WorldWideScience

Sample records for anonymous sex counselling

  1. Research into the efficacy and cost-effectiveness of brief, free of charge and anonymous sex counselling to improve (mental health in youth: Design of a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Veen Evert

    2009-12-01

    Full Text Available Abstract Background The capacity to form romantic relationships and sexual health of adolescents in the Netherlands are compromised by several factors, including young age of first intercourse and adolescent depression. Several thresholds like own expenses, trust and embarrassment prevent adolescents to seek help for their sexual problems. To overcome these thresholds, brief sex counselling has been developed. It has been used since 2006 within the Rotterdam-Rijnmond Public Health Service, but there is lack of information about the (cost- effectiveness. In the current study we will evaluate the (cost- effectiveness of brief sex counselling for sexual problems in adolescents and young adults between 18 and 25 years of age. Methods In a randomised controlled trial we will compare (1 brief sex counselling with (2 intensive sexological treatment, and (3 delayed treatment (waiting list. Embedded in this RCT will be a trial-based economic evaluation, looking at the cost-effectiveness and cost-utility of brief sex counselling versus the two other interventions. Four hundred fifty adolescents (aged 18-25 with sexual problems will be recruited among the persons who visit the Public Health Service (PHS and through various websites. After a screening procedure, eligible participants will be randomly allocated to one of the three intervention groups. Primary outcome measure of the clinical evaluation is the severity of sexual problems. Other outcomes include psychological distress, especially depression. The economic evaluation will be performed from a societal perspective. Costs will be assessed continuously by a retrospective questionnaire covering the last 3 month. All outcome assessments (including those for the economic evaluation will take place via the internet at baseline, and at 3, 6, 9, and 12 months after baseline. Discussion The proposed research project will be the first study to provide preliminary data about the effect and cost

  2. Motivational Counseling: Implications for Counseling Male Juvenile Sex Offenders

    Science.gov (United States)

    Patel, Samir H.; Lambie, Glenn W.; Glover, Michelle Muenzenmeyer

    2008-01-01

    Juvenile sex offenders (JSOs) often appear unmotivated to change, which thus necessitates a therapeutic approach that matches "resistant" client characteristics. In this article, the authors review common traits of JSOs, introduce motivational counseling as an effective treatment modality, and offer a case illustration. (Contains 1 table and 1…

  3. [Instances where sex counseling is needed].

    Science.gov (United States)

    Nozue, G

    1980-11-01

    Sex counseling is needed because those people with sexual problems tend to magnify the problems and dwell on them at the cost of all the other important activities of day to day living. The topics covered in sex counseling include impotence (62.5%), premature ejaculation (11.7%), ejaculation dysfunction (13.0%) in case of male, and frigidity (19.1%), sexual aversion/fear (23.0%), and functional disorders of sexual organs (22.4%) in case of female. Frigidity and vaginismus as well as most male problems are within the scope of sex counseling and therapy, but many of the female complaints are psychological and they require marriage counseling. Sexual awareness is both inherited and acquired. 6 weeks after fertilization the presence or absence of Y chromosome already begins to influence both structural and functional development of fetus, and its influence continues throughout our lives. Free creative expression of sexual awareness is bound to clash with social conventions, and that conflict causes stress in some individuals and maturity in others. Positive handling of sexuality promises enriched lives, and sex counseling contributes toward that goal.

  4. Anonymous sex and HIV risk practices among men using the Internet specifically to find male partners for unprotected sex.

    Science.gov (United States)

    Klein, H

    2012-06-01

    To examine the popularity of anonymous sex practices among men using the Internet to find male partners for unprotected sex, and how anonymous sex relates to involvement in other HIV-related risk behaviours, and to investigate the factors associated with engaging in anonymous sex. Structured telephone interviews were conducted with men who used the Internet specifically to find male partners for unprotected sex. Random sampling from 16 websites was used to obtain a national sample. The data reported in this paper were based on quantitative interviews collected with a cross-sectional study design. Between January 2008 and May 2009, confidential telephone interviews lasting approximately 1-2 h were completed with 332 men. Participants were paid $35 for their participation. Most of the men (67.4%) liked anonymous sex, and slightly more than half (51.2%) had engaged in the behaviour during the month prior to interview. Involvement in anonymous sex was associated with greater involvement in a variety of human immunodeficiency virus (HIV)-related risk practices, such as illegal drug use, number of sex partners, and amount of unprotected sex. Four factors were associated with having vs not having anonymous sex: (1) being HIV positive; (2) answering all of the HIV-related knowledge questions correctly; (3) deriving greater enjoyment from having sex in public places, such as parks, public toilets, or adult book shops; and (4) greater impulsivity. Seven factors were associated with greater vs lesser involvement in anonymous sex among those practising the behaviour: (1) being involved in a relationship with a long-term partner; (2) liking to have sex in public places; (3) using bareback-oriented websites to identify sex partners; (4) greater impulsivity; (5) low level of condom use self-efficacy; (6) greater knowledge about HIV/acquired immunodeficiency syndrome; and either (7a) severe childhood maltreatment or (7b) Caucasian race. Men in this population often sought

  5. Social work practice and sex counseling | Nitin | East African Journal ...

    African Journals Online (AJOL)

    Sex counselors and Clinical Psychologist today need to understand the changing social environment and challenging role in making people accept normal sexual practices, abstaining from perversion and safe sexual rehabilitation by behavioral therapy and counseling for having happy marital life. Challenges in sex ...

  6. Disparities in safe sex counseling & behavior among individuals with substance dependence: a cross-sectional study

    Directory of Open Access Journals (Sweden)

    D’Amore Meredith M

    2012-12-01

    Full Text Available Abstract Background Despite the vast literature examining disparities in medical care, little is known about racial/ethnic and mental health disparities in sexual health care. The objective of this study was to assess disparities in safe sex counseling and resultant behavior among a patient population at risk of negative sexual health outcomes. Methods We conducted a cross-sectional analysis among a sample of substance dependent men and women in a metropolitan area in the United States. Multiple logistic regression models were used to explore the relationship between race/ethnicity (non-Hispanic black; Hispanic; non-Hispanic white and three indicators of mental illness (moderately severe to severe depression; any manic episodes; ≥3 psychotic symptoms with two self-reported outcomes: receipt of safe sex counseling from a primary care physician and having practiced safer sex because of counseling. Results Among 275 substance-dependent adults, approximately 71% (195/275 reported ever being counseled by their regular doctor about safe sex. Among these 195 subjects, 76% (149/195 reported practicing safer sex because of this advice. Blacks (adjusted odds ratio (AOR: 2.71; 95% confidence interval (CI: 1.36,5.42 and those reporting manic episodes (AOR: 2.41; 95% CI: 1.26,4.60 had higher odds of safe sex counseling. Neither race/ethnicity nor any indicator of mental illness was significantly associated with practicing safer sex because of counseling. Conclusions Those with past manic episodes reported more safe sex counseling, which is appropriate given that hypersexuality is a known symptom of mania. Black patients reported more safe sex counseling than white patients, despite controlling for sexual risk. One potential explanation is that counseling was conducted based on assumptions about sexual risk behaviors and patient race. There were no significant disparities in self-reported safer sex practices because of counseling, suggesting that increased

  7. Low incidence of HIV infection in an anonymous HIV counselling and testing clinic cohort in Bangkok, Thailand despite high HIV prevalence and self-report of high-risk behaviour.

    Science.gov (United States)

    Phanuphak, Nittaya; Paris, Robert; Colby, Donn; Pinyakorn, Suteeraporn; Souza, Mark; Teeratakulpisarn, Nipat; Chomchey, Nitiya; Sutthichom, Duanghathai; Sukjitpaiboonphol, Amornrat; Pankam, Tippawan; Kim, Jerome H; Ananworanich, Jintanat; Phanuphak, Praphan

    2015-04-01

    HIV counselling and testing (HCT) clinics have the potential to be entry points for recruiting populations at high risk for HIV infection for HIV prevention and treatment studies. Cohort data from key populations are crucial for HIV study site selection. This cohort study recruited clients at an HCT clinic in Bangkok, Thailand. HIV prevalence was assessed along with demographics, perception of risk and behavioural risk factors. Participants who were HIV negative at baseline were followed up every 4 months for up to 1 year to measure HIV incidence and changes in risk behaviour. A total of 992 subjects enrolled; median age was 30 years, 27% were men who have sex with men (MSM) and 8% were commercial sex workers (CSW). Baseline HIV prevalence was 10%. Factors positively associated with HIV infection were age >30 years, lower educational status and being MSM. Factors negatively associated with HIV infection were self-perception of minimal or moderate risk. Overall dropout rate was 49%, with 24% not returning after enrolment. HIV incidence was lower than expected at 0.50 per 100 person-years overall and 1.95 per 100 person-years for MSM. This HCT population had a high baseline HIV prevalence but a low incidence rate on follow-up. Overall retention in the cohort was poor and may have resulted from suboptimal reminders and characteristics of high-risk clients who use anonymous HIV testing services. MSM had higher HIV incidence and better retention than other high-risk groups.

  8. The Effects of Sex Education on Psychological Counselling Students in Turkey

    Science.gov (United States)

    Çuhadaroglu, Alper

    2017-01-01

    Sex education is not included in Turkey's national curriculum and is rarely referenced in school and university curricula. This is even true for those undertaking training in psychological counselling where the need may be great. Only a very few university schools of education offer an elective sex education course. A group of 64 guidance and…

  9. Client Discourses on the Process of Seeking Same-Sex Couple Counselling

    Science.gov (United States)

    Grove, Jan; Peel, Elizabeth; Owen-Pugh, Valerie

    2013-01-01

    How same-sex couples manage the process of seeking help for their relationships is an under-researched area. Twelve semi-structured interviews were conducted with 16 people who had engaged in same-sex couple counselling, and were analysed using discourse analysis. The ways in which the couples positioned themselves as part of a "minority…

  10. Marriage Equality for Same-Sex Couples: Counseling Psychologists as Social Change Agents

    Science.gov (United States)

    Rostosky, Sharon S.; Riggle, Ellen D. B.

    2011-01-01

    The denial of civil marriage rights is a specific example of minority stress that can negatively affect the psychosocial well-being of self-identified lesbian, gay, bisexual, transgender, and queer (LGBTQ) individuals in same-sex partnerships, their families, and their allies. Counseling psychologists have an important role in addressing the…

  11. Domestic Violence between Same-Sex Partners: Implications for Counseling.

    Science.gov (United States)

    Peterman, Linda M.; Dixon, Charlotte G.

    2003-01-01

    Discusses the dynamics of domestic violence between partners of the same sex. The social and cultural issues in the gay and lesbian communities play a large part in perpetuating the myths of domestic violence, which keeps the abuse hidden. This article is based on an extensive review of the literature and a clinical consensus among experts in the…

  12. Against anonymity.

    Science.gov (United States)

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile. © 2014 John Wiley & Sons Ltd.

  13. A Single Transcriptome of a Green Toad (Bufo viridis Yields Candidate Genes for Sex Determination and -Differentiation and Non-Anonymous Population Genetic Markers.

    Directory of Open Access Journals (Sweden)

    Jörn F Gerchen

    Full Text Available Large genome size, including immense repetitive and non-coding fractions, still present challenges for capacity, bioinformatics and thus affordability of whole genome sequencing in most amphibians. Here, we test the performance of a single transcriptome to understand whether it can provide a cost-efficient resource for species with large unknown genomes. Using RNA from six different tissues from a single Palearctic green toad (Bufo viridis specimen and Hiseq2000, we obtained 22,5 Mio reads and publish >100,000 unigene sequences. To evaluate efficacy and quality, we first use this data to identify green toad specific candidate genes, known from other vertebrates for their role in sex determination and differentiation. Of a list of 37 genes, the transcriptome yielded 32 (87%, many of which providing the first such data for this non-model anuran species. However, for many of these genes, only fragments could be retrieved. In order to allow also applications to population genetics, we further used the transcriptome for the targeted development of 21 non-anonymous microsatellites and tested them in genetic families and backcrosses. Eleven markers were specifically developed to be located on the B. viridis sex chromosomes; for eight markers we can indeed demonstrate sex-specific transmission in genetic families. Depending on phylogenetic distance, several markers, which are sex-linked in green toads, show high cross-amplification success across the anuran phylogeny, involving nine systematic anuran families. Our data support the view that single transcriptome sequencing (based on multiple tissues provides a reliable genomic resource and cost-efficient method for non-model amphibian species with large genome size and, despite limitations, should be considered as long as genome sequencing remains unaffordable for most species.

  14. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  15. Does Motivational Interviewing Counseling Time Influence HIV-Positive Persons’ Self-Efficacy to Practice Safer Sex?

    Science.gov (United States)

    Chariyeva, Zulfiya; Golin, Carol E.; Earp, Jo Anne; Suchindran, Chirayath

    2013-01-01

    Objective This study examined the impact of motivational interviewing (MI) counseling time on self-efficacy to practice safer sex for people living with HIV/AIDS (PLWHA). Methods In 4 month intervals we followed a cohort of 490 PLWHA for 12 months. We conducted hierarchical linear regression models to examine changes in safer sex self-efficacy when participants received zero, low to moderate (5–131 minutes) and high (132–320 minutes) doses of MI time. We conducted a similar analysis using number of counseling sessions as the predictor variable. Results Participants with low to moderate doses of MI counseling had 0.26 higher self-efficacy scores than participants with zero MI time (p=0.01). Also, they had 0.26 lower self-efficacy scores than participants with high amounts of MI time (p=0.04). Participants with high doses of MI had a 0.5 higher self-efficacy score than participants with zero amount of MI time (p<0.0001). Participants who received 3–4 counseling sessions had 0.41 greater self-efficacy scores than participants who did not receive any sessions (p<0.0001) but did not differ from participants receiving 1–2 sessions. Conclusion MI time is a key to enhancing safer sex self-efficacy among PLWHA. Practice Implications Safer sex self-efficacy improves the more MI counseling time and sessions PLWHA receive. PMID:21890300

  16. Anonymity in voting revisited

    NARCIS (Netherlands)

    Jonker, Hugo; Pieters, Wolter; Chaum, David; Jakobsson, Markus; Rivest, Ronald L.; Ryan, Peter Y.A.; Benaloh, Josh; Kutylowski, Miroslaw; Adida, Ben

    According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in

  17. Data anonymization patent landscape

    OpenAIRE

    Mirjana Pejić Bach; Jasmina Pivar; Ksenija Dumičić

    2017-01-01

    The omnipresent, unstoppable increase in digital data has led to a greater understanding of the importance of data privacy. Different approaches are used to implement data privacy. The goal of this paper is to develop a data anonymization patent landscape, by determining the following: (i) the trend in data anonymization patenting, (ii) the type of technical content protected in data anonymization, (iii) the organizations and countries most active in patenting data anonymization know-how; and...

  18. Anonymous steps: gender and Gamblers Anonymous

    OpenAIRE

    Rogers, Jim

    2015-01-01

    The biggest source of help for problem gamblers remains gamblers anonymous (GA) in terms of accessibility and availability. GA has traditionally been very much a male preserve. This paper reports on a literature review of Gamblers Anonymous together with data from observations of a contemporary open GA meeting over a one year period. Whilst some studies from North America suggest a changing culture and gender balance within GA programmes observations from the North of England, supported b...

  19. Quantum anonymous voting with anonymity check

    International Nuclear Information System (INIS)

    Horoshko, Dmitri; Kilin, Sergei

    2011-01-01

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  20. Determinants of unmet needs for healthcare and sexual health counselling among Ugandan university students with same-sex sexuality experience.

    Science.gov (United States)

    Larsson, Markus; Ross, Michael W; Tumwine, Gilbert; Agardh, Anette

    2016-01-01

    Research from sub-Saharan Africa has shown that persons with same-sex sexuality experience are at elevated risk for ill health due to sexual risk taking, stigma, and discrimination. However, studies of healthcare seeking among young people in this region with same-sex sexuality experience are limited. To identify determinants of unmet healthcare and sexual health counselling needs, respectively, among Ugandan university students with experience of same-sex sexuality. In 2010, 1,954 Ugandan university students completed a questionnaire assessing socio-demographic factors, mental health, alcohol usage, sexual behaviours, and healthcare seeking. The study population consisted of those 570 who reported ever being in love with, sexually attracted to, sexually fantasised about, or sexually engaged with someone of the same sex. Findings showed that 56% and 30% reported unmet healthcare and sexual health counselling needs, respectively. Unmet healthcare needs were associated with poor mental health and exposure to sexual coercion (OR 3.9, 95% confidence intervals [CI]: 2.7-5.7; OR 2.0, 95% CI: 1.3-3.0, respectively). Unmet sexual health counselling needs were significantly associated with poor mental health (OR 3.2, 95% CI: 2.1-4.8), exposure to sexual coercion (OR 2.6, 95% CI: 1.7-3.9), frequent heavy episodic drinking (OR 3.3, 95% CI: 1.9-5.8), and number of sexual partners (OR 1.9, 95% CI: 1.04-3.3). The associations between poor mental health, sexual coercion, and unmet healthcare needs (AOR 4.2, 95% CI: 2.1-8.5; AOR 2.8, 95% CI: 1.3-5.8) and unmet needs for sexual health counselling (AOR 3.3, 95% CI: 1.6-7.1; AOR 2.7, 95% CI: 1.4-5.4) persisted after adjustment for socio-demographic factors, number of sexual partners, and frequent heavy episodic drinking. These findings indicate that exposure to sexual coercion and poor mental health may influence healthcare seeking behaviours of same-sex sexuality experienced students. Targeted interventions that integrate mental

  1. Determinants of unmet needs for healthcare and sexual health counselling among Ugandan university students with same-sex sexuality experience

    Science.gov (United States)

    Larsson, Markus; Ross, Michael W.; Tumwine, Gilbert; Agardh, Anette

    2016-01-01

    Background Research from sub-Saharan Africa has shown that persons with same-sex sexuality experience are at elevated risk for ill health due to sexual risk taking, stigma, and discrimination. However, studies of healthcare seeking among young people in this region with same-sex sexuality experience are limited. Objective To identify determinants of unmet healthcare and sexual health counselling needs, respectively, among Ugandan university students with experience of same-sex sexuality. Design In 2010, 1,954 Ugandan university students completed a questionnaire assessing socio-demographic factors, mental health, alcohol usage, sexual behaviours, and healthcare seeking. The study population consisted of those 570 who reported ever being in love with, sexually attracted to, sexually fantasised about, or sexually engaged with someone of the same sex. Results Findings showed that 56% and 30% reported unmet healthcare and sexual health counselling needs, respectively. Unmet healthcare needs were associated with poor mental health and exposure to sexual coercion (OR 3.9, 95% confidence intervals [CI]: 2.7–5.7; OR 2.0, 95% CI: 1.3–3.0, respectively). Unmet sexual health counselling needs were significantly associated with poor mental health (OR 3.2, 95% CI: 2.1–4.8), exposure to sexual coercion (OR 2.6, 95% CI: 1.7–3.9), frequent heavy episodic drinking (OR 3.3, 95% CI: 1.9–5.8), and number of sexual partners (OR 1.9, 95% CI: 1.04–3.3). The associations between poor mental health, sexual coercion, and unmet healthcare needs (AOR 4.2, 95% CI: 2.1–8.5; AOR 2.8, 95% CI: 1.3–5.8) and unmet needs for sexual health counselling (AOR 3.3, 95% CI: 1.6–7.1; AOR 2.7, 95% CI: 1.4–5.4) persisted after adjustment for socio-demographic factors, number of sexual partners, and frequent heavy episodic drinking. Conclusions These findings indicate that exposure to sexual coercion and poor mental health may influence healthcare seeking behaviours of same-sex sexuality

  2. Data anonymization patent landscape

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2017-01-01

    Full Text Available The omnipresent, unstoppable increase in digital data has led to a greater understanding of the importance of data privacy. Different approaches are used to implement data privacy. The goal of this paper is to develop a data anonymization patent landscape, by determining the following: (i the trend in data anonymization patenting, (ii the type of technical content protected in data anonymization, (iii the organizations and countries most active in patenting data anonymization know-how; and (iv the topics emerging most often in patent titles. Patents from the PatSeer database relating to data anonymization from 2001 to 2015 were analyzed. We used the longitudinal approach in combination with text mining techniques to develop a data anonymization patent landscape. The results indicated the following. The number of single patent families is growing with a high increase after 2010, thus indicating a positive trend in the area of patenting data anonymization solutions. The majority of patenting activities relate to the G Physics section. Organizations from the USA and Japan assigned the majority of patents related to data anonymization. The results of text mining indicate that the most often used word in titles of data anonymization patents are “anonym*, “method”, “data” and “system”. Several additional words that indicated the most frequent topics related to data anonymization were: “equipment”, “software”, “protection”, “identification”, or “encryption”, and specific topics such as “community”, “medical”, or “service”.

