonymity. At the same time, a ad-hoc authentication protocol must be resistant to spoofing, eavesdropping and playback, and man-in-the-middle attacks. The article analyzes existing authentication methods based on the Public Key Infrastructure, and finds th...

  2. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol

    OpenAIRE

    Hong Lai; Jinghua Xiao; Lixiang Li; Yixian Yang

    2012-01-01

    We apply semigroup property of enhanced Chebyshev polynomials to present an anonymous authentication protocol. This paper aims at improving security and reducing computational and storage overhead. The proposed scheme not only has much lower computational complexity and cost in the initialization phase but also allows the users to choose their passwords freely. Moreover, it can provide revocation of lost or stolen smart card, which can resist man-in-the-middle attack and off-line dictionary a...

  3. 7-year trajectories of Alcoholics Anonymous attendance and associations with treatment

    OpenAIRE

    Kaskutas, Lee Ann; Bond, Jason; AVALOS, Lyndsay AMMON

    2009-01-01

    Although many members of Alcoholics Anonymous (AA) are introduced to AA during treatment, the relationship between treatment and AA attendance over time is unknown. This paper describes four latent classes of AA attendance among 586 dependent alcoholics interviewed by telephone 1, 3, 5 and 7 years after baseline, and models the relationship between treatment exposure and AA attendance in each class. There was a low AA group (averaging fewer than 5 meetings at most follow-ups), a medium AA gro...

  4. A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial

    Institute of Scientific and Technical Information of China (English)

    CAO Feng; CAO Zhenfu

    2006-01-01

    In this paper, we use the polynomial function and Chaum's RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not need to be revealed in the tallying phase. The ballot number of each candidate gets is counted by computing the degrees of two polynomials' greatest common divisor. Our scheme does not require a special voting channel and communication can occur entirely over the current internet.

  5. SW-SDF Based Personal Privacy with QIDB-Anonymization Method

    Directory of Open Access Journals (Sweden)

    Kiran P

    2012-08-01

    Full Text Available Personalized anonymization is a method in which a guarding node is used to indicate whether the record owner is ready to reveal its sensitivity based on which anonymization will be performed. Most of the sensitive values that are present in the private data base do not require privacy preservation since the record owner sensitivity is a general one. So there are only few records in the entire distribution that require privacy. For example a record owner having disease flu doesn’t mind revealing his identity as compared to record owner having disease cancer. Even in this some of the record owners who have cancer are ready to reveal their identity, this is the motivation for SW-SDF based Personal Privacy. In this paper we propose a novel personalized privacy preserving technique that over comes the disadvantages of previous personalized privacy and other anonymization techniques. The core of this method can be divided in to two major components. The first component deals with additional attribute used in the table which is in the form of flags which can be used to divide sensitive attribute. Sensitive Disclosure Flag (SDF determines whether record owner sensitive information is to be disclosed or whether privacy should be maintained. The second flag that we are using is Sensitive Weigh (SW which indicates how much sensitive the attribute value is as compared with the rest. Second section deals with a novel representation called Frequency Distribution Block (FDB and Quasi–Identifier Distribution Block(QIDB which is used in anonymization. Experimental result show that it has lesser information loss and faster execution time as compared with existing methods.

  6. An anonymous reputation mechanism for cloud computing networks using volunteer resources

    OpenAIRE

    Aguilar Morillo, Miriam

    2011-01-01

    One of the major problems when using non-dedicated volunteer resources in a distributed network is the high volatility of these hosts since they can go offline or become unavailable at any time without control. Furthermore, the use of volunteer resources implies some security issues due to the fact that they are generally anonymous entities which we know nothing about. So, how to trust in someone we do not know?. Over the last years an important number of reputation-based tr...

  7. Mutual support and recovery in the Russian Alcoholics Anonymous online community

    Directory of Open Access Journals (Sweden)

    Lyytikäinen Laura

    2016-04-01

    Full Text Available AIMS – In Russia the paradigm of alcoholism as a disease is still in contrast to the general perception of alcoholics as weak-willed. This article studies alcoholism and recovery in Russia through the case study of the Russian Alcoholics Anonymous online group. It studies how people who are seeking help for their drinking problems in this online community come to incorporate a new self-understanding of being ill with alcoholism.