  3. Lack of HIV testing and dissatisfaction with HIV testing and counselling among men having sex with men in Hungary.

    Science.gov (United States)

    Nyitray, Alan G; Bagyinszky, Ferenc; Ross, Michael W; Schmidt, Axel J

    2017-11-22

    Using data from a large internet-based survey of European men having sex with men (MSM), we assessed factors associated with HIV testing and reasons for dissatisfaction with HIV testing and counselling among Hungarian MSM. A total of 2052 Hungarian MSM provided evaluable data for the European MSM Internet Survey (EMIS) in 2010. χ2 tests and Poisson regression with a robust variance estimator were used to assess factors associated with HIV testing and dissatisfaction with HIV testing and counselling. A total of 42.1% of MSM reported never being testing for HIV. Over one-half of men (54.1%) who reported condomless anal intercourse (CAI) in the prior 12 months with a person of unknown or sero-discordant HIV status reported no lifetime HIV testing. The factor most strongly associated with dissatisfaction with HIV testing and counselling was test site with increased dissatisfaction with inpatient hospital settings vs. community-based organizations. Both lack of HIV testing and dissatisfaction with testing were independently associated with MSM who reported that no one, or only a few people, knew they were attracted to men. Lack of HIV testing was strongly associated with CAI. MSM reported that community-based organizations better supported confidentiality and were more respectful during HIV testing.

  4. Attitudes towards couples HIV testing and counseling among Latino men who have sex with men in the Seattle area.

    Science.gov (United States)

    Neme, Santiago; Goldenberg, Tamar; Stekler, Joanne D; Sullivan, Patrick S; Stephenson, Rob

    2015-01-01

    Men who have sex with men (MSM) remain the most severely affected risk group in the US HIV/AIDS epidemic. One-third to two-thirds of HIV transmissions among MSM are estimated to come from primary sex partners. Couples HIV testing and counseling (CHTC), in which two individuals receive pre-test counseling, HIV testing and post-test prevention planning together, has been adapted for male couples in the USA, and is now available in more than 30 cities. Previous studies have demonstrated high levels of willingness to use CHTC among MSM, but to date no studies have explored this among Latino MSM (LMSM). To examine the willingness to use CHTC among and further cultural adaptation needed for LMSM, focus group discussions were held with men who self-identified as Latino, were in a relationship with another man, and resided in Seattle. Willingness to use CHTC was high. Participants reported that CHTC could strengthen and validate their relationships, help mitigate stigma, and provide a forum for support, protection, and information sharing. Barriers to CHTC use included fears of rejection, loneliness, and relationship dissolution, and concerns around deportation and financial burden. The high levels of reported willingness to use CHTC among this sample of LMSM point to the potential for CHTC to be further adapted to provide dyadic HIV testing services for LMSM.

  5. Anonymous women? Gamblers Anonymous and gender

    OpenAIRE

    Rogers, Jim

    2016-01-01

    One of the rapidly changing elements in gambling environments is the increasing participation of women in many forms of gambling, and the growing proportions of problem gamblers who are female. It is known that women who develop gambling problems differ from men in a range of ways:for example they are more likely to have co-morbidities such as anxiety and depression, and to gamble as an 'escape' from such co-occuring problems. Gamblers Anonymous (GA) has a number of meetings across New Zeala...

  6. Vigilância e anonimato em aplicativos mobile: um estudo sobre a privacidade em relações homoafetivas no digital | Surveillance and anonymity in mobile applications: a study about the privacy in digital same sex relations

    Directory of Open Access Journals (Sweden)

    Manuela do Corral Vieira

    2016-11-01

    Full Text Available RESUMO Este artigo busca compreender de que forma homens que utilizam os aplicativos de relacionamento Tinder, Grindr e Scruff – considerando seus pontos de semelhanças e de especificidades, conforme serão detalhadas ao longo deste estudo – experienciam facetas de suas identidades e constroem práticas de sociabilidade, fazendo uso ou não do anonimato, na vivência de relações homoafetivas. Além disso, a pesquisa analisa de que forma estas plataformas digitais se configuram como heterotopias e “armários digitais”, nos quais os sujeitos desenvolvem formas de resistência e proteção a práticas de vigilâncias sociais on e off-lines. Palavras-chave: Privacidade; Anonimato; Identidade; Sociabilidade; Aplicativos de Relacionamento. ABSTRACT This article seeks to understand how men who use the relationship applications Tinder, Grindr and Scruff – considering their similarities points and specificities, as will be detailed in the course of this study – experience facets of their identities and build sociability practices making use or not of anonymity, in experiences of same sex relations. Furthermore, the research examines how these digital platforms are configured as heterotopias and "digital lockers" in which subjects develop forms of resistance and protection to the surveillances practices on and off-lines. Keywords: Privacy; Anonymity; Identity; Sociability; Relationship Applications.

  7. Anonymous Connections and Onion Routing

    National Research Council Canada - National Science Library

    Syverson, Paul F; Goldschlag, David M; Reed, Michael G

    1997-01-01

    .... Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication anonymous by removing identifying information from the data stream...

  8. Suicidal ideation and sex differences in relation to 18 major psychiatric disorders in college and university students: anonymous web-based assessment.

    Science.gov (United States)

    Tupler, Larry A; Hong, Jennifer Y; Gibori, Ron; Blitchington, Timothy F; Krishnan, K Ranga R

    2015-04-01

    College/university students are at high risk for psychiatric disorder and suicide secondary to age, campus stressors, and social pressures. We therefore report frequencies of 18 Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision disorders and suicidal ideation (SI) acquired anonymously from a Web site receiving 113,181 visits from more than 1,500 predominantly US colleges/universities. Depression was foremost, followed by social phobia and eating disorders. Substance-related disorders were less frequent than expected. SI occurred in 47.1% of students, with women evidencing somewhat stronger findings than men. SI was more associated with substance, bipolar, and panic disorders than depression. Self-reported emotional volatility exceeded thoughts of self-harm for all disorders. The results support two subtypes of suicide risk: dysphoric premeditators and those primarily angry and/or impulsive. Clinicians and researchers should therefore consider suicide as an independent psychopathological phenomenon that includes emotional volatility as a risk factor and thoroughly evaluate psychiatric disorders potentially conferring greater suicidal propensity than depression.

  9. Anonymization of Court Orders

    DEFF Research Database (Denmark)

    Povlsen, Claus; Jongejan, Bart; Hansen, Dorte Haltrup

    We describe an anonymization tool that was commissioned by and specified together with Schultz, a publishing company specialized in Danish law related publications. Unavailability of training data and the need to guarantee compliance with pre-existing anonymization guidelines forced us to implement...... a tool using manually crafted rules. We used Bracmat, a programming language that is specialized in transforming tree data structures, to meet the requirement to pass the XML structure of the input document unscathed through the whole workflow. The tool attains a reassuringly good recall, makes almost...

  10. Effects of Peer Group Counselling and Sex on the Self -Concept

    African Journals Online (AJOL)

    Elizabeth

    The influence of sex on the self-concept of these adolescents was also investigated. ... low self-concept. Undoubtedly, certain situations within and outside the school settings can impact negatively on a child's self concept level. Self concept is the .... preparing for examinations, self awareness, self-esteem, self-worth, body.

  11. HIV Testing and Counseling Among Female Sex Workers: A Systematic Literature Review.

    Science.gov (United States)

    Tokar, Anna; Broerse, Jacqueline E W; Blanchard, James; Roura, Maria

    2018-02-20

    HIV testing uptake continues to be low among Female Sex Workers (FSWs). We synthesizes evidence on barriers and facilitators to HIV testing among FSW as well as frequencies of testing, willingness to test, and return rates to collect results. We systematically searched the MEDLINE/PubMed, EMBASE, SCOPUS databases for articles published in English between January 2000 and November 2017. Out of 5036 references screened, we retained 36 papers. The two barriers to HIV testing most commonly reported were financial and time costs-including low income, transportation costs, time constraints, and formal/informal payments-as well as the stigma and discrimination ascribed to HIV positive people and sex workers. Social support facilitated testing with consistently higher uptake amongst married FSWs and women who were encouraged to test by peers and managers. The consistent finding that social support facilitated HIV testing calls for its inclusion into current HIV testing strategies addressed at FSW.

  12. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  13. Using Meditation in Addiction Counseling

    Science.gov (United States)

    Young, Mark E.; DeLorenzi, Leigh de Armas; Cunningham, Laura

    2011-01-01

    Meditation has been studied as a way of reducing stress in counseling clients since the 1960s. Alcoholics Anonymous, Narcotics Anonymous, and new wave behavior therapies incorporate meditation techniques in their programs. This article identifies meditation's curative factors and limitations when using meditation in addiction settings.

  14. Deniable Anonymous Group Authentication

    Science.gov (United States)

    2014-02-13

    providers, such as Facebook or Twitter, and the use of public-key encryption and linkable ring signatures. Linkable ring signatures [44,45] allow a...2007. [36] R. Henry and I. Goldberg. Batch proofs of partial knowledge. University of Waterloo, Technical report CACR, 2012 . [37] R. Henry and I...CT-RSA, 2006. [41] M. Layouni and H. Vangheluwe. Anonymous k-show credentials. In ’07 EuroPKI, 2007. [42] B. Lee, C. Boyd, E. Dawson, K. Kim, J. Yang

  15. Performance evaluation of various K- anonymity techniques

    Science.gov (United States)

    Maheshwarkar, Nidhi; Pathak, Kshitij; Chourey, Vivekanand

    2011-12-01

    Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked with the private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. This paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. This paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.

  16. High acceptability of HIV voluntary counselling and testing among female sex workers: impact of individual and social factors.

    Science.gov (United States)

    Aho, J; Nguyen, V-K; Diakité, Sl; Sow, A; Koushik, A; Rashed, S

    2012-03-01

    Voluntary counselling and testing (VCT) for HIV infection is an important tool for prevention of HIV infection and AIDS in high-risk groups. Our goal was to describe the acceptability and consequences of VCT among a stigmatized and vulnerable group, female sex workers (FSWs), in Conakry, Guinea. Acceptance of the test and return for test results at baseline and consequences of testing 1 year later were described. The perceived risk of HIV infection and perceived benefits and barriers to testing were examined using quantitative and qualitative methods. All 421 FSW participants agreed to undergo VCT and most participants (92%) returned for their results. The main reason cited for VCT acceptance was the wish to know their HIV status. However, some managers of FSW worksites urged FSWs to be tested, curtailing FSWs' free decision-making. One year later, status disclosure was common (90% of the 198 individuals who knew their results among those who participated in the follow-up part of the study). Positive consequences of testing were far more frequently reported than negative consequences (98% vs. 2%, respectively). Negative life events included banishment from the worksite (one case) and verbal abuse (two cases). Acceptability of VCT appears high in the FSW population in Conakry as a consequence of both perceptions of high individual risk and social pressures. © 2011 British HIV Association.

  17. White Privilege and Multicultural Counseling Competence: The Influence of Field of Study, Sex, and Racial/Ethnic Exposure

    Science.gov (United States)

    Mindrup, Robert M.; Spray, Beverly J.; Lamberghini-West, Alicia

    2011-01-01

    This study explores the association between white privilege attitudes and multicultural counseling competencies among white European-American graduate students (N = 298) in clinical psychology and social work. Results revealed a significant positive association between white privilege attitudes and multicultural counseling competencies. Social…

  18. Risk factors for HIV and STI diagnosis in a community-based HIV/STI testing and counselling site for men having sex with men (MSM) in a large German city in 2011-2012.

    Science.gov (United States)

    Marcus, Ulrich; Ort, Jasmin; Grenz, Marc; Eckstein, Kai; Wirtz, Karin; Wille, Andreas

    2015-01-13

    In recent years community-based voluntary counselling and testing sites (CB-VCT) for men having sex with men (MSM) have been established in larger cities in Germany to offer more opportunities for HIV testing. Increasingly, CB-VCTs also offer testing for other bacterial sexually transmitted infections. In Hamburg, tests in CB-VCTs are offered free and anonymously. Data on demographics and sexual risk behaviours are collected with a paper questionnaire. Questionnaire data from the MSM CB-VCT in Hamburg were linked with serological test results for HIV and syphilis, and with rectal and pharyngeal swab results for gonorrhoea and chlamydia. MSM were defined as males reporting male sex partners. CB-VCT clients were characterized demographically, and associations between sexual behaviour variables and diagnosis of HIV and sexually transmitted infections (STI) were analysed by bivariate and multivariate logistic regression analysis. Among the male clients of the CB-VCT in 2011-2012 who were tested for HIV or any STI 1476 reported male sex partners. Unprotected anal intercourse (UAI) was reported as reason for testing by 61% of the clients. Forty-one of 1413 clients testing for HIV were tested positive (2.9%). Twenty-four of 1380 clients testing for syphilis required treatment (1.7%). Tests for simultaneous detection of N. gonorrhoea and Chlamydia trachomatis were conducted on 882 pharyngeal and 642 rectal swabs, revealing 58 (=6.6%) pharyngeal and 71 (=11.1%) rectal infections with one or both pathogens. In multivariate logistic regression analysis number of partners, UAI (OR=2.42) and relying on visual impression when selecting sex partners (OR = 2.92) were associated with increased risks for diagnosis of syphilis or a rectal STI. Syphilis or rectal STI diagnosis (OR=4.52) were associated with increased risk for HIV diagnosis. The MSM CB-VCT in Hamburg reaches clients at high risk for HIV and STIs. The diagnosis of syphilis or a rectal STI was associated with increased

  19. 45 CFR 2555.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Activities Prohibited § 2555.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or guidance of...

  20. 34 CFR 106.36 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling... Programs or Activities Prohibited § 106.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or...

  1. 32 CFR 196.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling... Programs or Activities Prohibited § 196.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or...

  2. 45 CFR 618.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Activities Prohibited § 618.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or guidance of...

  3. An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity

    Science.gov (United States)

    Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.

    2017-08-01

    For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.

  4. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key k which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: { Introducing and formally dening...... anonymous steganography, { A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), { A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  5. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key $k$ which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: - Introducing and formally...... defining anonymous steganography, - A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), - A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  6. Concept analysis: lack of anonymity.

    Science.gov (United States)

    Swan, Marilyn A; Hobbs, Barbara B

    2017-05-01

    To re-examine and expand understanding of the concept 'lack of anonymity' as a component of rural nursing theory. Early healthcare literature reports lack of anonymity as part of social and working environments, particularly rural nursing. Rural nursing theory included the first published concept analysis on lack of anonymity but lacked empirical referents. Workforce, societal and rural healthcare changes support an updated analysis. To further understand lack of anonymity, its present day use and applicability to diverse environments, research from multiple disciplines was reviewed. Concept analysis. A literature search using eight terms in eleven databases was conducted of literature published between 2008-2013. Walker and Avant's concept analysis methodology guided the analysis. The previous concept analysis is supported in part by current literature. The defining attributes, 'identifiable', 'establishing boundaries for public and private self and interconnectedness' in a community were updated. Updated antecedents include: (i) environmental context; (ii) opportunities to become visible; (iii) developing relationships and (iv) unconscious or limited awareness of public or personal privacy. Consequences are: (i) familiarity; (ii) visibility; (iii) awareness of privacy and (iv) manage or balance of lack of anonymity. Cases were constructed and empirical referents identified. The concept of lack of anonymity was updated; portions of the original definition remain unchanged. Empirical referents reveal the defining attributes in daily life and may guide future research on the effect of lack of anonymity on nursing practice. This analysis advances the conceptual understanding of rural nursing theory. © 2016 John Wiley & Sons Ltd.

  7. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  8. Anonymous Transactions in Computer Networks

    Science.gov (United States)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  9. Routine brief risk-reduction counseling with biannual STD testing reduces STD incidence among HIV-infected men who have sex with men in care.

    Science.gov (United States)

    Patel, Pragna; Bush, Tim; Mayer, Kenneth; Milam, Joel; Richardson, Jean; Hammer, John; Henry, Keith; Overton, Turner; Conley, Lois; Marks, Gary; Brooks, John T

    2012-06-01

    We evaluated whether routine biannual sexually transmitted disease (STD) testing coupled with brief risk-reduction counseling reduces STD incidence and high-risk behaviors. The SUN study is a prospective observational HIV cohort study conducted in 4 US cities. At enrollment and every 6 months thereafter, participants completed a behavioral survey and were screened for STDs, and if diagnosed, were treated. Medical providers conducted brief risk-reduction counseling with all patients. Among men who have sex with men (MSM), we examined trends in STD incidence and rates of self-reported risk behaviors before and after exposure to the risk-reduction intervention. The "preintervention" visit was the study visit that was at least 6 months after enrollment STD screening and treatment and at which the participant was first exposed to the intervention. The "postintervention" visit was 12 months later. Among 216 MSM with complete STD and behavioral data, median age was 44.5 years; 77% were non-Hispanic white; 83% were on highly active antiretroviral treatment; 84% had an HIV RNA level STD incidence declined from 8.8% to 4.2% (P = 0.041). Rates of unprotected receptive or insertive anal intercourse with HIV-positive partners increased (19% to 25%, P = 0.024), but did not change with HIV-negative partners or partners of unknown HIV status (24% to 22%, P = 0.590). STD incidence declined significantly among HIV-infected MSM after implementing frequent, routine STD testing coupled with risk-reduction counseling. These findings support adoption of routine STD screening and risk-reduction counseling for HIV-infected MSM.

  10. Alcoholics Anonymous and nursing. Lessons in holism and spiritual care.

    Science.gov (United States)

    McGee, E M

    2000-03-01

    Alcoholic Anonymous (AA) is a worldwide, million-member organization that has assisted countless alcoholics to achieve sobriety through a spiritual program of recovery from alcoholism. Based on spiritual principles known as the "Twelve Steps" and "Twelve Traditions," AA has provided a model for other recovery programs such as Narcotics Anonymous (NA), Gamblers Anonymous (GA), and Sex and Love Addicts Anonymous (SLAA). Recovery in AA appears to involve a process of self-transcendence. In recent years, nursing scholars have increasingly explored the concepts of self-transcendence and spirituality as they apply to nursing theory and practice. This article explores the roots and spiritual dimensions of 12-step recovery programs. It further explores the ways in which theoretical and clinical knowledge about the delivery of spiritual care interventions may be gained from an understanding of AA's spiritual approach to recovery.

  11. 10 CFR 1042.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials... on the Basis of Sex in Education Programs or Activities Prohibited § 1042.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on...

  12. 6 CFR 17.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 17.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on...

  13. 49 CFR 25.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 25.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on...

  14. 45 CFR 86.36 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 86.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on...

  15. 22 CFR 229.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 229.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on...

  16. 22 CFR 146.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 146.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on...

  17. 7 CFR 15a.36 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling... Education Programs and Activities Prohibited § 15a.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the...

  18. 10 CFR 5.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials... in Education Programs or Activities Prohibited § 5.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the...

  19. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  20. k-Times Anonymous Authentication

    Science.gov (United States)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  1. Pattern-Guided k-Anonymity

    OpenAIRE

    Rolf Niedermeier; André Nichterlein; Robert Bredereck

    2013-01-01

    We suggest a user-oriented approach to combinatorial data anonymization. A data matrix is called k-anonymous if every row appears at least k times—the goal of the NP-hard k-ANONYMITY problem then is to make a given matrix k-anonymous by suppressing (blanking out) as few entries as possible. Building on previous work and coping with corresponding deficiencies, we describe an enhanced k-anonymization problem called PATTERN-GUIDED k-ANONYMITY, where the users specify in which combinations suppre...

  2. Anonymous Web Browsing and Hosting

    OpenAIRE

    MANOJ KUMAR; ANUJ RANI

    2013-01-01

    In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that ho...