  8. Use of anonymous Web communities and websites by medical consumers in Japan to research drug information.

    Science.gov (United States)

    Kishimoto, Keiko; Fukushima, Noriko

    2011-01-01

    In this study, we investigated the status of researching drug information online, and the type of Internet user who uses anonymous Web communities and websites. A Web-based cross-sectional survey of 10875 male and female Internet users aged 16 and over was conducted in March 2010. Of 10282 analyzed respondents, excluding medical professionals, about 47% reported that they had previously searched the Internet for drug information and had used online resources ranging from drug information search engines and pharmaceutical industry websites to social networking sites and Twitter. Respondents who had researched drug information online (n=4861) were analyzed by two multivariable logistic regressions. In Model 1, the use of anonymous websites associated with age (OR, 0.778; 95% CI, 0.742-0.816), referring to the reputation and the narrative of other Internet users on shopping (OR, 1.640; 95% CI, 1.450-1.855), taking a prescription drug (OR, 0.806; 95% CI, 0.705-0.922), and frequent consulting with non-professionals about medical care and health (OR, 1.613; 95% CI, 1.396-1.865). In Model 2, use of only anonymous websites was associated with age (OR, 0.753; 95% CI, 0.705-0.805), using the Internet daily (OR, 0.611; 95% CI, 0.462-0.808), taking a prescription drug (OR, 0.614; 95% CI, 0.505-0.747), and experience a side effect (OR, 0.526; 95% CI, 0.421-0.658). The analysis revealed the profiles of Internet users who researched drug information on social media sites where the information providers are anonymous and do not necessarily have adequate knowledge of medicine and online information literacy. PMID:21532265

  9. Anonymity, Reciprocity, and Conformity: Evidence from Voluntary Contributions to a National Park in Costa Rica

    OpenAIRE

    Alpizar, Francisco; Carlson, Fredrik; Johansson-Stenman, Olof

    2008-01-01

    We investigated the role of anonymity, reciprocity, and conformity for voluntary contributions, based on a natural field experiment conducted at a national park in Costa Rica. Contributions made in public in front of the solicitor were 25 percent higher than contributions made in private. Giving subjects a small gift before requesting a contribution increased the likelihood of a positive contribution. At the same time, however, the conditional contribution decreased. The total effect of givin...

  10. Decentralized Formation Control for Small-Scale Robot Teams with Anonymity

    OpenAIRE

    Lee, Geunho; Nak Young, Chong

    2009-01-01

    This paper presents decentralized formation controls for a team of anonymous mobile robots performing a task through cooperation. Robot teams are required to generate and maintain various geometric patterns adapting to environmental changes in many cooperative robotics applications. In particular, all robots must continue to strive toward achieving the team’s mission even if some members fail to perform their role. Toward this end, formation control approaches are proposed under the condition...

  11. Tourism and spaces of anonymity: An Israeli lesbian woman's travel experience

    OpenAIRE

    Poria, Yaniv

    2006-01-01

    This study examines an Israeli lesbian woman's travel experience based on the analysis of her published diary. The comparison of her experience and attitudes towards various spaces (e.g. her apartment, open spaces near her home, and locations in which she is involved in tourist activity) suggests that her perception of the space as 'free from people she knows' allows her and her partner to benefit from anonymity, live a lesbian lifestyle and benefit from sense of existential...

  12. Social Esteem versus Social Stigma: the role of anonymity in an income reporting game.

    OpenAIRE

    Sandro Casal; Luigi Mittone

    2014-01-01

    When the phenomenon of tax evasion is discussed, both scholars and authorities agree on the fact that, although essential, classical enforcements are not enough to ensure tax compliance: some other forms of incentives must be adopted. The paper’s aim is to experimentally test the role of different non- monetary incentives for tax compliance: participants have been treated with different experimental conditions, which differ in the role played by anonymity. Indeed, subjects have been informed ...

  13. Anonymity in giving in a natural context : an economic field experiment in thirty churches

    OpenAIRE

    Adriaan R. Soetevent

    2003-01-01

    The role of anonymity in giving is examined in a field experiment performed in thirty Dutch churches. For a period of 29 weeks, the means by which offerings are gathered is determined by chance, prescribing for each offering the use of either `closed' collection bags or open collection baskets. When using baskets, attendants' contributions can be identified by their direct neighbors, and attendants can observe the total amount given by the people who preceded them. Initially, contributions to...

  14. Robust ``pro-poorest'' poverty reduction with counting measures: the non-anonymous case

    OpenAIRE

    José V. Gallegos; Gaston Yalonetzky

    2014-01-01

    When measuring poverty with counting measures, are there conditions ensuring that poverty reduction not only reduces the average poverty score further but also decreases deprivation inequality among the poor more, thereby emphasizing improvements among the poorest of the poor? In the case of a non-anonymous assessment, i.e. when we can track poverty experiences of the same individuals or households using panel datasets, we derive three conditions whose fulfillment allows us to conclude that m...

  15. Robust ``pro-poorest'' poverty reduction with counting measures: The anonymous case

    OpenAIRE

    José V. Gallegos; Gaston Yalonetzky

    2015-01-01

    When measuring poverty with counting measures, it is worth inquiring into the conditions prompting poverty reduction which not only reduce the average poverty score further but also decrease deprivation inequality among the poor, thereby emphasizing improvements among the poorest of the poor. For comparisons of cross-sectional datasets of the same society in different periods of time (i.e. an anonymous assessment), Lasso de la Vega (2010) and Alkire and Foster (2011) developed a first-order d...

  16. Why are they hiding ? Study of an Anonymous File Sharing System

    OpenAIRE

    Cunche, Mathieu; Kaafar, Mohamed Ali; Chen, Terence; Boreli, Roksana; Mahanti, Anirban

    2012-01-01

    International audience This paper characterizes a recently proposed anonymous file sharing system, OneSwarm. This characterisation is based on measurement of several aspects of the OneSwarm system such as the nature of the shared and searched content and the geolocation and number of users. Our findings indicate that, as opposed to common belief, there is no significant difference in downloaded content between this system and the classical BitTorrent ecosystem. We also found that a majorit...

  17. Local and global recoding methods for anonymizing set-valued data

    KAUST Repository

    Terrovitis, Manolis

    2010-06-10

    In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to his identity, the publication of such data is still subject to privacy attacks from adversaries who have partial knowledge about the set. Unlike most previous works, we do not distinguish data as sensitive and non-sensitive, but we consider them both as potential quasi-identifiers and potential sensitive data, depending on the knowledge of the adversary. We define a new version of the k-anonymity guarantee, the k m-anonymity, to limit the effects of the data dimensionality, and we propose efficient algorithms to transform the database. Our anonymization model relies on generalization instead of suppression, which is the most common practice in related works on such data. We develop an algorithm that finds the optimal solution, however, at a high cost that makes it inapplicable for large, realistic problems. Then, we propose a greedy heuristic, which performs generalizations in an Apriori, level-wise fashion. The heuristic scales much better and in most of the cases finds a solution close to the optimal. Finally, we investigate the application of techniques that partition the database and perform anonymization locally, aiming at the reduction of the memory consumption and further scalability. A thorough experimental evaluation with real datasets shows that a vertical partitioning approach achieves excellent results in practice. © 2010 Springer-Verlag.

  18. The Impact of Alcoholics Anonymous on other substance abuse related Twelve Step programs

    OpenAIRE

    Laudet, Alexandre B.

    2008-01-01

    This chapter explores the influence of the AA model on self-help fellowships addressing problems of drug dependence. Fellowships that have adapted the 12-step recovery model to other substances of abuse are reviewed; next similarities and differences between AA and drug-recovery 12-step organizations are examined; finally, we present empirical findings on patterns of attendance and perceptions of AA and Narcotics Anonymous (NA) among polydrug dependent populations, many of whom are cross-addi...

  19. 一种基于SPKI的匿名支付方案%An Anonymous Payment Scheme Based on SPKI

    Institute of Scientific and Technical Information of China (English)

    朱庆生; 李唯唯; 王茜; 傅鹤岗

    2003-01-01

    SPKI is a proposed standard for public-key certificates. One important property of SPKI is that SPKI is key-oriented rather than name-oriented, and the public-key is globally unique. In this paper we propose an anonymous paymentscheme based on SPKI aiming at the problem of anonymous payment in B2C e-commerce. In the scheme we use the key-oriented characteristic of SPKI to link the public key to the account, and use authorization certificates to pay. The scheme achieves the anonymity very well.

  20. A Review on anonymization approach to preserve privacy of Published data through record elimination

    Directory of Open Access Journals (Sweden)

    Isha K. Gayki

    2013-11-01

    Full Text Available Data mining is the process of analyzing data. Data Privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological data, financial transaction etc. It is very difficult to protect the data when there is transfer of data. Sensitive information must be protected. There are two kinds of major attacks against privacy namely record linkage and attribute linkage attacks. Research have proposed some methods namely k-anonymity, ℓ-diversity, t-closeness for data privacy. K-anonymity method preserves the privacy against record linkage attack alone. It is unable to prevent address attribute linkage attack. ℓ-diversity method overcomes the drawback of k-anonymity method. But it fails to prevent identity disclosure attack and attribute disclosure attack. t-closeness method preserves the privacy against attribute linkage attack but not identity disclosure attack. A proposed method used to preserve the privacy of individuals sensitive data from record and attribute linkage attacks. In the proposed method, privacy preservation is achieved through generalization by setting range values and through record elimination. A proposed method overcomes the drawback of both record linkage attack and attribute linkage attack.