  3. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  4. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  5. An Anonymous Credit Card System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  6. Compatibility of Adlerian Theory and Practice with the Philosophy and Practices of Alcoholics Anonymous.

    Science.gov (United States)

    Carroll, Jane J.

    1999-01-01

    Tenets of Adlerian theory and practice are compatible with the philosophy and practices of Alcoholics Anonymous. Counselors can expect treatment approaches based on Adlerian counseling theory to be congruent with 12-step practices of individuals who are in recovery from alcohol dependence. (Author)

  7. Protecting privacy using k-anonymity.

    Science.gov (United States)

    El Emam, Khaled; Dankar, Fida Kamal

    2008-01-01

    There is increasing pressure to share health information and even make it publicly available. However, such disclosures of personal health information raise serious privacy concerns. To alleviate such concerns, it is possible to anonymize the data before disclosure. One popular anonymization approach is k-anonymity. There have been no evaluations of the actual re-identification probability of k-anonymized data sets. Through a simulation, we evaluated the re-identification risk of k-anonymization and three different improvements on three large data sets. Re-identification probability is measured under two different re-identification scenarios. Information loss is measured by the commonly used discernability metric. For one of the re-identification scenarios, k-Anonymity consistently over-anonymizes data sets, with this over-anonymization being most pronounced with small sampling fractions. Over-anonymization results in excessive distortions to the data (i.e., high information loss), making the data less useful for subsequent analysis. We found that a hypothesis testing approach provided the best control over re-identification risk and reduces the extent of information loss compared to baseline k-anonymity. Guidelines are provided on when to use the hypothesis testing approach instead of baseline k-anonymity.

  8. Comparing Random-based and k-Anonymity-Based Algorithms for Graph Anonymization

    OpenAIRE

    Casas Roma, Jordi; Torra, Vicenç; Herrera Joancomartí, Jordi

    2012-01-01

    Recently, several anonymization algorithms have appeared for privacy preservation on graphs. Some of them are based on random- ization techniques and on k-anonymity concepts. We can use both of them to obtain an anonymized graph with a given k-anonymity value. In this paper we compare algorithms based on both techniques in order to obtain an anonymized graph with a desired k-anonymity value. We want to analyze the complexity of these methods to generate anonymized graphs and the quality...

  9. Assessing the role of masculinity in the transmission of HIV: a systematic review to inform HIV risk reduction counseling interventions for men who have sex with men.

    Science.gov (United States)

    Zeglin, Robert J

    2015-10-01

    HIV affects over 1.2 million people in the United States; a substantial number are men who have sex with men (MSM). Despite an abundance of literature evaluating numerous social/structural and individual risk factors associated with HIV for this population, relatively little is known regarding the individual-level role of masculinity in community-level HIV transmission risk. To address this gap, the current analysis systematically reviewed the masculinity and HIV literature for MSM. The findings of 31 sources were included. Seven themes were identified: (1) number of partners, (2) attitudes toward condoms, (3) drug use, (4) sexual positioning, (5) condom decision-making, (6) attitudes toward testing, and (7) treatment compliance. These factors, representing the enactment of masculine norms, potentiate the spread of HIV. The current article aligns these factors into a masculinity model of community HIV transmission. Opportunities for counseling interventions include identifying how masculinity informs a client's cognitions, emotions, and behaviors as well as adapting gender-transformative interventions to help create new conceptualizations of masculinity for MSM clients. This approach could reduce community-level HIV incidence.

  10. Bisexuality, sexual risk taking, and HIV prevalence among men who have sex with men accessing voluntary counseling and testing services in Mumbai, India.

    Science.gov (United States)

    Kumta, Sameer; Lurie, Mark; Weitzen, Sherry; Jerajani, Hemangi; Gogate, Alka; Row-kavi, Ashok; Anand, Vivek; Makadon, Harvey; Mayer, Kenneth H

    2010-02-01

    To describe sociodemographics, sexual risk behavior, and estimate HIV and sexually transmitted infection (STI) prevalence among men who have sex with men (MSM) in Mumbai, India. Eight hundred thirty-one MSM attending voluntary counseling and testing (VCT) services at the Humsafar Trust, answered a behavioral questionnaire and consented for Venereal Disease Research Laboratory and HIV testing from January 2003 through December 2004. Multivariate logistic regression was performed for sociodemographics, sexual risk behavior, and STIs with HIV result as an outcome. HIV prevalence among MSM was 12.5%. MSM who were illiterate [adjusted odds ratio (AOR) 2.28; 95% confidence interval (CI): 1.08 to 4.84], married (AOR 2.70; 95% CI: 1,56 to 4.76), preferred male partners (AOR 4.68; 95% CI: 1.90 to 11.51), had partners of both genders (AOR 2.73; 95% CI: 1.03 to 7.23), presented with an STI (AOR 3.31; 95% CI: 1.96 to 5.61); or presented with a reactive venereal disease research laboratory test (AOR 4.92; 95% CI: 2.55 to 9.53) at their VCT visit were more likely to be HIV infected. MSM accessing VCT services in Mumbai have a high risk of STI and HIV acquisition. Culturally appropriate interventions that focus on sexual risk behavior and promote condom use among MSM, particularly the bridge population of bisexual men, are needed to slow the urban Indian AIDS epidemic.

  11. Pattern-Guided k-Anonymity

    Directory of Open Access Journals (Sweden)

    Rolf Niedermeier

    2013-10-01

    Full Text Available We suggest a user-oriented approach to combinatorial data anonymization. A data matrix is called k-anonymous if every row appears at least k times—the goal of the NP-hard k-ANONYMITY problem then is to make a given matrix k-anonymous by suppressing (blanking out as few entries as possible. Building on previous work and coping with corresponding deficiencies, we describe an enhanced k-anonymization problem called PATTERN-GUIDED k-ANONYMITY, where the users specify in which combinations suppressions may occur. In this way, the user of the anonymized data can express the differing importance of various data features. We show that PATTERN-GUIDED k-ANONYMITY is NP-hard. We complement this by a fixed-parameter tractability result based on a “data-driven parameterization” and, based on this, develop an exact integer linear program (ILP-based solution method, as well as a simple, but very effective, greedy heuristic. Experiments on several real-world datasets show that our heuristic easily matches up to the established “Mondrian” algorithm for k-ANONYMITY in terms of the quality of the anonymization and outperforms it in terms of running time.

  12. Screening acute HIV infections among Chinese men who have sex with men from voluntary counseling & testing centers.

    Directory of Open Access Journals (Sweden)

    Xiaoxu Han

    Full Text Available BACKGROUND: Recent studies have shown the public health importance of identifying acute HIV infection (AHI in the men who have sex with men (MSM of China, which has a much higher risk of HIV transmission. However, cost-utility analyses to guide policy around AHI screening are lacking. METHODOLOGY/PRINCIPAL FINDINGS: An open prospective cohort was recruited among MSM living in Liaoning Province, Northeast China. Blood samples and epidemiological information were collected every 10 weeks. Third-generation ELISA and rapid test were used for HIV antibody screening, western blot assay (WB served for assay validation. Antibody negative specimens were tested with 24 mini-pool nucleic acid amplification testing (NAAT. Specimens with positive ELISA but negative or indeterminate WB results were tested with NAAT individually without mixing. A cost-utility analysis of NAAT screening was assessed. Among the 5,344 follow-up visits of 1,765 MSM in 22 months, HIV antibody tests detected 114 HIV chronic infections, 24 seroconverters and 21 antibody indeterminate cases. 29 acute HIV infections were detected with NAAT from 21 antibody indeterminate and 1,606 antibody negative cases. The HIV-1 prevalence and incidence density were 6.6% (95% CI: 5.5-7.9 and 7.1 (95% CI: 5.4-9.2/100 person-years, respectively. With pooled NAAT and individual NAAT strategy, the cost of an HIV transmission averted was $1,480. The addition of NAAT after HIV antibody tests had a cost-utility ratio of $3,366 per gained quality-adjusted life year (QALY. The input-output ratio of NAAT was about 1∶16.9. CONCLUSIONS/SIGNIFICANCE: The HIV infections among MSM continue to rise at alarming rates. Despite the rising cost, adding pooled NAAT to the HIV antibody screening significantly increases the identification of acute HIV infections in MSM. Early treatment and target-oriented publicity and education programs can be strengthened to decrease the risk of HIV transmission and to save medical

  13. "Counseling" in Ophthalmology.

    Science.gov (United States)

    Francois, J.

    1976-01-01

    The need to counsel patients with genetic ophthalmological problems is stressed in the article. Assessment of autosomal dominance or autosomal recessitivity in an individual is explained and sex-linked heredity is traced. Practical examples of genetic abnormalities, such as pigmentary retinopathy and chorodineremia, are discussed. (PHR)

  14. Automatic Control of Configuration of Web Anonymization

    OpenAIRE

    Tomas Sochor

    2013-01-01

    Anonymization of the Internet traffic usually hides details about the request originator from the target server. Such a disguise might be required in some situations, especially in the case of web browsing. Although the web traffic anonymization is not a part of the http specification, it could be achieved using a certain extra tool. Significant deceleration of anonymized traffic compared to normal traffic is inevitable but it can be controlled in some cases as this article suggests. The resu...

  15. Father-daughter incest: data from an anonymous computerized survey.

    Science.gov (United States)

    Stroebel, Sandra S; O'Keefe, Stephen L; Beard, Keith W; Kuo, Shih-Ya; Swindell, Samuel V S; Kommor, Martin J

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were more likely than controls to endorse feeling damaged, psychologically injured, estranged from one or both parents, and shamed by others when they tried to open up about their experience. They had been eroticized early on by the incest experience, and it interfered with their adult sexuality. Incest victims experienced coitus earlier than controls and after reaching age 18 had more sex partners and were more likely to have casual sex outside their primary relationship and engage in sex for money than controls. They also had worse scores on scales measuring depression, sexual satisfaction, and communication about sex than controls.

  16. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  17. [Co-infections of HIV, syphilis and HSV-2 among men who have sex with men at the voluntary HIV counseling and testing clinics in Shanghai].

    Science.gov (United States)

    Liu, Y; Tang, H F; Ning, Z; Zheng, H; He, N; Zhang, Y Y

    2017-10-10

    Objective: To understand the prevalence rates of HIV-syphilis and HIV-herpes simplex virus 2 (HSV-2) co-infections and related factors among men having sex with men (MSM) who had visited the voluntary HIV counseling and testing (VCT) clinics in Shanghai, China. Methods: 756 eligible MSM who attended the VCT clinics of Shanghai Municipality and Putuo district during March to August, 2015 were recruited to participate in a cross-sectional survey with questionnaire interview and blood testing for HIV, syphilis and HSV-2. Results: A total of 732 participants completed a valid questionnaire survey. The prevalence rates were 3.3 % (24/732) for HIV/Syphilis co-infection, 1.9 % (14/732) for HIV/HSV-2 co-infection, and 0.7 % (5/732) for HIV/Syphilis/HSV-2 co-infection, respectively. HIV prevalence appeared significantly higher among syphilis-infected participants (45.3 % , 24/53) than those without Syphilis (7.2 % , 61/679) (χ(2)=63.11, P Syphilis co-infection. Those participants who had high middle school or lower levels of education ( OR =6.87, 95 %CI : 1.86-25.42; OR =9.82, 95 %CI : 2.25-42.85) were under risk on HIV and HSV-2 co-infection. Conclusion: HIV/Syphilis and HIV/HSV-2 co-infection were seen among MSM who attended the VCT clinics in Shanghai that called for special attention, especially on migrants, those with low education or illicit drug users.

  18. Bisexuality, Sexual Risk Taking, and HIV Prevalence Among Men Who Have Sex With Men Accessing Voluntary Counseling and Testing Services in Mumbai, India

    Science.gov (United States)

    Kumta, Sameer; Lurie, Mark; Weitzen, Sherry; Jerajani, Hemangi; Gogate, Alka; Row-kavi, Ashok; Anand, Vivek; Makadon, Harvey; Mayer, Kenneth H.

    2010-01-01

    Objectives To describe sociodemographics, sexual risk behavior, and estimate HIV and sexually transmitted infection (STI) prevalence among men who have sex with men (MSM) in Mumbai, India. Methods Eight hundred thirty-one MSM attending voluntary counseling and testing (VCT) services at the Humsafar Trust, answered a behavioral questionnaire and consented for Venereal Disease Research Laboratory and HIV testing from January 2003 through December 2004. Multivariate logistic regression was performed for sociodemographics, sexual risk behavior, and STIs with HIV result as an outcome. Results HIV prevalence among MSM was 12.5%. MSM who were illiterate [adjusted odds ratio (AOR) 2.28; 95% confidence interval (CI): 1.08 to 4.84], married (AOR 2.70; 95% CI: 1,56 to 4.76), preferred male partners (AOR 4.68; 95% CI: 1.90 to 11.51), had partners of both genders (AOR 2.73; 95% CI: 1.03 to 7.23), presented with an STI (AOR 3.31; 95% CI: 1.96 to 5.61); or presented with a reactive venereal disease research laboratory test (AOR 4.92; 95% CI: 2.55 to 9.53) at their VCT visit were more likely to be HIV infected. Conclusions MSM accessing VCT services in Mumbai have a high risk of STI and HIV acquisition. Culturally appropriate interventions that focus on sexual risk behavior and promote condom use among MSM, particularly the bridge population of bisexual men, are needed to slow the urban Indian AIDS epidemic. PMID:19934765

  19. The cost-effectiveness in the use of HIV counselling and testing-mobile outreaches in reaching men who have sex with men (MSM) in northern Nigeria.

    Science.gov (United States)

    Ifekandu, Chiedu; Suleiman, Aliyu; Aniekwe, Ogechukwu

    2014-01-01

    Men who have sex with men (MSM) are at increased risk of HIV and other STI infections in Nigeria. This is because MSM are afraid to seek medical help because the healthcare workers in various facilities are afraid of the consequences if they provide services for MSM citing the law as a reason not to intervene. MSM in northern states of Nigeria are facing double-jeopardy because the few international partners working in MSM in Nigeria are pulling out of these volatile areas because of the fear of attacks by the Boko Haram and the Nigerian law enforcement agencies. The intervention was conducted to promote affordable and sustainable HIV care and treatment for MSM in Nigeria. This intervention was conducted in the Boko Haram ravaged cities of Kano and Maiduguri (North-East Nigeria). Twenty MSM-key influencers from the two cities were identified and trained on HIV counselling and testing, caregivers, case managers and on initiation process for ARV treatment for new HIV+MSM as well as ethical considerations. The mean age of the key influencers was 24 years +/-SD. Each of the trained 20 key influencers reached 20 MSM-peer with condom promotion, HCT, referral to identified MSM-community health centers and follow-up/caregiving within the space of one month. The project was able to reach 400 MSM in the two cities. 89% of the peers consented to HCT. HIV prevalence among the participants was at 18%. The project recorded ARV-successful referral to healthcare facilities for the respondents that tested positive. The key influencers have been following up for ARV-adherence. Use of community members should be promoted for sustainability and ownership. It also helps in eradicating socio-cultural barrier to HIV intervention for MSM. Moreover, this proves to be one of the safest and affordable methods of reaching MSM in Nigeria in this ugly time of legalization of homophobia in the country's constitution.

  20. [Comparison of human papilloma virus infection status between men who have sex with men recruited from gay bathhouses and HIV voluntary counseling and testing clinics respectively in Urumqi].

    Science.gov (United States)

    Tian, T; Cai, A J; Huang, B X; Abidan, Ainiwaer; Wang, H; Dai, J H

    2017-01-10

    Objective: To understand the human papilloma virus (HPV) infection status in men who have sex with men (MSM) recruited from gay bathhouses and HIV voluntary counseling and testing (VCT) clinics in Urumqi, Xinjiang Uygur autonomous region, and identify the associated risk factors. Methods: A total of 200 MSM aged ≥18 years were recruited by using the " snowballing" sampling method from gay bathhouses and VCT clinics in Urumqi during March-May, 2016. The MSM recruited completed questionnaires after filling in the informed consent form. The information about their demographic characteristics and sexual behaviors were collected, and anal swabs were collected from them for HPV genotyping. Results: The overall HPV infection rate was 54.0 % . The HPV infection rate was 66.7 % (74/111) in MSM from gay bathhouses and 38.2 % (34/89) in MSM from VCT clinics and the high risk type HPV infection rate was 39.6 % (44/111) in MSM from gay bathhouses and 14.6 % (13/89) in MSM from VCT clinics, the differences were significant ( χ (2)=16.112, P <0.05; χ (2)=15.190, P <0.05). Multiple logistic regression analysis indicated that the major risk factors for HPV infection included activity in gay bathhouse ( OR =3.732, 95 % CI : 1.950-7.141) and anal sexual behavior ( OR =2.555, 95 %CI : 1.329-4.912). Conclusion: The prevalence of HPV in MSM from gay bathhouses was higher than that in MSM from VCT clinics, indicating that close attention should be paid to the behavior intervention in MSM.

  1. Alcoholics anonymous, other 12-step movements and psychotherapy in the US population, 1990.

    Science.gov (United States)

    Room, R; Greenfield, T

    1993-04-01

    Based on the 1990 US National Alcohol Survey, this note provides the first available comprehensive findings on self-reported utilization of a variety of sources of personal support and counselling for alcohol and other problems. Respondents were queried about lifetime attendance and number of times they went to identified sources of help in the prior year. Twelve-step groups included Alcoholics Anonymous, Al-Anon, Adult Children of Alcoholics, and other non-alcohol-oriented groups like Gamblers Anonymous, Narcotics Anonymous, and Overeaters Anonymous; additional questions inquired about support or therapy groups and individual counselling for non-alcohol problems. Of the US adult population, 9% have been to an AA meeting at some time, 3.6% in the prior year, only about one-third of these for problems of their own. About half these percentages, mostly women, have attended Al-Anon. Of the same population, 13.3% indicate ever attending a 12-step meeting (including non-alcohol-oriented groups), 5.3% in the last year. During the prior year a further 2.1% used other support/therapy groups and 5.5% sought individual counselling/therapy for personal problems other than alcohol. In contrast to this high reported utilization, only 4.9% (ever) and 2.3% (12-months) reported going to anyone including AA for a problem (of their own) related to drinking.

  2. Teaching a Human Sexuality Course: What Are Counseling Students Thinking?

    Science.gov (United States)

    Diambra, Joel F.; Pollard, Brittany L.; Gamble, R. M.; Banks, Breanna P.

    2016-01-01

    The pervasiveness of sexual issues in counseling suggests the necessity of educating counseling students about relevant topics. Students enrolled in a human sexuality course anonymously submitted topical questions and secrets/fantasies. Following a content analysis, findings depicted themes of content and tone that provided curricular implications…

  3. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as

  4. HIV prevention among female sex workers in Africa.

    Science.gov (United States)

    Scheibe, A; Drame, F M; Shannon, K

    2012-01-01

    Sex work occurs to meet the demand for sexual services and is a universal phenomenon. In Africa sex work takes many forms and is an important source of income for many women. Yet sex worker reproductive health needs remain largely unmet. The criminalisation of sex work; community and service provider stigma; violence; substance use and limited access to health services and prevention commodities contribute to the high HIV burden evident among female sex workers in Africa. Following UNAIDS' three pillar approach to HIV prevention and sex work we present an overview of current opportunities, barriers and suggestions to improve HIV prevention policy and programming for sex work in Africa. Universal access to a comprehensive package of HIV services is the first pillar. Reproductive health commodities; voluntary and anonymous HIV counselling and testing; treatment of sexually transmitted infections, HIV and opportunistic infections; harm reduction for substance use and psychosocial support services make up the recommended package of services. The second pillar is a sex worker-supportive environment. The inclusion of sex worker programmes within national HIV strategic planning; sex worker-led community mobilisation and the establishment of sex work community networks (comprised of sex workers, health service providers, law enforcers and other stakeholders) enable effective programme implementation and are recommended. The reduction of sex worker vulnerability and addressing structural issues form the final pillar. The decriminalisation of sex work; development of supportive policy; gender equality and economic development are key factors that need to be addressed to increase sex worker resilience. Evidence supports the public health benefit of human rights based approaches to HIV prevention; moralistic and restrictive policy and laws towards sex work are harmful and should be removed. The establishment of these pillars will increase sex worker safety and enhance the

  5. Atheists, agnostics and Alcoholics Anonymous.

    Science.gov (United States)

    Tonigan, J Scott; Miller, W R; Schermer, Carol

    2002-09-01

    In spite of the strong emphasis in AA on spiritual beliefs and practices, findings are mixed about the importance of such beliefs in predicting AA affiliation. This study of the Project MATCH outpatient (N = 952) and aftercare (N = 774) samples tested three hypotheses about the role of client God belief and subsequent AA attendance and benefit, taking into account that some individuals may, in fact, deny the existence of a God. Longitudinal analyses were conducted (N = 1,526) investigating client God beliefs, AA attendance, patterns of AA attendance and alcohol use. Assessments were conducted at intake and in 3-month intervals using the Form 90, Religious Behaviors and Background, and the Alcoholics Anonymous Inventory. 12-Step treatment was significantly more likely to promote pre-post shifts in client God beliefs, and atheist and agnostic clients attended AA significantly less often throughout follow-up relative to clients self-labeled as spiritual and religious. AA attendance, however, was significantly associated with increased abstinence and reductions in drinking intensity regardless of God belief. Finally, no differences in percent days abstinence and drinking intensity were found between atheist and agnostic versus spiritual and religious clients, but clients unsure about their God belief reported significantly higher drinking frequency relative to the other groups. God belief appears to be relatively unimportant in deriving AA-related benefit, but atheist and agnostic clients are less likely to initiate and sustain AA attendance relative to spiritual and religious clients. This apparent reticence to affiliate with AA ought to be clinically recognized when encouraging AA participation.

  6. A Test of Concept Study of At-Home, Self-Administered HIV Testing With Web-Based Peer Counseling Via Video Chat for Men Who Have Sex With Men.

    Science.gov (United States)

    Maksut, Jessica L; Eaton, Lisa A; Siembida, Elizabeth J; Driffin, Daniel D; Baldwin, Robert

    2016-12-14

    Men who have sex with men (MSM), particularly MSM who identify as African-American or Black (BMSM), are the sociodemographic group that is most heavily burdened by the human immunodeficiency virus (HIV) epidemic in the United States. To meet national HIV testing goals, there must be a greater emphasis on novel ways to promote and deliver HIV testing to MSM. Obstacles to standard, clinic-based HIV testing include concerns about stigmatization or recognition at in-person testing sites, as well as the inability to access a testing site due to logistical barriers. This study examined the feasibility of self-administered, at-home HIV testing with Web-based peer counseling to MSM by using an interactive video chatting method. The aims of this study were to (1) determine whether individuals would participate in at-home HIV testing with video chat-based test counseling with a peer counselor, (2) address logistical barriers to HIV testing that individuals who report risk for HIV transmission may experience, and (3) reduce anticipated HIV stigma, a primary psychosocial barrier to HIV testing. In response to the gap in HIV testing, a pilot study was developed and implemented via mailed, at-home HIV test kits, accompanied by HIV counseling with a peer counselor via video chat. A total of 20 MSM were enrolled in this test of concept study, 80% of whom identified as BMSM. All participants reported that at-home HIV testing with a peer counseling via video chat was a satisfying experience. The majority of participants (13/18, 72%) said they would prefer for their next HIV testing and counseling experience to be at home with Web-based video chat peer counseling, as opposed to testing in an office or clinic setting. Participants were less likely to report logistical and emotional barriers to HIV testing at the 6-week and 3-month follow-ups. The results of this study suggest that self-administered HIV testing with Web-based peer counseling is feasible and that MSM find it to be a

  7. The selective adaptation of the alcoholics anonymous program by Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1991-09-01

    This paper is largely based on a year long observation study of Gamblers Anonymous and Alcoholics Anonymous meetings in northern California. The paper argues, contrary to popular assumption, that Gamblers Anonymous is significantly different from Alcoholics Anonymous. Differences, in members' consciousness for example, are discussed. The paper contends that although there is some12 step consciousness in G.A., the dominant consciousness ispage 17 consciousness. The significant differences are attributed to the selective adaptation of the Alcoholics Anonymous program. Several consequences of these differences, such as the central role of a language of the self in A.A. and not in G.A., are highlighted.

  8. A flexible approach to distributed data anonymization.

    Science.gov (United States)

    Kohlmayer, Florian; Prasser, Fabian; Eckert, Claudia; Kuhn, Klaus A

    2014-08-01

    Sensitive biomedical data is often collected from distributed sources, involving different information systems and different organizational units. Local autonomy and legal reasons lead to the need of privacy preserving integration concepts. In this article, we focus on anonymization, which plays an important role for the re-use of clinical data and for the sharing of research data. We present a flexible solution for anonymizing distributed data in the semi-honest model. Prior to the anonymization procedure, an encrypted global view of the dataset is constructed by means of a secure multi-party computing (SMC) protocol. This global representation can then be anonymized. Our approach is not limited to specific anonymization algorithms but provides pre- and postprocessing for a broad spectrum of algorithms and many privacy criteria. We present an extensive analytical and experimental evaluation and discuss which types of methods and criteria are supported. Our prototype demonstrates the approach by implementing k-anonymity, ℓ-diversity, t-closeness and δ-presence with a globally optimal de-identification method in horizontally and vertically distributed setups. The experiments show that our method provides highly competitive performance and offers a practical and flexible solution for anonymizing distributed biomedical datasets. Copyright © 2013 Elsevier Inc. All rights reserved.

  9. 28 CFR 54.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 54.425 Section 54.425 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 54.425 Counseling and use of...

  10. 40 CFR 5.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 5.425 Section 5.425 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 5.425 Counseling and use of...

  11. 44 CFR 19.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling materials. 19.425 Section 19.425 Emergency Management and Assistance FEDERAL... Basis of Sex in Education Programs or Activities Prohibited § 19.425 Counseling and use of appraisal and...

  12. 43 CFR 41.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling materials. 41.425 Section 41.425 Public Lands: Interior Office of the Secretary of the Interior... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 41.425 Counseling and use of...

  13. 15 CFR 8a.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials. 8a.425 Section 8a.425 Commerce and Foreign Trade Office of the Secretary of Commerce... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 8a.425 Counseling and use of...

  14. 41 CFR 101-4.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Counseling and use of appraisal and counseling materials. 101-4.425 Section 101-4.425 Public Contracts and Property Management... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 101-4.425 Counseling and use...

  15. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  16. Counselling Studies.

    Science.gov (United States)

    Feltham, Colin

    2001-01-01

    Proposes that a discipline of "counseling studies" be considered as an extension of counseling and a contribution to social guidance. Suggests features of such a discipline, including: a focus on the individual person; interdisciplinarity; humanistic values; applied and theoretical dialectic; critical attitude; and dynamic nature.…

  17. Stationary Anonymous Sequential Games with Undiscounted Rewards.

    Science.gov (United States)

    Więcek, Piotr; Altman, Eitan

    Stationary anonymous sequential games with undiscounted rewards are a special class of games that combine features from both population games (infinitely many players) with stochastic games. We extend the theory for these games to the cases of total expected reward as well as to the expected average reward. We show that in the anonymous sequential game equilibria correspond to the limits of those of related finite population games as the number of players grows to infinity. We provide examples to illustrate our results.

  18. Marriage Counseling

    Science.gov (United States)

    ... help with many specific issues, including: Communication problems Sexual difficulties Conflicts about child rearing or blended families Substance abuse Anger Infidelity Marriage counseling might also be helpful in cases ...

  19. Marriage Counseling

    Science.gov (United States)

    ... to improve a troubled relationship. You can use marriage counseling to help with many specific issues, including: Communication problems Sexual difficulties Conflicts about child rearing or blended families Substance abuse Anger Infidelity ...

  20. Genetic counseling

    Science.gov (United States)

    ... have a high risk of having babies with Tay-Sachs or Canavan's disease. African-Americans, who may risk ... yours to make. Images Genetic counseling and prenatal diagnosis References Simpson JL, Holzgreve W, Driscoll DA. Genetic ...

  1. Anon-Pass: Practical Anonymous Subscriptions

    Science.gov (United States)

    Lee, Michael Z.; Dunn, Alan M.; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2014-01-01

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider’s desire for a long epoch (to reduce server-side computation) versus users’ desire for a short epoch (so they can repeatedly “re-anonymize” their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081

  2. Is it OK to be an Anonymous?

    Directory of Open Access Journals (Sweden)

    Philip Serracino-Inglott

    2013-12-01

    Full Text Available Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between formal norm enforcement practice and Internet natives’ experience of it. Anons are more like eco-warriors than terrorists. While their actions are contentious, their force is framed in a vision of common good that is not unreasonable. Engaging with online deviants is shown to be a productive way of identifying the weaknesses in concepts underpinning moral evaluation of Internet-enabled phenomena.

  3. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    Science.gov (United States)

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  4. Scalable and Anonymous Group Communication with MTor

    Directory of Open Access Journals (Sweden)

    Lin Dong

    2016-04-01

    Full Text Available This paper presents MTor, a low-latency anonymous group communication system. We construct MTor as an extension to Tor, allowing the construction of multi-source multicast trees on top of the existing Tor infrastructure. MTor does not depend on an external service to broker the group communication, and avoids central points of failure and trust. MTor’s substantial bandwidth savings and graceful scalability enable new classes of anonymous applications that are currently too bandwidth-intensive to be viable through traditional unicast Tor communication-e.g., group file transfer, collaborative editing, streaming video, and real-time audio conferencing.

  5. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    Directory of Open Access Journals (Sweden)

    Sills Eric

    2010-08-01

    Full Text Available Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF and embryo transfer (ET where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  6. Sexual practices among men attending an anonymous HIV testing site in Singapore.

    Science.gov (United States)

    Bishop, G D; Kok, A J; Chan, R K

    1998-06-01

    This study was undertaken to provide an empirical basis for planning safer sex interventions in Singapore by examining the sexual practices of men attending an anonymous HIV testing site. All male clients attending the testing site from January, 1996 to January 1997 were asked to complete an anonymous questionnaire concerning oral and anal sex with men as well as vaginal, oral and anal sex with women within the past year. Questionnaires were obtained from 251 male clients, ranging in age from 17 to 70 years (mean = 30.3). Of these 50.6% reported sex with women only, 39% with men only, 7.2% with both men and women and 3.2% with no one. Condom use was moderately high for anal and vaginal sex but low for oral sex. A risk index based on the riskiness of specific activities showed that bisexuals were the most likely to engage in high risk behaviour whereas homosexuals were the least likely. One factor in the greater riskiness of bisexuals' behaviour appeared to be a higher frequency of unprotected sex with women. These findings provide a preliminary portrait of sexual risk-taking among men in Singapore and suggest the need for continued emphasis on consistent condom use for penetrative sex as well as appropriate precautions for oral sex. The results also suggest the need to develop targeted interventions for bisexuals, particularly with respect to unprotected sex with women.

  7. Whatever Happened to Counseling in Counseling Psychology?

    Science.gov (United States)

    Scheel, Michael J.; Berman, Margit; Friedlander, Myrna L.; Conoley, Collie W.; Duan, Changming; Whiston, Susan C.

    2011-01-01

    A suspected decline in published counseling-related research in "The Counseling Psychologist" ("TCP") and the "Journal of Counseling Psychology" ("JCP") was investigated through content analyses of the two journals from 1979 to 2008. A marked decline in counseling-related research may signify a shift in emphasis away from counseling as the most…

  8. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  9. An outcome study of Gamblers Anonymous.

    Science.gov (United States)

    Stewart, R M; Brown, R I

    1988-02-01

    Retrospective and prospective studies of a total sample of 232 attenders at groups of Gamblers Anonymous suggest that total abstinence from gambling was maintained by 8% of all comers at one year from first attendance and by 7% at two years.

  10. Anticipating anonymity in screening program databases.

    Science.gov (United States)

    Caballero, Rafael; Sen, Sagar; Nygård, Jan F

    2017-07-01

    In this paper, we propose a technique for improving anonymity in screening program databases to increase the privacy for the participants in these programs. The data generated by the invitation process (screening centre, appointment date) is often made available to researchers for medical research and for evaluation and improvement of the screening program. This information, combined with other personal quasi-identifiers such as the ZIP code, gender or age, can pose a risk of disclosing the identity of the individuals participating in the program, and eventually their test results. We present two algorithms that produce a set of screening appointments that aim to increase anonymity of the resulting dataset. The first one, based on the constraint programming paradigm, defines the optimal appointments, while the second one is a suboptimal heuristic algorithm that can be used with real size datasets. The level of anonymity is measured using the new concept of generalized k-anonymity, which allows us to show the utility of the proposal by means of experiments, both using random data and data based on screening invitations from the Norwegian Cancer Registry. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  12. Psychosocial counselling of identifiable sperm donors.

    Science.gov (United States)

    Visser, M; Mochtar, M H; de Melker, A A; van der Veen, F; Repping, S; Gerrits, T

    2016-05-01

    What do identifiable sperm donors feel about psychosocial counselling? Identifiable sperm donors found it important that psychosocial counselling focused on emotional consequences and on rules and regulations and they expected to have access to psychosocial counselling at the time that donor-offspring actually sought contact. Most studies on sperm donors are on anonymous donors and focus on recruitment, financial compensation, anonymity and motivations. There is limited knowledge on the value that identifiable sperm donors place on psychosocial counselling and what their needs are in this respect. We performed a qualitative study from March until June 2014 with 25 identifiable sperm donors, who were or had been a donor at the Centre for Reproductive Medicine of the Academic Medical Centre in Amsterdam any time between 1989 and 2014. We held semi-structured in-depth interviews with identifiable sperm donors with an average age of 44 years. The interviews were fully transcribed and analysed using the constant comparative method of grounded theory. Twelve out of 15 donors (former donors ITALIC! n = 8, active donors ITALIC! n = 7) who had received a counselling session during their intake procedure found it important that they had been able to talk about issues such as the emotional consequences of donation, disclosure to their own children, family and friends, future contact with donor-offspring and rules and regulations. Of the 10 former donors who had received no counselling session, 8 had regretted the lack of intensive counselling. In the years following their donation, most donors simply wanted to know how many offspring had been born using their sperm and had no need for further counselling. Nevertheless, they frequently mentioned that they were concerned about the well-being of 'their' offspring. In addition, they would value the availability of psychosocial counselling in the event that donor-offspring actually sought contact. A limitation of our study is its

  13. Genetic Counseling.

    Science.gov (United States)

    Exceptional Parent, 1987

    1987-01-01

    Information is presented on a number of tests used in genetic counseling (e.g., genetic evaluation, chromosome evaluation, consideration of multifactorial conditions, prenatal testing, and chorionic villus sampling) which help parents with one disabled child make family planning decisions. (CB)

  14. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as does multi-casting one message to a receiver population containing the intended receiver...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...... for the considered scenario, and which are too weak or too strong. Here, we show that weak robustness is necessary but that so-called strong robustness is unnecessarily strong in that it does not construct a (natural) stronger resource....

  15. Academic freedom, public reactions, and anonymity.

    Science.gov (United States)

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims. © 2014 John Wiley & Sons Ltd.

  16. Online counseling: a narrative and critical review of the literature.

    Science.gov (United States)

    Richards, Derek; Viganó, Noemi

    2013-09-01

    This article aimed to critically review the literature on online counseling. Database and hand-searches were made using search terms and eligibility criteria, yielding a total of 123 studies. The review begins with what characterizes online counseling. Outcome and process research in online counseling is reviewed. Features and cyberbehaviors of online counseling such as anonymity and disinhibition, convenience, time-delay, the loss of social signaling, and writing behavior in cyberspace are discussed. Ethical behavior, professional training, client suitability, and clients' and therapists' attitudes and experiences of online counseling are reviewed. A growing body of knowledge to date is positive in showing that online counseling can have a similar impact and is capable of replicating the facilitative conditions as face-to-face encounters. A need remains for stronger empirical evidence to establish efficacy and effectiveness and to understand better the unique mediating and facilitative variables. © 2013 Wiley Periodicals, Inc.

  17. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  18. Anonymous quantum communications using the quantum one-time pad

    International Nuclear Information System (INIS)

    Wang, Qing-Le; Gao, Fei-; Liu, Bin; Song, Ting-Ting; Wen, Qiao-Yan

    2015-01-01

    We present the first quantum secure communication protocol for an anonymous receiver without the assistance of anonymous entanglement. In previous works, if a public sender wants to send quantum messages to a chosen receiver while protecting the identity of the receiver from others, all participants should cooperate first to construct the entanglement between the sender and the anonymous receiver. This is the most important process in anonymous quantum communications. With anonymous entanglement, the sender can communicate quantum messages to the anonymous receiver by applying teleportation protocols. In contrast, our protocol is novel and achieves communication of quantum messages directly from the public sender to the anonymous receiver based on the quantum one-time pad and current achievements. Notably, the anonymity of the receiver, as well as the privacy of the quantum messages, is perfectly protected with the exception of an exponentially small probability in our protocol. (paper)

  19. Study on Privacy Protection Algorithm Based on K-Anonymity

    Science.gov (United States)

    FeiFei, Zhao; LiFeng, Dong; Kun, Wang; Yang, Li

    Basing on the study of K-Anonymity algorithm in privacy protection issue, this paper proposed a "Degree Priority" method of visiting Lattice nodes on the generalization tree to improve the performance of K-Anonymity algorithm. This paper also proposed a "Two Times K-anonymity" methods to reduce the information loss in the process of K-Anonymity. Finally, we used experimental results to demonstrate the effectiveness of these methods.

  20. Assessing Anonymous Communication on the Internet: Policy Deliberations.

    Science.gov (United States)

    Kling, Rob; Lee, Yaching; Frankel, Mark S.; Teich, Al

    1999-01-01

    Examines the social character of anonymous online communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. Explains some of the new technological supports for anonymous communication on the Internet. Discusses some of the nuances behind the controversies and policy…

  1. Anonymity: An Impediment to Performance in Healthcare

    Directory of Open Access Journals (Sweden)

    Daniel W. Karlsberg

    2014-01-01

    Full Text Available Many teaching hospitals employ a care team structure composed of a broad range of healthcare providers with different skill sets. Each member of this team has a distinct role and a different level of training ranging from attending physician to resident, intern, and medical student. Often times, these different roles lead to greater complexity and confusion for both patients and nursing staff. It has been demonstrated that patients have a great degree of difficulty in identifying members of their care team. This anonymity also exists between nursing staff and other care providers. In order to better understand the magnitude of anonymity within the teaching hospital, a ten-question survey was sent to nurses across three different departments. Results from this survey demonstrated that 71% of nurses are “Always” or “Often” able to identify which care team is responsible for their patients, while 79% of nurses reported that they either “Often” or “Sometimes” page a provider who is not currently caring for a given patient. Furthermore, 33% of nurses felt that they were either “Rarely” or “Never” able to recognize, by face and name, attending level providers. Residents were “Rarely” or “Never” recognized by face and name 37% of the time, and interns 42% of the time. Contacting the wrong provider repeatedly leads to de facto delays in medication, therapy, and diagnosis. Additionally, these unnecessary interruptions slow workflow for both nurses and members of the care team, making hospital care less efficient and safe overall. Technological systems should focus on reducing anonymity within the hospital in order to enhance healthcare delivery.

  2. Suicidal behavior among members of Gamblers Anonymous.

    Science.gov (United States)

    Frank, M L; Lester, D; Wexler, A

    1991-09-01

    A national sample of 500 members of Gamblers Anonymous was surveyed by mail in order to gather information on suicidal history. One hundred sixty two usable surveys were returned representing 32.4% of the original sample. Compulsive gamblers who had a history of suicidal preoccupation began gambling at an earlier age than nonsuicidal gamblers and were more likely to have stolen to support their gambling. They also tended to have addicted relatives and children more than nonsuicidal gamblers did. The data suggest that those gamblers who had been suicidal tend to be more serious gamblers than nonsuicidal respondents.

  3. Sister-sister incest: data from an anonymous computerized survey.

    Science.gov (United States)

    Stroebel, Sandra S; O'Keefe, Stephen L; Griffee, Karen; Kuo, Shih-Ya; Beard, Keith W; Kommor, Martin J

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using a computer-assisted self-interview. Thirty-one participants were victims of sister-sister incest, 40 were victims of brother-sister incest, 19 were victims of father-daughter incest, 8 were victims of sexual abuse by an adult female (including one mother), and 232 were victims of sexual abuse by an adult male other than their father before reaching 18 years of age. The rest (1,203) served as controls. The victims of sister-sister incest had significantly more problematic outcomes than controls on many measures as adults. Victims of sister-sister incest were more depressed and more likely than controls to be distant from the perpetrator-sister and to have traded sex for money, experienced an unplanned pregnancy, engaged in four different types of masturbation, and engaged in 13 different same-sex behaviors. Our findings were consistent with other reports of early eroticization and persistent hypereroticization of incest victims.

  4. High HIV incidence among men who have sex with men attending a community-based voluntary counselling and testing service in Barcelona, Spain: results from the ITACA cohort.

    Science.gov (United States)

    Ferrer, Laia; Loureiro, Eva; Meulbroek, Michael; Folch, Cinta; Perez, Felix; Esteve, Anna; Saz, Jorge; Taboada, Hector; Pujol, Ferran; Casabona, Jordi

    2016-02-01

    To identify the HIV incidence and its associated factors (AFs) of the ITACA, a community-based cohort of HIV-negative men who have sex with men (MSM) established in Barcelona, Spain from 2008 to 2011. Participants were men aged 18 years or older, having a negative HIV test result at baseline and agreeing to participate. Bio-behavioural data were collected by peers in each visit. HIV incidence rates using person-time measures and 95% CIs were calculated. Cox logistic regression models were used to identify AFs to seroconversion. Over the period, 3544 participants with at least one follow-up visit or those who had a first visit no longer than a year prior to the date of data censoring were included in the analysis contributing 3567.09 person-year (p-y) and 85 MSM seroconverted for an overall HIV incidence of 2.4 per 100 p-y (95% CI 1.9 to 2.9) ranging from 1.21/100 (2009) to 3.1/100 p-y (2011). Independent AF included: foreign origin, having more than five HIV tests at baseline, reporting in the preceding 6 months the following: condomless anal sex with the last steady partner of unknown serostatus, more than 10 casual partners, condomless anal sex with casual partner, self-reported gonorrhoea and entered in the cohort in 2010 or 2011. The ITACA cohort revealed a high and increasing HIV incidence among MSM, especially important among foreign-born men. The findings underscore the need to implement multilevel interventions for MSM taking into account different types of partners, cultural origins and the exposure to other sexually transmitted infections. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  5. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  6. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    Science.gov (United States)

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  7. Anonymous HIV surveillance in Saughton Prison, Edinburgh.

    Science.gov (United States)

    Bird, A G; Gore, S M; Jolliffe, D W; Burns, S M

    1992-07-01

    To estimate the prevalence of HIV by anonymous saliva testing in Her Majesty's Prison, Saughton (Saughton Prison), Edinburgh, UK. To elicit linked anonymous risk factor information from which to estimate risk scores for those who had taken an HIV blood test and, among drug injectors, for those who were HIV-1-antibody-positive on saliva testing. Saughton Prison on 15 and 16 August 1991; HIV Immunology and Regional Virus Laboratories, Edinburgh, and the Medical Research Council Biostatistics Unit, Cambridge, UK. Male inmates (378 out of a total of 499) of Saughton Prison. Answers to a brief questionnaire about age, usual residence, present and past custodial sentences, drug injecting and sexual behaviour prior to and in prison, HIV testing and history of acute hepatitis. HIV-1-antibody status was established by saliva testing. Eighteen per cent of participants were injecting drug users (IDU), of whom approximately one-half (47%) had injected while inside prison. Ninety men (26%), including 40 (14%) of 278 participants who had never injected drugs and 77% of IDU participants, had taken an HIV blood test. Nine per cent of all participants and 35% of IDU participants had had an acute attack of hepatitis. Forty-one (62%) of 66 IDU had been imprisoned five or more times before their current prison sentence. After taking account of region of residence, injecting drug history and acute hepatitis, aspects of sentencing and sexual behaviour were not determinants of those who had been tested for HIV. On the study days, 18 out of 499 (3.6%) participants were known to prison medical officers to be HIV-infected. Following saliva testing, HIV prevalence was 17 out of 375 (4.5%) inmates tested. All 17 had at some time 'taken the blood test for HIV' and all had injected non-medically prescribed drugs. Edinburgh residence, age 26-30 years, have injected in prison and having first injected before 1983 all contributed to the risk score for whether an IDU was HIV-1-antibody-positive on

  8. Digital anonymity on the internet : new rules for anonymous electronic transactions? an exploration of the private law implications of digital anonymity

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.; Prins, C.

    2001-01-01

    This article sets out the most important conclusions of the first stage of a study into the dimensions of digital anonymity. It is intended to set out the problem, make people aware of the intricacies of the problem and thus stimulate the debate on useful legal structures for anonymity. The

  9. The k-Anonymity Problem Is Hard

    Science.gov (United States)

    Bonizzoni, Paola; Della Vedova, Gianluca; Dondi, Riccardo

    The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization recently proposed is the k-anonymity. This approach requires that the rows in a table are clustered in sets of size at least k and that all the rows in a cluster are related to the same tuple, after the suppression of some records. The problem has been shown to be NP-hard when the values are over a ternary alphabet, k = 3 and the rows length is unbounded. In this paper we give a lower bound on the approximation of two restrictions of the problem, when the records values are over a binary alphabet and k = 3, and when the records have length at most 8 and k = 4, showing that these restrictions of the problem are APX-hard.

  10. Factors for Personal Counseling among Counseling Trainees

    Science.gov (United States)

    Byrne, J. Stephen; Shufelt, Brett

    2014-01-01

    The present study explored the use of counseling among counselor trainees and the characteristics of consumers and nonconsumers. Approximately 61% of those surveyed (n = 85) reported that they had received counseling, with the majority being mental health counseling trainees. Nonconsumers (n = 54) indicated that they coped with problems in other…

  11. Counseling Psychology and Professional School Counseling

    Science.gov (United States)

    Pope, Mark

    2004-01-01

    This article provides a historical, political, and organizational analysis regarding counseling psychology's involvement in professional school counseling. Issues discussed include collaboration, curriculum and training, and professional identity, as well as the commonalities that bind counselor education/professional school counseling and…

  12. Effects of region of birth, educational level and age on late presentation among men who have sex with men newly diagnosed with HIV in a network of STI/HIV counselling and testing clinics in Spain.

    Science.gov (United States)

    Diaz, A; del Romero, J; Rodriguez, C; Alastrue, I; Belda, J; Bru, F J; Cámara, M M; Junquera, M L; Sanz, I; Viloria, L J; Gil, L; Martínez, E; Gual, F; Landa, M C; Pueyo, I; Ureña, J M; Martínez, B; Varela, J A; Polo, A; Azpiri, M A; Diez, M

    2015-04-09

    This paper analyses late presentation (LP) of HIV infection, and its determinants, among men who have sex with men (MSM) in Spain, newly diagnosed with HIV (2003-2011) in 15 sexually transmitted infection/HIV counselling and testing clinics. LP was defined as  12 months before diagnosis (12-24 months (aOR:1.4; 95% CI:1.0-2.0); > 24 months (aOR:2.2; 95% CI:1.7-3.0)). LP was less likely in MSM reporting a known HIV-infected partner as infection source or symptoms compatible with acute retroviral syndrome. 'Region of birth' interacted with 'educational level' and 'steady partner as infection source': only African and Latin-American MSM with low educational level were more likely to present late; Latin-American men attributing their infection to steady partner, but no other MSM, had LP more frequently. In Spain, HIV testing among MSM should be promoted, especially those > 34 years old and migrants with low educational level. The current recommendation that MSM be tested at least once a year is appropriate.

  13. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre.

    Science.gov (United States)

    Sills, Eric Scott; Mykhaylyshyn, Lyubov O; Dorofeyeva, Ulyana S; Walsh, David J; Salma, Umme; Omar, Ahmed B; Coull, Graham D; David, Ileana A; Brickell, Kathy M; Tsar, Olga M; Walsh, Anthony Ph

    2010-08-11

    This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Among commissioning couples, mean+/-SD female and male age was 41.9 +/- 3.7 and 44.6 +/- 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 +/- 3 yrs (p /=3 yrs for couples enrolling in dual gamete donation, and each had >/=2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  14. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    LENUS (Irish Health Repository)

    Sills, Eric Scott

    2010-08-11

    Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p < 0.001). Infertility duration was ≥3 yrs for couples enrolling in dual gamete donation, and each had ≥2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5\\/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  15. Do women seeking termination of pregnancy need pre-abortion counselling?

    Science.gov (United States)

    Baron, Charlotte; Cameron, Sharon; Johnstone, Anne

    2015-07-01

    Pre-termination counselling is currently voluntary in the UK; however, there has been political debate regarding the introduction of mandatory pre-termination counselling as well as who should be providing the abortion counselling services. To quantify the proportion of women who use pre-termination counselling services and to evaluate their experience. An anonymous self-administered questionnaire of women requesting an abortion at Chalmers Sexual Health Centre and the Royal Infirmary of Edinburgh NHS Lothian from 6 October to 2 December 2014. Only 18 (9%) of the 201 women surveyed reported using pre-termination counselling. The majority of women did not feel counselling was necessary because they were already certain of their decision. Nearly a quarter (22%) of women claimed to not know counselling was available. Women who did use counselling were satisfied with the services they received. The majority of counselling services were provided by the National Health Service and only one woman used a 'pro-life' charity. Women stated that they would prefer face-to-face counselling rather than telephone or Internet-based counselling. Most women do not seem to want or need pre-termination counselling therefore policies aimed at mandatory counselling, would be contrary to women's wishes. Counselling should be targeted at women with risk factors for psychological complications post-termination. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  16. Really not god: Secularization and pragmatism in Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1994-09-01

    The paper argues that despite maintaining the image of a twelve-step organization, the central theme of the history of Gamblers Anonymous (GA) in the United States is the increasing secularization of the program of the recovery. The paper documents the increasing secularization and pragmatism of Gamblers Anonymous, as reflected in key documents, despite the spiritual vision of its founding member. The author speculates on why Gamblers Anonymous took a secularized development path. Further research is called for.

  17. Utility-preserving anonymization for health data publishing.

    Science.gov (United States)

    Lee, Hyukki; Kim, Soohyung; Kim, Jong Wook; Chung, Yon Dohn

    2017-07-11

    Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most commonly used in medical/health data processing. Generalization inevitably causes information loss, and thus, various methods have been proposed to reduce information loss. However, existing generalization-based data anonymization methods cannot avoid excessive information loss and preserve data utility. We propose a utility-preserving anonymization for privacy preserving data publishing (PPDP). To preserve data utility, the proposed method comprises three parts: (1) utility-preserving model, (2) counterfeit record insertion, (3) catalog of the counterfeit records. We also propose an anonymization algorithm using the proposed method. Our anonymization algorithm applies full-domain generalization algorithm. We evaluate our method in comparison with existence method on two aspects, information loss measured through various quality metrics and error rate of analysis result. With all different types of quality metrics, our proposed method show the lower information loss than the existing method. In the real-world EHRs analysis, analysis results show small portion of error between the anonymized data through the proposed method and original data. We propose a new utility-preserving anonymization method and an anonymization algorithm using the proposed method. Through experiments on various datasets, we show that the utility of EHRs anonymized by the proposed method is significantly better than those anonymized by previous approaches.

  18. Counseling Torture Victims.

    Science.gov (United States)

    Whittaker, Shaun R.

    1988-01-01

    Addresses the psychological effects of torture (including solitary confinement) and the implications of torture for counseling and the counseling psychology profession. Discusses counseling issues related to diagnosis of torture victims, treatment, special considerations for counselors, use of testimony as counseling technique, and prognosis.…

  19. P-Sensitive K-Anonymity with Generalization Constraints

    OpenAIRE

    Alina Campan; Traian Marius Truta; Nicholas Cooper

    2010-01-01

    Numerous privacy models based on the k-anonymity property and extending the k-anonymity model have been introduced in the last few years in data privacy research: l-diversity, p-sensitive k-anonymity, (a, k) anonymity, t-closeness, etc. While differing in their methods and quality of their results, they all focus first on masking the data, and then protecting the quality of the data as a whole. We consider a new approach, where requirements on the amount of distortion allowed on the initial d...

  20. Sex and the Filipino adolescent.

    Science.gov (United States)

    Anigan, G

    1979-01-01

    Very little is known about Filipino adolescents. Professional opinion varies enormously as to what is to be considered normal and abnormal. 1 aspect of adolescence which is agreed upon is that it is a period of great change. What brings on puberty is a controversial topic. Nutrition and genetic inheritance have been found to affect the age at which menstruation begins. Environment plays a large role in emotional and social growth. Filipino sex education is rather haphazard. A study of over 5000 adolescents in 1972-73 showed that sexual information was gained principally from pornographic literature, movies, television and friends. Boys also watched strip-tease acts and went to houses of prostitution. 2/3 of males and 3/4 of females had had crushes, while over 1/2 of both sexes had "gone steady" by age 16. Boys fell in love more often and less seriously than did girls. Girls generally have more adjustment problems in adolescence than do boys. Among Filipino adolescents, dating is the top ranking sex-related problem. Both sexes are concerned with what is the proper behavior in dating. Dating is an erotic as well as a social experience for Filipino adolescents. Premarital sexual activity is now receiving more tolerance. Urban males are less concerned with the virginity of their brides, but adults are still intolerant. Perhaps the present generation of adolescents is the harbinger of a new sexual morality. Fertility rates for 15-19 year olds have been declining since the 1960s. However, among adolescents with problems, pregnancy ranks high. Homosexuals are more visible in the Philippines now, as they are being more tolerated. Adolescent fertility is the last great challenge in the family planning field. Problems are unwillingness of counselors to participate in studies and a paucity of basic research. 3 studies are now being conducted in the Metro Manila area. Peer counseling and multiservice centers which provide relative anonymity are 2 approaches which shoul d be

  1. Sex and Fertility After SCI

    Medline Plus

    Full Text Available ... Resources Peer Counseling Blog About Media Donate close search Understanding Spinal Cord Injury What is a Spinal ... male fertility? play_arrow Where can people get information on sex and fertility after a spinal cord ...

  2. Sex and Fertility After SCI

    Medline Plus

    Full Text Available ... Experiences by Topic Resources Peer Counseling Blog About Media Donate ... from Hospital to Home Kim Eberhardt Muir, MS Coping with a New Injury Robin Dorman, PsyD Sex and Fertility After ...

  3. Sex and Fertility After SCI

    Medline Plus

    Full Text Available ... Peer Counseling Blog About Media Donate Spinal Cord Injury Medical Expert Videos Topics menu Topics Sex and Fertility After Spinal Cord Injury Adult Injuries Spinal Cord Injury 101 David Chen, ...

  4. Sex and Fertility After SCI

    Medline Plus

    Full Text Available ... Topic Resources Peer Counseling Blog About Media Donate Spinal Cord Injury Medical Expert Videos Topics menu Topics Sex and Fertility After Spinal Cord Injury Adult Injuries Spinal Cord Injury 101 David Chen, ...

  5. Sex and Fertility After SCI

    Medline Plus

    Full Text Available ... Counseling Blog About Media Donate Spinal Cord Injury Medical Expert Videos Topics menu Topics Sex and Fertility ... injury? What is a Spinal Cord Injury? SCI Medical Experts People Living With SCI Personal Experiences By ...

  6. Sex and Fertility After SCI

    Medline Plus

    Full Text Available ... Topic Resources Peer Counseling Blog About Media Donate Spinal Cord Injury Medical Expert Videos Topics menu Topics Sex and Fertility After Spinal Cord Injury Adult Injuries Spinal Cord Injury 101 David ...

  7. An Applet-based Anonymous Distributed Computing System.

    Science.gov (United States)

    Finkel, David; Wills, Craig E.; Ciaraldi, Michael J.; Amorin, Kevin; Covati, Adam; Lee, Michael

    2001-01-01

    Defines anonymous distributed computing systems and focuses on the specifics of a Java, applet-based approach for large-scale, anonymous, distributed computing on the Internet. Explains the possibility of a large number of computers participating in a single computation and describes a test of the functionality of the system. (Author/LRW)

  8. Nutrition Counselling Practices among General Practitioners in Croatia

    Science.gov (United States)

    Dumic, Albina; Mujkic, Aida; Miskulin, Maja

    2017-01-01

    Chronic non-communicable diseases are a significant public health problem and imbalanced nutrition is one of the most significant risk factor for them. The objective of this study was to examine Croatia’s general practitioners’ nutrition counselling practice and determine the factors that influence such practice. A cross-sectional study was conducted among 444 (17.0%) randomly selected general practitioners (GPs) in Croatia from May to July 2013 via a 32-item anonymous questionnaire. Study showed that 77.0% of participants had provided nutrition counselling exclusively to patients with specific health risks; 18.7% participants had provided nutrition counselling for all patients, regardless of their individual risks, while 4.3% had not provide nutrition counselling. As the most significant stimulating factor for implementing nutrition counselling in their daily work with patients, 55.6% of the participants identified personal interest regarding nutrition and the effects it has on health. The latter factor was more frequently emphasized among female general practitioners (p < 0.001) and general practitioners without chronic diseases (p < 0.001). The most significant barrier for nutrition counselling was lack of time (81.6%). It is necessary to make additional efforts to increase the frequency of nutrition counselling provided by general practitioners in Croatia. The majority of Croatian general practitioners could increase their nutrition counselling practice in order to promote balanced nutrition and improve the overall health status of their patients. PMID:29207514

  9. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish......Whereas the regulatory trend in many European countries has been a move towards openness in donation, Denmark has maintained the possibility of donating and receiving donated sperm completely anonymously. For that reason the supply of donated sperm remains so high that the world’s largest sperm...... model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...

  10. Emotional Intelligence Levels and Counselling Skills of Prospective Psychological Counsellors

    Science.gov (United States)

    Odaci, Hatice; Degerli, Fatma Irem; Bolat, Neslihan

    2017-01-01

    This research aimed to determine the correlation between emotional intelligence (EI) and counselling skills of Turkish prospective psychological counsellors and to investigate differences in both EI and counselling skills in terms of sex, previous experience of group studies, and class levels. Within a correlational pattern, the sample of the…

  11. Benefits of Required Counseling for Counseling Students

    Science.gov (United States)

    Prosek, Elizabeth A.; Holm, Jessica M.; Daly, Cynthia M.

    2013-01-01

    Graduate students experience mental health distress. The authors investigated the benefits of required counseling services at a training clinic for students enrolled in counseling courses. Results indicated that after receiving services, students ("N" = 55) reported decreases in overall problems, depressive symptoms, and anxiety…

  12. A Differentiated Anonymity Algorithm for Social Network Privacy Preservation

    Directory of Open Access Journals (Sweden)

    Yuqin Xie

    2016-12-01

    Full Text Available Devising methods to publish social network data in a form that affords utility without compromising privacy remains a longstanding challenge, while many existing methods based on k-anonymity algorithms on social networks may result in nontrivial utility loss without analyzing the social network topological structure and without considering the attributes of sparse distribution. Toward this objective, we explore the impact of the attributes of sparse distribution on data utility. Firstly, we propose a new utility metric that emphasizes network structure distortion and attribute value loss. Furthermore, we design and implement a differentiated k-anonymity l-diversity social network anonymity algorithm, which seeks to protect users’ privacy in social networks and increase the usability of the published anonymized data. Its key idea is that it divides a node into two child nodes and only anonymizes sensitive values to satisfy anonymity requirements. The evaluation results show that our method can effectively improve the data utility as compared to generalized anonymizing algorithms.

  13. Edo Journal of Counselling

    African Journals Online (AJOL)

    Edo Journal of Counselling, the official publication of Edo Chapter of Counselling Association of Nigeria publishes original well researched and well articulated papers/articles on all issues relating to counselling and psychology that use a variety of appropriate approaches to the conduct of theoretical, empirical and ...

  14. Counselling Communication Skills

    African Journals Online (AJOL)

    Emeka Egbochuku

    This article overviews three extremely important skills within the training of a counselling psychologist environment: active listening, use of questions and silences. It is now a well-established and widely accepted concept that counselling plays a central role in the development of an individual. Counselling is a specialist ...

  15. Unraveling an Old Cloak: k-anonymity for Location Privacy

    OpenAIRE

    Shokri, Reza; Troncoso, Carmela; Diaz, Claudia; Freudiger, Julien; Hubaux, Jean-Pierre

    2010-01-01

    There is a rich collection of literature that aims at protecting the privacy of users querying location-based services. One of the most popular location privacy techniques consists in cloaking users' locations such that k users appear as potential senders of a query, thus achieving k-anonymity. This paper analyzes the effectiveness of k-anonymity approaches for protecting location privacy in the presence of various types of adversaries. The unraveling of the scheme unfolds the inconsistency b...

  16. System for Anonymous Data Collection Based on Group Signature Scheme

    Directory of Open Access Journals (Sweden)

    David Troják

    2016-01-01

    Full Text Available This paper deals with an anonymous data collection in the Internet of Things (IoT. the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

  17. Ethical attitudes of German specialists in reproductive medicine and legal regulation of preimplantation sex selection in Germany.

    Directory of Open Access Journals (Sweden)

    Miriam Wilhelm

    Full Text Available BACKGROUND: Because of its ethical and social implications, preimplantation sex selection is frequently the subject of debates. METHODS: In 2006, we surveyed specialists in reproductive medicine in Germany using an anonymous questionnaire, including sociodemographic data and questions regarding ethical problems occurring in the practice of reproductive medicine. Most questions focused on preimplantation sex selection, including 10 case vignettes, since these enabled us to describe the most difficult and ethically controversial situations. This is the first survey among specialists in reproductive medicine regarding this topic in Germany. RESULTS: 114 specialists in reproductive medicine participated, 72 males (63% and 42 females (37%, average age was 48 years (age range 29-67 years. The majority of respondents (79% favoured a regulation that limits the use of preimplantation sex selection only for medical reasons, such as X-linked diseases (including 18%: summoning an ethics commission for every case. A minority of 18% approved of the use of sex selection for non-medical reasons (4% generally and further 14% for family balancing. 90% had received obvious requests from patients. The highest approval (46% got the counselling guideline against a preimplantation sex selection and advising a normal pregnancy, if preimplantation sex selection would be allowed in Germany. The majority (67% was opposed the personal use of preimplantation sex selection for non-medical reasons, but would think about it in medical cases. In opposite to woman, 14% of the men were in favour of personal use for non-medical reasons (p=0,043. 25% of specialists in reproductive medicine feared that an allowance of preimplantation sex selection would cause a shift in the sex ratio. CONCLUSIONS: The majority of German specialists in reproductive medicine opposes preimplantation sex selection for non-medical reasons while recommending preimplantation sex selection for medical

  18. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  19. Interim policy on establishment and operation of internet open, anonymous information servers and services

    OpenAIRE

    Acting Dean of Computer and Information Services

    1995-01-01

    Purpose. To establish interim NPS general policy regarding establishment and operation of Open, Anonymous Information Servers and Services, such as World Wide Web (http), Gopher, Anonymous FTP, etc...

  20. Prospective parents' intentions regarding disclosure following the removal of donor anonymity.

    Science.gov (United States)

    Crawshaw, Marilyn

    2008-06-01

    This short survey of UK infertility counsellors was designed to determine whether the removal of donor anonymity resulted in noticeable changes in prospective parents' stated intentions regarding disclosure of their origins to any children conceived through donor conception. Members of the British Infertility Counselling Association working in Human Fertilisation and Embryology Authority (HFEA) -- licensed centres, before and after the legal changes, were sent a short questionnaire that included space for free comments (take-up: 62%). Three-quarters reported changes. Of these, two-thirds said prospective parents were more likely to say they would disclose, while less than a tenth said prospective parents were less likely do so. Where no changes were noted, this was primarily because the majority of prospective parents had stated their intention to be open even prior to the legal changes. Possible influences on intentions included: the culture within the centre, moves towards openness within the wider society, and parents' lack of confidence regarding how to go about disclosure. Follow-up studies are needed to improve understanding of whether influences on decision making carry through to patterns of actual disclosure; whether involvement in counselling affects outcomes; and whether access to professional assistance at the time of planned disclosure is helpful.

  1. Counseling in teacher education

    DEFF Research Database (Denmark)

    Mølgaard, Dorthe Busk

    Counseling is about supporting and challenging students in making decisions, being adaptive, seeing opportunities and acquiring self-knowledge. Literaturesearch of articles about counseling research in nordic teacher education 2008-2013 shows no results. We started a participant-orientated pilotp......Counseling is about supporting and challenging students in making decisions, being adaptive, seeing opportunities and acquiring self-knowledge. Literaturesearch of articles about counseling research in nordic teacher education 2008-2013 shows no results. We started a participant......-orientated pilotproject about counseling in teacher education. The aim was to acquire knowledge about how students perceive counseling. This knowledge could help uncover potential areas of development for counselingpractice. In the pilotproject it is tested if the chosen method is suitable for bigger qualitative study...

  2. Does anonymity increase the reporting of mental health symptoms?

    Science.gov (United States)

    Fear, Nicola T; Seddon, Rachel; Jones, Norman; Greenberg, Neil; Wessely, Simon

    2012-09-17

    There is no doubt that the perceived stigma of having a mental disorder acts as a barrier to help seeking. It is possible that personnel may be reluctant to admit to symptoms suggestive of poor mental health when such data can be linked to them, even if their personal details are only used to help them access further care. This may be particularly relevant because individuals who have a mental health problem are more likely to experience barriers to care and hold stigmatizing beliefs. If that is the case, then mental health screening programmers may not be effective in detecting those most in need of care. We aimed to compare mental health symptom reporting when using an anonymous versus identifiable questionnaire among UK military personnel on deployment in Iraq. Survey among UK military personnel using two questionnaires, one was anonymous (n = 315) and one collected contact details (i.e. identifiable, n = 296). Distribution was by alternate allocation. Data were collected in Iraq during January-February 2009. No significant difference in the reporting of symptoms of common mental disorders was found (18.1% of identifiable vs. 22.9% of anonymous participants). UK military personnel were more likely to report sub-threshold and probable PTSD when completing questionnaires anonymously (sub-threshold PTSD: 2.4% of identifiable vs. 5.8% of anonymous participants; probable PTSD: 1.7% of identifiable vs. 4.8% of anonymous participants). Of the 11 barriers to care and perceived social stigma statements considered, those completing the anonymous questionnaire compared to those completing the identifiable questionnaire were more likely to endorse three statements: "leaders discourage the use of mental health services" (9.3% vs. 4.6%), "it would be too embarrassing" (41.6% vs. 32.5%) and "I would be seen as weak" (46.6% vs. 34.2%). We found a significant effect on the reporting of sub-threshold and probable PTSD and certain stigmatizing beliefs (but not common mental

  3. Does anonymity increase the reporting of mental health symptoms?

    Directory of Open Access Journals (Sweden)

    Fear Nicola T

    2012-09-01

    Full Text Available Abstract Background There is no doubt that the perceived stigma of having a mental disorder acts as a barrier to help seeking. It is possible that personnel may be reluctant to admit to symptoms suggestive of poor mental health when such data can be linked to them, even if their personal details are only used to help them access further care. This may be particularly relevant because individuals who have a mental health problem are more likely to experience barriers to care and hold stigmatizing beliefs. If that is the case, then mental health screening programmers may not be effective in detecting those most in need of care. We aimed to compare mental health symptom reporting when using an anonymous versus identifiable questionnaire among UK military personnel on deployment in Iraq. Methods Survey among UK military personnel using two questionnaires, one was anonymous (n = 315 and one collected contact details (i.e. identifiable, n = 296. Distribution was by alternate allocation. Data were collected in Iraq during January-February 2009. Results No significant difference in the reporting of symptoms of common mental disorders was found (18.1% of identifiable vs. 22.9% of anonymous participants. UK military personnel were more likely to report sub-threshold and probable PTSD when completing questionnaires anonymously (sub-threshold PTSD: 2.4% of identifiable vs. 5.8% of anonymous participants; probable PTSD: 1.7% of identifiable vs. 4.8% of anonymous participants. Of the 11 barriers to care and perceived social stigma statements considered, those completing the anonymous questionnaire compared to those completing the identifiable questionnaire were more likely to endorse three statements: “leaders discourage the use of mental health services” (9.3% vs. 4.6%, “it would be too embarrassing” (41.6% vs. 32.5% and “I would be seen as weak” (46.6% vs. 34.2%. Conclusions We found a significant effect on the reporting of sub

  4. Junior Enlisted Counseling Support

    Science.gov (United States)

    2017-12-06

    LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON 19b. TELEPHONE NUMBER (Include area code ) I JUNIOR ENLISTED COUNSELING...counseling, the leader and subordinate conduct a review to identify and discuss the subordinate’s strengths and weaknesses and create an individual...counseling should occur following the initial session (per AR 600-20). Army regulation only requires reviews to be conducted on a quarterly basis for junior

  5. Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation

    Directory of Open Access Journals (Sweden)

    Jia Yaoqi

    2016-10-01

    Full Text Available The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai, which enables clients to cache and distribute web content on behalf of a website. Peer-assisted CDNs bring significant bandwidth savings to website operators and reduce network latency for users. In this work, we show that the current designs of peer-assisted CDNs expose clients to privacy-invasive attacks, enabling one client to infer the set of browsed resources of another client. To alleviate this, we propose an anonymous peer-assisted CDN (APAC, which employs content delivery while providing initiator anonymity (i.e., hiding who sends the resource request and responder anonymity (i.e., hiding who responds to the request for peers. APAC can be a web service, compatible with current browsers and requiring no client-side changes. Our anonymity analysis shows that our APAC design can preserve a higher level of anonymity than state-of-the-art peer-assisted CDNs. In addition, our evaluation demonstrates that APAC can achieve desired performance gains.

  6. Criminal offenses in gamblers anonymous and hospital treated pathological gamblers.

    Science.gov (United States)

    Blaszczynski, A P; McConaghy, N

    1994-06-01

    The purpose of this study was to compare the nature and prevalence of gambling and non-gambling related offenses in samples of pathological gamblers seeking behavioural treatment from a hospital-based program and those attending Gamblers Anonymous. A semi-structured interview schedule obtaining demographic data and details of the nature, frequency, and consequent legal action of criminal offenses committed was administered to 152 consecutive hospital treated pathological gamblers, and 154 Gamblers Anonymous attendees who volunteered to participate in the study. Of the total sample, 59% admitted a gambling-related offense, and 23% to a conviction. There was no difference in the proportion of hospital treated and Gamblers Anonymous subjects who offended. The most common gambling-related offenses were larceny, embezzlement and misappropriation. Gamblers committed a median of ten offenses over an average ten year period of pathological gambling with a median value of $ A 300(1) per offense. The median value for each non-gambling-related offense was $ A 130. Except for the significantly older mean age of Gamblers Anonymous subjects, hospital treated gamblers did not differ from Gamblers Anonymous attenders on relevant demographic features or parameters of gambling behaviour. Findings were interpreted to suggest a possible causal link between pathological gambling and the commission of non-violent property offenses.

  7. Virginia Tech's Cook Counseling Center receives international counseling accreditation

    OpenAIRE

    DeLauder, Rachel

    2010-01-01

    The Virginia Tech Thomas E. Cook Counseling Center has been accredited by the International Association of Counseling Services, Inc., an organization of United States, Canadian, and Australian counseling agencies based in Alexandria, Va.

  8. How to kill gamete donation: retrospective legislation and donor anonymity.

    Science.gov (United States)

    Pennings, Guido

    2012-10-01

    Victoria (Australia) is considering retrospective legislation on the abolition of gamete donor anonymity. Retrospective legislation evokes many negative emotions mainly because it is considered unfair. It also makes it impossible for citizens to organize their life with reasonable certainty of the consequences. Introduction of this law for donor anonymity is defended by the right of the child to know its genetic origins. Against this law, people appeal to the right to privacy and confidentiality of the donor. This paper analyses the arguments for and against a retrospective law on donor anonymity by looking at the conditions that should be respected when two principles (the donor's right to privacy and the child's right to genetic information) have to be balanced. It is concluded that the justification for introducing retrospective law is lacking: the conditions are not fulfilled. Moreover, retroactive laws in the context of gamete donation may jeopardize the whole practice by destroying the trust of candidate donors and recipients in the government.

  9. Anonymous pastoral care for problems pertaining to sexuality.

    Science.gov (United States)

    van Drie, A; Ganzevoort, R R; Spiering, M

    2014-12-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria on the other. We analyzed helpseeking questions of two protestant Christian organizations in the Netherlands providing anonymous pastoral care: Refoweb and EO-Nazorg. Sexual themes were addressed in 19 and 2.3 % of the submitted questions, respectively. Of the helpseekers, 56 % is female, 15 % male, and 29 % unknown. Questions and problems for which people seek anonymous pastoral care focus primarily on premarital abstinence, gender roles, contraception, sexual orientation and masturbation. The authority of the Bible seems to be important for questioners, especially when dealing with ethical questions. Different relations between the normativity of the church tradition and sexual and spiritual health are discussed.

  10. Verifying Anonymous Credential Systems in Applied Pi Calculus

    Science.gov (United States)

    Li, Xiangxi; Zhang, Yu; Deng, Yuxin

    Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user's identity at the same time. A credential system (a.k.a. pseudonym system) usually consists of multiple interactive procedures between users and organizations, including generating pseudonyms, issuing credentials and verifying credentials, which are required to meet various security properties. We propose a general symbolic model (based on the applied pi calculus) for anonymous credential systems and give formal definitions of a few important security properties, including pseudonym and credential unforgeability, credential safety, pseudonym untraceability. We specialize the general formalization and apply it to the verification of a concrete anonymous credential system proposed by Camenisch and Lysyanskaya. The analysis is done automatically with the tool ProVerif and several security properties have been verified.

  11. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  12. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  13. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  14. Anonymizing patient genomic data for public sharing association studies.

    Science.gov (United States)

    Fernandez-Lozano, Carlos; Lopez-Campos, Guillermo; Seoane, Jose A; Lopez-Alonso, Victoria; Dorado, Julian; Martín-Sanchez, Fernando; Pazos, Alejandro

    2013-01-01

    The development of personalized medicine is tightly linked with the correct exploitation of molecular data, especially those associated with the genome sequence along with these use of genomic data there is an increasing demand to share these data for research purposes. Transition of clinical data to research is based in the anonymization of these data so the patient cannot be identified, the use of genomic data poses a great challenge because its nature of identifying data. In this work we have analyzed current methods for genome anonymization and propose a one way encryption method that may enable the process of genomic data sharing accessing only to certain regions of genomes for research purposes.

  15. Multiple Sex Partner and Risk Behaviour Among Secondary School ...

    African Journals Online (AJOL)

    Tanzania is realizing increase in adolescents engaged in multiple sex partner behaviour and premarital sex. The objective of this study was to assess the awareness of multiple sex partner behaviour and risk factors among secondary school students in Moshi, Tanzania. Anonymously, questionnaires were completed by 360 ...

  16. Malpractice in Counseling Neuropsychology.

    Science.gov (United States)

    Woody, Robert Henley

    1992-01-01

    Responds to earlier four articles on integration of counseling psychology and neuropsychology by noting that neuropsychology occurs in settings with high risk of legal complaints. Contends that aspiration to press counseling psychology toward clinical neuropsychology should be filtered through consideration for legal risk. Explores legal…

  17. Publishing International Counseling Articles

    Science.gov (United States)

    Hohenshil, Thomas H.; Amundson, Norman E.

    2011-01-01

    This article begins with a rationale for including international articles in the "Journal of Counseling & Development." Then, 2 general categories of international articles are described. First are articles that provide a general overview of counseling in a particular country. The 2nd category is more general and might involve international…

  18. Counseling in Singapore

    Science.gov (United States)

    Yeo, Lay See; Tan, Soo Yin; Neihart, Maureen F.

    2012-01-01

    Singapore, a tiny island nation, rose from 3rd- to 1st-world status in just 3 decades. Unlike in most developed countries, counseling in Singapore has a short history with faith-based beginnings and currently faces challenges to remain culturally relevant. The authors trace the development of Singapore's counseling services, provide an update…

  19. Special Issue: Leisure Counseling.

    Science.gov (United States)

    Burlew, Larry D., Ed.; And Others

    1992-01-01

    Special issue includes (1) "Introduction" (Burlew); (2) "Leisure Counseling (LC): A Call to Order" (Emerson); (3) "Integrating Leisure into Adult Career Counseling Process" (Pearson); (4) "Developmental Approach to LC Theory" (McDaniels); (5) "LC for the Elderly" (Clark); (6) "LC with AIDS…

  20. Counseling for Empowerment.

    Science.gov (United States)

    McWhirter, Ellen Hawley

    Counseling for empowerment is a complex and multifaceted process that requires, for some, a radical departure from the traditional conceptualization of the helper's role. The process of empowerment demands that professional helpers and their clients take an active, collaborative approach to identifying problems and goals. Drawing from counseling,…

  1. Beyond spaces of counselling

    DEFF Research Database (Denmark)

    Bank, Mads; Nissen, Morten

    2017-01-01

    The article articulates experiments with spatial constructions in two Danish social work agencies, basing on (a) a sketchy genealogical reconstruction of conceptualisations and uses of space in social work and counselling, (b) a search for theoretical resources to articulate new spaces, and (c...... spaces are forms of spatialisations which might be taken as prototypical in attempts to develop social work and counselling...

  2. Counseling Bisexual Clients.

    Science.gov (United States)

    Smiley, Elizabeth B.

    1997-01-01

    Provides a brief conceptual statement about bisexuality. Offers a review of existing research studies, and suggests issues to consider when counseling bisexual clients. Defines bisexuality and discusses prevalence studies, identity development, and implications for counseling. Claims that bisexuality challenges traditional rules about sexual…

  3. Forming Circle Formations of Anonymous Mobile Agents With Order Preservation

    NARCIS (Netherlands)

    Wang, Chen; Xie, Guangming; Cao, Ming

    2013-01-01

    We propose distributed control laws for a group of anonymous mobile agents to form desired circle formations when the agents move in the one-dimensional space of a circle. The agents are modeled by kinematic points. They share the common knowledge of the orientation of the circle, but are oblivious

  4. Leader Election in Anonymous Rings: Franklin Goes Probabilistic

    NARCIS (Netherlands)

    Bakhshi, Rena; Fokkink, Wan; Pang, Jun; van de Pol, Jan Cornelis; Ausiello, G.; Karhumäki, J.; Mauri, G.; Ong, L.

    2008-01-01

    We present a probabilistic leader election algorithm for anonymous, bidirectional, asynchronous rings. It is based on an algorithm from Franklin, augmented with random identity selection, hop counters to detect identity clashes, and round numbers modulo 2. As a result, the algorithm is finite-state,

  5. Leader election in anonymous rings: Franklin goes probabilistic

    NARCIS (Netherlands)

    R. Bakhshi; W.J. Fokkink (Wan); J. Pang; J.C. van de Pol (Jaco); G. Ausiello

    2008-01-01

    htmlabstractWe present a probabilistic leader election algorithm for anonymous, bidirectional, asynchronous rings. It is based on an algorithm from Franklin, augmented with random identity selection, hop counters to detect identity clashes, and round numbers modulo 2. As a result, the algorithm is

  6. Simplifying Itai-Rodeh Leader Election for Anonymous Rings

    NARCIS (Netherlands)

    Fokkink, W.J.; Pang, J.

    2005-01-01

    We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh [A. Itai and M. Rodeh. Symmetry breaking in distributive networks. In Proc. FOCS'81, pp. 150-158. IEEE Computer Society, 1981]. In contrast to the

  7. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...

  8. Circle formation for anonymous mobile robots with order preservation

    NARCIS (Netherlands)

    Wang, Chen; Cao, Ming; Xie, Guangming; Wang, Long

    2012-01-01

    This paper proposes a distributed control law for a group of mobile robots to form any given formation on a circle of a prescribed radius. The robots are modeled by point masses with the constraint that all of them can move only on the circle. In particular, robots are oblivious, anonymous, and

  9. Anonymity versus Perceived Patron Identity in Virtual Reference Transcripts

    Science.gov (United States)

    Roper, Kristin Grabarek; Sobel, Karen

    2012-01-01

    Librarians who provide virtual reference services often perceive that their patrons self-identify to some degree, even when transactions are anonymous. They also develop a sense of patrons' greatest research-related needs over time. In this article, two librarians analyze two years' worth of virtual reference transcripts to determine what patrons…

  10. Who Goes There? Staying Anonymous on the Internet

    Science.gov (United States)

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  11. Does spousal participation in Gamblers Anonymous benefit compulsive gamblers?

    Science.gov (United States)

    Johnson, E E; Nora, R M

    1992-12-01

    Extent of gambling-free periods was compared for 90 compulsive gamblers, 44 with spouses who participated in Gamblers Anonymous and 46 with spouses who did not. Although the results were in the direction of a beneficial effect of spousal participation, the relationship was statistically nonsignificant.

  12. Gamblers anonymous and cognitive-behavioral therapies for pathological gamblers.

    Science.gov (United States)

    Petry, Nancy M

    2005-01-01

    Numerous types of treatments for pathological gambling have been described, but two of the most common are Gamblers Anonymous (GA) and cognitive-behavioral therapy. This paper describes some outcome data associated with the two approaches. It also reviews evidence suggesting that a combined intervention may enhance therapy engagement and reduce relapse rates.

  13. Effectiveness of Parents' Anonymous in Reducing Child Abuse.

    Science.gov (United States)

    Post-Kammer, Phyllis

    1988-01-01

    Studied Parents Anonymous (PA), organization created to provide support group services for families and to develop community awareness of child abuse and neglect, in order to describe function of PA to school counselors for their use as referral source and to determine program's impact on parents' self-concept, understanding of children, and…

  14. Anonymous living liver donation: donor profiles and outcomes.

    Science.gov (United States)

    Reichman, T W; Fox, A; Adcock, L; Wright, L; Abbey, S E; Levy, G; Grant, D R

    2010-09-01

    There are no published series of the assessment process, profiles and outcomes of anonymous, directed or nondirected live liver donation. The outcomes of 29 consecutive potential anonymous liver donors at our center were assessed. We used our standard live liver assessment process, augmented with the following additional acceptance criteria: a logical rationale for donation, a history of social altruism, strong social supports and a willingness to maintain confidentiality of patient information. Seventeen potential donors were rejected and 12 donors were ultimately accepted (six male, six female). All donors were strongly motivated by a desire and sense of responsibility to help others. Four donations were directed toward recipients who undertook media appeals. The donor operations included five left lateral segmentectomies and seven right hepatectomies. The overall donor morbidity was 40% with one patient having a transient Clavien level 3 complication (a pneumothorax). All donors are currently well. None expressed regret about their decision to donate, and all volunteered the opinion that donation had improved their lives. The standard live liver donor assessment process plus our additional requirements appears to provide a robust assessment process for the selection of anonymous live liver donors. Acceptance of anonymous donors enlarges the donor liver pool. © 2010 The Authors Journal compilation © 2010 The American Society of Transplantation and the American Society of Transplant Surgeons.

  15. Father-Daughter Incest: Data from an Anonymous Computerized Survey

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel V. S.; Kommor, Martin J.

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were…

  16. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  17. Policy-Aware Sender Anonymity in Location-Based Services

    Science.gov (United States)

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  18. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually

  19. Social distance and anonymity modulate fairness consideration: An ERP study

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  20. An Analysis of College Students' Anonymous Questions about Human Sexuality.

    Science.gov (United States)

    Valois, Robert F.; Waring, Kathryn A.

    1991-01-01

    Study analyzed the frequency and type of questions about sexuality submitted anonymously by college students in health education courses over five semesters. The most common categories were sexual arousal/response; general anatomy/physiology; contraception; dating/relationships; pregnancy/fertility; and sexually transmitted diseases. The appendix…

  1. "Un-Googling” publications: The ethics and problems of anonymization

    DEFF Research Database (Denmark)

    Shklovski, Irina; Vertesi, Janet

    2013-01-01

    to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...

  2. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    van Drie, A.; Ganzevoort, R.R.; Spiering, M.

    2014-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria

  3. Safe sex

    Science.gov (United States)

    ... sex; Sexually transmitted - safe sex; GC - safe sex; Gonorrhea - safe sex; Herpes - safe sex; HIV - safe sex; ... contact. STIs include: Chlamydia Genital herpes Genital warts Gonorrhea Hepatitis HIV HPV Syphilis STIs are also called ...

  4. Indigenous counseling: A needed area in school counseling in Nigeria

    African Journals Online (AJOL)

    Indigenous counselling has not been given attention in Nigeria's school counselling programme. This counselling gap was created by European colonialism, which succeeded in developing in the minds of the African that anything indigenous is local, unscientific and unorthodox. Indigenous counselling is one of the ...

  5. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    Science.gov (United States)

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  6. Genetic Counseling for Hearing Loss.

    Science.gov (United States)

    Arnos, Kathleen S.

    1997-01-01

    This article addresses epidemiologic and demographic characteristics of hereditary hearing loss and genetic evaluation and counseling. It discusses who should have genetic counseling, the genetic counseling process, and effects of genetics technology on the genetic counseling process. A case study of a 2-year-old with severe sensorineural hearing…

  7. Prenatal Genetic Counseling (For Parents)

    Science.gov (United States)

    ... Safe Videos for Educators Search English Español Prenatal Genetic Counseling KidsHealth / For Parents / Prenatal Genetic Counseling What's in ... how can they help your family? What Is Genetic Counseling? Genetic counseling is the process of: evaluating family ...

  8. Controlling Depersonalized Counseling.

    Science.gov (United States)

    Balistrieri, Tom

    1982-01-01

    Outlines Gestalt therapy techniques to increase active listening and counselor/client involvement in career counseling. Discusses awareness through dialog, role playing or "presentizing," and experiential "presentizing." Presents a sample dialog as illustration. (RC)

  9. HIV sexual risk behavior among black men who meet other men on the internet for sex.

    Science.gov (United States)

    White, Jaclyn M; Mimiaga, Matthew J; Reisner, Sari L; Mayer, Kenneth H

    2013-06-01

    Using the Internet to meet sexual partners is associated with increased HIV risk behavior, including substance use, sex with multiple or anonymous partners, and unprotected anal sex (UAS), among diverse samples of MSM, yet little is known about Internet use and HIV risk among Black MSM specifically. In 2008, a sample of 197 Black MSM completed an interviewer-administered assessment and voluntary HIV counseling and testing. One fifth of the sample (20 %) reported meeting a sexual partner via the Internet in the past 12 months. Men who met sexual partners over the Internet had significantly more male sex partners (M = 13.44, SD = 20.01) than men who did not meet partners in this manner (M = 4.11, SD = 4.14, p Internet, identifying as gay, and lower knowledge about HIV transmission. These findings highlight the unique HIV risk behaviors among Black MSM meeting sexual partners via the Internet and warrant tailoring of prevention activities to address the specific behaviors and social influences that may contribute to increased HIV spread among this population.

  10. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  11. Doctor Anonymous: Creating Contexts for Homosexuality as Mental Illness.

    Science.gov (United States)

    Glass, Guy Fredrick

    2018-03-01

    In this essay, the author describes how he faced institutionalized homophobia during his psychiatric training, and how he later wrote a play inspired by the life of a gay psychiatrist. Despite Freud's supportive stance, homosexuality aroused the antipathy of American organized psychiatry and psychoanalysis and came to be listed as an illness in the Diagnostic and Statistical Manual (DSM). Dr. John E. Fryer outed himself as "Dr. H Anonymous" at a 1972 meeting of the American Psychiatric Association, and the next year homosexuality was removed from the DSM. The 2014 play Doctor Anonymous offers a fictionalized account of this watershed moment in the history of the gay rights movement. The author discusses his own psychotherapeutic work with gay male patients, including those who had previously been treated with conversion therapy, and explores how the play mirrors his own life experience and the experience of his patients.

  12. Anonymous voting for multi-dimensional CV quantum system

    International Nuclear Information System (INIS)

    Shi Rong-Hua; Xiao Yi; Shi Jin-Jing; Guo Ying; Lee, Moon-Ho

    2016-01-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. (paper)

  13. A Secure Mobility Network Authentication Scheme Ensuring User Anonymity

    Directory of Open Access Journals (Sweden)

    Ya-Fen Chang

    2017-12-01

    Full Text Available With the rapid growth of network technologies, users are used to accessing various services with their mobile devices. To ensure security and privacy in mobility networks, proper mechanisms to authenticate the mobile user are essential. In this paper, a mobility network authentication scheme based on elliptic curve cryptography is proposed. In the proposed scheme, a mobile user can be authenticated without revealing who he is for user anonymity, and a session key is also negotiated to protect the following communications. The proposed mobility network authentication scheme is analyzed to show that it can ensure security, user anonymity, and convenience. Moreover, Burrows-Abadi-Needham logic (BAN logic is used to deduce the completeness of the proposed authentication scheme.

  14. Anonymity communication VPN and Tor: a comparative study

    Science.gov (United States)

    Ramadhani, E.

    2018-03-01

    VPN and Tor is a technology based on anonymity communication. These two technologies have their advantage and disadvantage. The objective of this paper is to find the difference between VPN and Tor technologies by comparing their security of communication on the public network based on the CIA triad concept. The comparative study in this paper is based on the survey method. At last, the result of this paper is a recommendation on when to use a VPN and Tor to secure communication

  15. Can anonymous posters on medical forums be reidentified?

    Science.gov (United States)

    Bobicev, Victoria; Sokolova, Marina; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-10-03

    Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. The messages were labeled by nicknames of the forum participants. We evaluated the system's performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being

  16. Gamblers Anonymous as a Recovery Pathway: A Scoping Review

    OpenAIRE

    Schuler, Andr?e; Ferentzy, Peter; Turner, Nigel E.; Skinner, Wayne; McIsaac, Kathryn E.; Ziegler, Carolyn P.; Matheson, Flora I.

    2016-01-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligi...

  17. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  18. Enhancing physicians' use of Alcoholics Anonymous: Internet-based training.

    Science.gov (United States)

    Sellers, Brealyn; Galanter, Marc; Dermatis, Helen; Nachbar, Martin

    2005-01-01

    Alcoholics Anonymous is not yet fully employed by the medical community as a means to enhance patient outcome. The purpose of this study was to evaluate visitors' use of an Internet course on Alcoholics Anonymous, and to compare how various disciplines learned about, gained access to and participated in the course. Demographic information was collected from 414 visitors to the course. 64% of the 414 respondents received their last educational degree within the last 10 years, and had an interest in the topic of addiction prior to their accessing the site. 294 (71%) of those who accessed the course completed it, and those who accessed it learned about it from various sources other than print advertisement in professional journals. Within the 230 physician respondents, 143 (62%) were psychiatrists, 82 (78%) of whom learned about the Internet course via professional journal. Given the need for further training among physicians in the use of Alcoholics Anonymous, the Internet can be utilized to make information available to a large number of people. Because it allows the user to access information outside the traditional means, the barriers to its use are minimal, and it has the potential to effectively convey useful clinical information.

  19. k-Degree Anonymity Model for Social Network Data Publishing

    Directory of Open Access Journals (Sweden)

    MACWAN, K. R.

    2017-11-01

    Full Text Available Publicly accessible platform for social networking has gained special attraction because of its easy data sharing. Data generated on such social network is analyzed for various activities like marketing, social psychology, etc. This requires preservation of sensitive attributes before it becomes easily accessible. Simply removing the personal identities of the users before publishing data is not enough to maintain the privacy of the individuals. The structure of the social network data itself reveals much information regarding its users and their connections. To resolve this problem, k-degree anonymous method is adopted. It emphasizes on the modification of the graph to provide at least k number of nodes that contain the same degree. However, this approach is not efficient on a huge amount of social data and the modification of the original data fails to maintain data usefulness. In addition to this, the current anonymization approaches focus on a degree sequence-based graph model which leads to major modification of the graph topological properties. In this paper, we have proposed an improved k-degree anonymity model that retain the social network structural properties and also to provide privacy to the individuals. Utility measurement approach for community based graph model is used to verify the performance of the proposed technique.

  20. All or Nothing: The False Promise of Anonymity

    Directory of Open Access Journals (Sweden)

    Neil Walker

    2017-05-01

    Full Text Available In early 2016, the International Committee of Medical Journal Editors (ICMJE proposed that responsible sharing of de-identified individual-level data be required for clinical trials published in their affiliated journals. There would be a delay in implementing this policy to allow for the necessary informed consents to work their way through ethical review. Meanwhile, some researchers and policy makers have conflated the notions of de-identification and anonymity. The former is a process that seeks to mitigate disclosure risk though careful application of rules and statistical analysis, while the latter is an absolute state. The consequence of confusing the process and the state is profound. Extensions to the ICMJE proposal based on the presumed anonymity of data include: sharing unconsented data; sharing data without managing access, as Open Data; and proposals to sell data. This essay aims to show that anonymity (the state cannot be guaranteed by de-identification (the process, and so these extensions to the ICMJE proposal should be rejected on governance grounds, if no other. This is not as negative a position as it might seem, as other disciplines have been aware of these limitations and concomitant responsibilities for many years. The essay concludes with an example from social science of managed access strategies that could be adopted by the medical field.

  1. 38 CFR 21.3100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.3100.... Chapter 35 Counseling § 21.3100 Counseling. (a) Purpose of counseling. The purpose of counseling is to...)) (b) Availability of counseling. Counseling assistance is available for— (1) Identifying and removing...

  2. [Counseling at the hospital].

    Science.gov (United States)

    Hahn, M

    1989-11-01

    In the counselling of patients by the hospital social service, personal assistance and initiation of medical, vocational and social rehabilitation measures are intertwined. Counselling methods, scope, contents and goals are determined by the objective medical facts at hand as well as the subjective needs present in the individual case, and are limited by the structure of the hospital and its responsibility for acute care. Complementary to person- and problem-centered counselling with patients and their relatives as the nucleus of psychosocial coping with illness and disability, the hospital social service cooperates with the whole range of clinical professions involved in the individual case in reintegrating the patient, in particular with the physicians in charge of establishing the indication for rehabilitative measure, as well as with the entire range of rehabilitation carriers, with extra-clinical facilities and services within the health care/social protection system. Evaluation, which would be necessary in view of outcome control and increased effectiveness of the counselling services provided in the hospital, does not occur so far. (Case examples are given to illustrate hospital-based counselling work.)

  3. Traveling the Silk Road: A Measurement of a Large Anonymous Online Marketplace

    Science.gov (United States)

    2012-11-28

    Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather...analysis of Silk Road, an anonymous, international on- line marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We...anonymity, Silk Road needs to also preserve payment anonymity. To that effect, Silk Road only supports Bitcoin (BTC, [30]) as a trading currency

  4. Clients' Willingness to Incorporate Religion or Spirituality in Counseling: A Brief Report

    Science.gov (United States)

    Diallo, Abdoulaye

    2013-01-01

    A total of 84 individuals with addiction issues (e.g., drugs, sex, weight, food, and codependency) were asked about their willingness to incorporate religion or spirituality in their counseling. These respondents expressed willingness to deal with religion or spirituality in counseling if the counselor was knowledgeable about their religion or…

  5. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  6. Resisting stigma, embracing solidarity: An ethnographic study of shopaholics anonymous

    Directory of Open Access Journals (Sweden)

    Rachel Demerling

    2011-03-01

    Full Text Available In recent years, an increased interest in the phenomenon of compulsive buying, which is better known as “shopaholism”, has occurred. This behaviour has been conceptualized as being an uncontrollable urge to purchase things which is pleasurable for an individual or relieves their distress and which results in negative consequences for that individual. This article examines the experiences of individuals within a Shopaholics Anonymous group to understand why individuals decide to join a support group and explore the dynamics of interaction among participants and how that shapes the outcome of their addiction.

  7. Business Information Exchange System with Security, Privacy, and Anonymity

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-01-01

    Full Text Available Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

  8. The Ghosts of Counseling Psychology: Is Counseling Research Really Dead?

    Science.gov (United States)

    Murdock, Nancy L.

    2011-01-01

    Scheel et al. offer an interesting analysis on the publication rate of counseling-related research articles in counseling psychology's two major journals. In this reaction to their work, the author considers various aspects of their results and contemplates possible explanations for the decline of counseling-related publications. The author…

  9. Evaluation of a nurse-led haemophilia counselling service.

    LENUS (Irish Health Repository)

    O'Shea, Eadaoln

    2012-01-01

    Genetic counselling and testing for females with a family history of haemophilia has long been advocated. However, there is little research in regard to clients\\' satisfaction with the existing counselling models in haemophilia, and in particular with nurse-led clinics. The purpose of this study was to evaluate whether clients were satisfied with a nurse-led carrier testing clinic and counselling service. A retrospective quantitative study of clients\\' satisfaction and perceived knowledge was undertaken using an anonymous questionnaire. A sample of 42 women who had attended the clinic in the last 12 months was identified. The response rate for the study was 71% (n = 30).Two thirds of the respondents were 35 years of age or younger, 93% had a family history of haemophilia and 56% were diagnosed as carriers. Perceived understanding and knowledge increased significantly between the first and second appointments (p < 0.001). Overall, the study identified a high level of client satisfaction with the nurse-led carrier testing clinic and counselling service.

  10. 20 Questions of Gamblers Anonymous: A Psychometric Study with Population of Spain.

    Science.gov (United States)

    Ursua, María Prieto; Uribelarrea, Luis Llavona

    1998-01-01

    The authors present a psychometric study of the questionnaire proposed by the Gamblers Anonymous organization for the self-assessment of problem gambling. The study was carried out in Spain with two samples: one of 127 problem gamblers (mean age: 41.67; sex: 78.7% men; mean duration of the problem: 5 years) and the other of 142 social gamblers (mean age: 38.46; sex: 60% men). The questionnaire was self-applied, in the presence of one of the investigators in case any doubts arose. The results indicate that it is a good screening instrument, with high reliability (Cronbach's alpha = 0.94), good covergent validity (the correlation with the SOGS questionnaire is high (r = 0.94; p < 0.001)), good factorial validity (the questionnaire's structure is unidimensional and coherent (just one factor explains more than 50% of the variance)), and its discriminative power is high (diagnostic efficacy = 98.88%). The study offers a comparative analysis of this instrument with other measures of problem gambling, emphasizing its extraordinary performance.

  11. Effects Of Sexuality Counselling Education On Attitudes Of Ss1 ...

    African Journals Online (AJOL)

    This study was motivated by the increasing incidence of sexual misbehaviour among adolescents in secondary schools. It was therefore designed to examine the effects of sexuality counselling education on adolescents' attitude to sex and sexual behavivour using the pre-post test experimental design. The study examined ...

  12. A Maslovian Counseling Method.

    Science.gov (United States)

    Kirkpatrick, J. Stephen

    1979-01-01

    With Maslow's hierarchy as a basis, the model provides structure for setting goals in counseling cases and overall programs. Different kinds of client concerns are identified, and suggestions are made for using these 14 categories. The article includes specific suggestions for using the model in diagnosis, evaluation, counselor education, and…

  13. Counseling Skills for Teachers

    Science.gov (United States)

    Kottler, Jeffrey A.; Kottler, Ellen

    2006-01-01

    By necessity, today's teachers do much more than deliver instruction. In the classroom, on the playground, or even in the parking lot, teachers are often called upon to respond quickly and appropriately to students' social and emotional needs, drawing from instinct more than anything else. In this second edition of "Counseling Skills for…

  14. Counseling Abused Children.

    Science.gov (United States)

    McFadden, Emily Jean

    This guide on counseling abused children was written to help counselors meet the needs of children and adolescents and to provide ways of working with the child's family. Chapter 1 presents an overview of child maltreatment by identifying types of maltreatment (neglect, physical abuse, sexual abuse and exploitation, and emotional abuse or neglect)…

  15. The Counseling & Guidance Curriculum.

    Science.gov (United States)

    Ediger, Marlow

    Counseling and guidance services are vital in any school curriculum. Counselors may themselves be dealing with students of diverse abilities and handicaps. Counselors may have to work with students affected by drug addiction, fetal alcohol syndrome, homelessness, poverty, Acquired Immune Deficiency Syndrome (AIDS) and divorce. Students may present…

  16. Counseling in Italy

    Science.gov (United States)

    Remley, Theodore P.; Bacchini, Eugenio; Krieg, Paul

    2010-01-01

    The counseling profession in Italy is in an early stage of development. No university preparation programs exist, and counselors are not employed in schools. Counselors maintain private practices, work in agencies, and are employed by the government. Counselors receive their preparation in Italy from professional associations in programs that…

  17. Nonexposure Accurate Location K-Anonymity Algorithm in LBS

    Directory of Open Access Journals (Sweden)

    Jinying Jia

    2014-01-01

    Full Text Available This paper tackles location privacy protection in current location-based services (LBS where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. Location cloaking has been proposed and well studied to protect user privacy. It blurs the user’s accurate coordinate and replaces it with a well-shaped cloaked region. However, to obtain such an anonymous spatial region (ASR, nearly all existent cloaking algorithms require knowing the accurate locations of all users. Therefore, location cloaking without exposing the user’s accurate location to any party is urgently needed. In this paper, we present such two nonexposure accurate location cloaking algorithms. They are designed for K-anonymity, and cloaking is performed based on the identifications (IDs of the grid areas which were reported by all the users, instead of directly on their accurate coordinates. Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.

  18. Nonexposure accurate location K-anonymity algorithm in LBS.

    Science.gov (United States)

    Jia, Jinying; Zhang, Fengli

    2014-01-01

    This paper tackles location privacy protection in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. Location cloaking has been proposed and well studied to protect user privacy. It blurs the user's accurate coordinate and replaces it with a well-shaped cloaked region. However, to obtain such an anonymous spatial region (ASR), nearly all existent cloaking algorithms require knowing the accurate locations of all users. Therefore, location cloaking without exposing the user's accurate location to any party is urgently needed. In this paper, we present such two nonexposure accurate location cloaking algorithms. They are designed for K-anonymity, and cloaking is performed based on the identifications (IDs) of the grid areas which were reported by all the users, instead of directly on their accurate coordinates. Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.

  19. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  20. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  1. Abraham Maslow's Legacy for Counseling.

    Science.gov (United States)

    Hoffman, Edward

    1990-01-01

    Reviews the life of Abraham Maslow, a key founder of the humanistic approach to counseling, and his contributions to the counseling field. Maintains that Maslow's innovative work was often misinterpreted by both his admirers and his critics, yet remains highly relevant to current concerns in counseling. (Author/PVV)

  2. Do Counseling and Marketing Mix?

    Science.gov (United States)

    Fong-Beyette, Margaret L.

    1988-01-01

    Responds to Wittman's previous article on counseling and marketing by discussing concerns about two of Wittman's purposes for use of marketing: improved services in consumers and economic survival of counseling profession. Agrees that counseling profession needs to understand basic marketing principles used by business and health care industry;…

  3. A Comparison of Telephone Genetic Counseling and In-Person Genetic Counseling from the Genetic Counselor's Perspective.

    Science.gov (United States)

    Burgess, Kelly R; Carmany, Erin P; Trepanier, Angela M

    2016-02-01

    Growing demand for and limited geographic access to genetic counseling services is increasing the need for alternative service delivery models (SDM) like telephone genetic counseling (TGC). Little research has been done on genetic counselors' perspectives of the practice of TGC. We created an anonymous online survey to assess whether telephone genetic counselors believed the tasks identified in the ABGC (American Board of Genetic Counseling) Practice Analysis were performed similarly or differently in TGC compared to in person genetic counseling (IPGC). If there were differences noted, we sought to determine the nature of the differences and if additional training might be needed to address them. Eighty eight genetic counselors with experience in TGC completed some or all of the survey. Respondents identified differences in 13 (14.8%) of the 88 tasks studied. The tasks identified as most different in TGC were: "establishing rapport through verbal and nonverbal interactions" (60.2%; 50/83 respondents identified the task as different), "recognizing factors affecting the counseling interaction" (47.8%; 32/67), "assessing client/family emotions, support, etc." (40.1%; 27/66) and "educating clients about basic genetic concepts" (35.6%; 26/73). A slight majority (53.8%; 35/65) felt additional training was needed to communicate information without visual aids and more effectively perform psychosocial assessments. In summary, although a majority of genetic counseling tasks are performed similarly between TGC and IPGC, TGC counselors recognize that specific training in the TGC model may be needed to address the key differences.

  4. Characteristics of US Health Care Providers Who Counsel Adolescents on Sports and Energy Drink Consumption.

    Science.gov (United States)

    Xiang, Nan; Wethington, Holly; Onufrak, Stephen; Belay, Brook

    2014-01-01

    Objective. To examine the proportion of health care providers who counsel adolescent patients on sports and energy drink (SED) consumption and the association with provider characteristics. Methods. This is a cross-sectional analysis of a survey of providers who see patients ≤17 years old. The proportion providing regular counseling on sports drinks (SDs), energy drinks (EDs), or both was assessed. Chi-square analyses examined differences in counseling based on provider characteristics. Multivariate logistic regression calculated adjusted odds ratios (aOR) for characteristics independently associated with SED counseling. Results. Overall, 34% of health care providers regularly counseled on both SEDs, with 41% regularly counseling on SDs and 55% regularly counseling on EDs. On adjusted modeling regular SED counseling was associated with the female sex (aOR: 1.44 [95% CI: 1.07-1.93]), high fruit/vegetable intake (aOR: 2.05 [95% CI: 1.54-2.73]), family/general practitioners (aOR: 0.58 [95% CI: 0.41-0.82]) and internists (aOR: 0.37 [95% CI: 0.20-0.70]) versus pediatricians, and group versus individual practices (aOR: 0.59 [95% CI: 0.42-0.84]). Modeling for SD- and ED-specific counseling found similar associations with provider characteristics. Conclusion. The prevalence of regular SED counseling is low overall and varies. Provider education on the significance of SED counseling and consumption is important.

  5. 38 CFR 21.5100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.5100.... Chapter 32 Counseling § 21.5100 Counseling. (a) Purpose. The purpose of counseling is: (1) To assist in... of counseling. Counseling assistance in available for— (1) Identifying and removing reasons for...

  6. Sexual behaviours of clients of sex workers reported within phone calls at HIV/AIDS/STIs Italian Helpline

    Directory of Open Access Journals (Sweden)

    Ilaria Mulieri

    2013-06-01

    Full Text Available BACKGROUND: Clients of sex workers represent a relevant target for interventions aimed at the prevention of HIV and sexually transmitted infections (STIs. Within prevention strategies, the AIDS and sexually transmitted infections helpline (Telefono Verde AIDS/ IST, TVA-IST of National Institute of Health in Italy has provided, since 1987, specific information and counselling interventions. AIM: The present study reports data on anagraphical characteristics and behaviours of clients of sex workers, anonymously reported at TVA-IST in the period 1987-2010. DISCUSSION: Among 95 149 phone calls (14% of the total considered 99.5% came from males, over 80% aged under 37 years and prevalently from Northern Italy. Among sexual behaviours, unprotected sexual intercourses were reported in the 26% of the calls. Subjects under 27 years reported a higher frequency of unprotected anal intercourse, while they used protection with oral and vaginal intercourses in a greater extent than older ones. Due to differential behaviours within clients of sex workers, specific informative strategies for this targeted population should adequately consider age-related differences.

  7. Patient Perspectives on Intimate Partner Violence Discussion during Genetic Counseling Sessions.

    Science.gov (United States)

    Chen, Christina; Greb, Anne; Kalia, Isha; Bajaj, Komal; Klugman, Susan

    2017-04-01

    Intimate partner violence (IPV) is a major health concern in the United States (ACOG 2013). The World Health Organization (WHO) describes IPV as any physical, sexual, psychological harm by a current or former intimate partner (WHO 2016). Due to the psychosocial depth and nature of discussions within genetic counseling sessions, patients may disclose and/or discuss IPV as it relates to sexual well-being, reproductive and overall health. This study aims to assess the role for IPV screening, counseling and intervention in genetic counseling practice by investigating the incidence, experiences and attitudes about IPV among genetic counseling patients. Patients receiving genetic counseling at an urban metropolitan hospital were anonymously surveyed about experiences and perspectives on IPV as a topic of discussion during genetic counseling sessions. Among 60 eligible patients, 50 completed the survey (49 females, 1 male, of which, 5 identified as LGBT) ages 20 to 66. The incidence of IPV in this group was 16.0 % (n = 8). Majority of participants had never been asked about IPV by a healthcare provider (n = 32; 64.0%), would have felt comfortable answering questions about IPV by their healthcare provider (n = 34; 68.0%), and would have felt comfortable answering questions about IPV by their genetic counselor (n = 39; 78.0%). Perspectives from all participants, notably those with IPV history, provided insights to the role of genetic counselors in areas for IPV screening and counseling training.

  8. The Effect of Adolescent Sex Offender Abuse History on Counselor Attitudes.

    Science.gov (United States)

    Carone, Stacia S.; LaFleur, N. Kenneth

    2000-01-01

    Examines judgment of counseling students, with history of sexual or physical abuse, about their attitudes towards counseling adolescent sex offenders. Reports sexually abused counselors desired to see physically abused offenders as clients over sexually abused offenders. Presents implications for counseling, including ways in which nonabused…

  9. Parameterized Complexity of k-Anonymity: Hardness and Tractability

    Science.gov (United States)

    Bonizzoni, Paola; Della Vedova, Gianluca; Dondi, Riccardo; Pirola, Yuri

    The problem of publishing personal data without giving up privacy is becoming increasingly important. A precise formalization that has been recently proposed is the k-anonymity, where the rows of a table are partitioned in clusters of size at least k and all rows in a cluster become the same tuple after the suppression of some entries. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is hard even when the stored values are over a binary alphabet or the table consists of a bounded number of columns. In this paper we study how the complexity of the problem is influenced by different parameters. First we show that the problem is W[1]-hard when parameterized by the value of the solution (and k). Then we exhibit a fixed-parameter algorithm when the problem is parameterized by the number of columns and the number of different values in any column.

  10. Cloud Based Data Protection in Anonymously Controlled SDN

    Directory of Open Access Journals (Sweden)

    Jian Shen

    2018-01-01

    Full Text Available Nowadays, Software Defined Network (SDN develops rapidly for its novel structure which separates the control plane and the data plane of network devices. Many researchers devoted themselves to the study of such a special network. However, some limitations restrict the development of SDN. On the one hand, the single controller in the conventional model bears all threats, and the corruption of it will result in network paralysis. On the other hand, the data will be increasing more in SDN switches in the data plane, while the storage space of these switches is limited. In order to solve the mentioned issues, we propose two corresponding protocols in this paper. Specifically, one is an anonymous protocol in the control plane, and the other is a verifiable outsourcing protocol in the data plane. The evaluation indicates that our protocol is correct, secure, and efficient.

  11. A machine learning methodology for medical imaging anonymization.

    Science.gov (United States)

    Monteiro, Eriksson; Costa, Carlos; Oliveira, Jose Luis

    2015-08-01

    Privacy protection is a major requirement for the complete success of EHR systems, becoming even more critical in collaborative scenarios, where data is shared among institutions and practitioners. While textual data can be easily de-identified, patient data in medical images implies a more elaborate approach. In this work we present a solution for sensitive word identification in medical images based on a combination of two machine-learning models, achieving a F1-score of 0.94. Three experts evaluated the system performance. They analyzed the output of the present methodology and categorized the studies in three groups: studies that had their sensitive words removed (true positive), studies with complete patient identity (false negative) and studies with mistakenly removed data (false positive). The experts were unanimous regarding the relevance of the present tool in collaborative medical environments, as it may improve the exchange of anonymized patient data between institutions.

  12. Protecting whistle-blowers: Anonymity on the internet

    International Nuclear Information System (INIS)

    Guinnessy, P.

    1997-01-01

    Even though strict legislation exists in many countries, it appears that the next few years should be a golden opportunity for groups to successfully monitor and publish the activity of the nuclear states, and human right violations through use of the Internet. The reasons for this are: 1. The Internet is becoming widespread even in repressive regimes; 2. Software is available to either hide messages from others or hide the mailers account; 3. Information from sites in other countries can be easily obtained to be read inside repressive regimes from the Internet. In this regard It is suggested the Pugwash or a similar organization should set up either an anonymous account to receive information or maybe use a more heavily protected cyperpunk remailer. Such an ability would hopefully prompt more people to notify treaty violations

  13. Anonymization of Electronic Medical Records to Support Clinical Analysis

    CERN Document Server

    Gkoulalas-Divanis, Aris

    2013-01-01

    Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for su...

  14. Counseling for medical abortion.

    Science.gov (United States)

    Breitbart, V

    2000-08-01

    Counseling and education are correlated with women's satisfaction with all abortion care. They often assume a larger role in medical abortion because the patient is a more active participant in the abortion process. This article aims to enhance the practitioner's expertise in providing the information and care necessary for women considering early abortion with medical regimens. It offers general counseling guidelines and several likely clinical scenarios regarding the decision-making process, the screening of patients, and the initial and follow-up visits. Through effective communication, practitioners can provide the information and support that patients need to complete the abortion process safely and can help to strengthen women's confidence in managing their reproductive health experiences.

  15. Anonymity versus privacy: selective information sharing in online cancer communities.

    Science.gov (United States)

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  16. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    Science.gov (United States)

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  17. The Pattern of Drug Abuse in Anonymous Adidcts

    Directory of Open Access Journals (Sweden)

    Seyede Maryam Vahdat-Shariat-Panahi

    2010-04-01

    Full Text Available Objective: Having the information about pattern of substance abuse in the community and its epidemiological features is one of the most important protocols for evaluation, follow–up and control of the use of these substances. The aim of this study was to evaluate the patterns of substances abuse among narcotic anonymous (N. A. addicted patients. Materials & Methods: In this descriptive and analytical study, three hundred patients from narcotic abusers anonymous (N. A. association who were referred to a treatment center in Tehran were participated consecutively. The information about demographic characteristics, socioeconomic status, type of drug and the patterns of substance abuse of all cases were collected by researcher made questionnaire. Data were analyzed by Chi–Square test. Results: 80% of the patients were male. Almost 65. 2% of cases aged less than 40 years. More than two–third of cases had free jobs and 21. 2% of them were unemployed. Also, 32% of patients had college degrees. The most common types of abused substance were opium (88%, cigarette (76.7%, and alcohol (63% and 34% of them used substances intravenously. The use of alcohol (P=0.033, cannabis (P<0.001, cocaine (P=0.009 and ecstasy (P<0.001 was more prevalent significantly in the cases less than 40 years old than the elderly. Conclusion: It seems that the trend of substance abuse has been changed to younger population. The pattern of drug abuse in young adults is more toward psychosis drugs such as cocaine and ecstasy.

  18. Unison as a Self-Stabilizing Wave Stream Algorithm in Asynchronous Anonymous Networks

    OpenAIRE

    Boulinier, Christian

    2007-01-01

    Rapport de recherche.; How to pass from local to global scales in anonymous networks? How to organize a selfstabilizing propagation of information with feedback. From the Angluin impossibility results, we cannot elect a leader in a general anonymous network. Thus, it is impossible to build a rooted spanning tree. Many problems can only be solved by probabilistic methods. In this paper we show how to use Unison to design a self-stabilizing barrier synchronization in an anonymous network. We sh...

  19. Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing

    OpenAIRE

    Xiaoxun Sun; Hua Wang; Jiuyong Li; Traian Marius Truta

    2008-01-01

    Publishing data for analysis from a micro data table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-anonymity model was proposed for privacy preserving data publication. While focusing on identity disclosure, k-anonymity model fails to protect attribute disclosure to some extent. Many efforts are made to enhance the k-anonymity model recently. In this paper, we propose two new privacy protection models called (p, a)-...

  20. Attribute Utility Motivated k-anonymization of Datasets to Support the Heterogeneous Needs of Biomedical Researchers

    OpenAIRE

    Ye, Huimin; Chen, Elizabeth S.

    2011-01-01

    In order to support the increasing need to share electronic health data for research purposes, various methods have been proposed for privacy preservation including k-anonymity. Many k-anonymity models provide the same level of anoymization regardless of practical need, which may decrease the utility of the dataset for a particular research study. In this study, we explore extensions to the k-anonymity algorithm that aim to satisfy the heterogeneous needs of different researchers while preser...

  1. Sex Therapy

    Science.gov (United States)

    Sex therapy Overview Sex therapy is a type of psychotherapy — a general term for treating mental health problems by talking with a mental health professional. Through sex therapy, you can address concerns about sexual function, ...

  2. 38 CFR 21.7100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.7100... Bill-Active Duty) Counseling § 21.7100 Counseling. A veteran or servicemember may receive counseling from VA before beginning training and during training. (a) Purpose. The purpose of counseling is (1) To...

  3. 38 CFR 21.3102 - Required counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Required counseling. 21.... Chapter 35 Counseling § 21.3102 Required counseling. (a) Child. The VA counseling psychologist will provide counseling and assist in preparing the educational plan only if the eligible child or his or her...

  4. Use of pooling and outpatient laboratory specimens in an anonymous seroprevalence survey of HIV infection in British Columbia, Canada.

    Science.gov (United States)

    Sherlock, C H; Strathdee, S A; Le, T; Sutherland, D; O'Shaughnessy, M V; Schechter, M T

    1995-08-01

    To conduct an anonymous HIV seroprevalence survey to establish a baseline estimate of HIV seroprevalence in a general population; to evaluate serum pooling and alternative testing strategies as cost-saving measures. Prospective anonymous HIV seroprevalence study using outpatient laboratory specimens. Two large non-hospital-associated outpatient chemistry testing laboratories in the major population centers in British Columbia, Canada. PATIENTS AND SERA: Leftover sera received for chemistry screen testing in outpatient laboratories were provided to the study after chemistry testing was completed. Those from patients aged or = 55 years were excluded. Patient identifiers were erased from samples. Sera were pooled 10:1 and tested by viral lysate enzyme-linked immunosorbent assay (ELISA). Sera from HIV-positive pools were tested individually. All individual HIV-positive specimens were retested for verification of positivity using a recombinant protein ELISA. HIV seroprevalence rates were stratified by sex, age group, and geographic area; and costs of pooling and alternative algorithm strategy were compared with those of conventional methods. A total of 80,238 sera were collected from 66,658 individuals (53% women, 47% men). Of these, 276 men (88.3 per 10,000) and 24 women (6.8 per 10,000) were HIV-seropositive. The highest rates were in those aged 30-34 years, for both men and women. Using pooling and non-Western blot verification saved US$2.07 per specimen, or 80% of the cost for conventional testing. The anonymous outpatient laboratory setting is practicable to obtain a reasonable estimate of HIV seroprevalence rates in a general population. Such studies can be made cost-effective by pooling sera and using alternative confirmatory strategies.

  5. Shoplifting and eating disorders: an anonymous self-administered survey.

    Science.gov (United States)

    Yanase, Maya; Sugihara, Genichi; Murai, Toshiya; Noma, Shun'ichi

    2017-04-28

    To explore the characteristics of eating disorders related to shoplifting behavior and identify the risk and protective factors related to shoplifting among patients with eating disorders. Eighty females with eating disorders were recruited from an eating disorders clinic. They were asked to complete anonymous self-report questionnaires on demographic characteristics, shoplifting behavior, psychological characteristics and eating disorder symptomology. We investigated differences in clinical characteristics between those with and without shoplifting history or a current drive to shoplift. The response rate was 92.5%. Of the respondents, 37.8% reported a history of shoplifting and 16.2% a current drive for shoplifting. The patients with shoplifting history had lower socioeconomic status (SES), higher impulsivity and higher symptom severity of eating disorders compared with those without this history. The patients with a current drive for shoplifting had more depressive symptoms, more severe anxiety, more obsessional traits, and higher symptom severity of eating disorders. Severity of illness and SES seem to have a serious impact on shoplifting behavior among eating disordered patients. These findings may suggest risk and protective factors related to shoplifting among eating disordered patients.

  6. 'Gift without a price tag': altruism in anonymous semen donation.

    Science.gov (United States)

    Yee, Samantha

    2009-01-01

    Commercialization of human gametes is now legally prohibited in Canada under the Assisted Human Reproduction Act 2004, making semen donation in Canada altruistic and anonymous by law. Donors must be altruistically motivated to donate gametes without receiving monetary rewards. Globally speaking, Canada is neither the first nor the only country in the world that has legislation to support altruistic gamete donation. Other countries have advocated similar systems either through legislative changes or implementation of best practice models. This paper is a review of literature assessing the differences in donation behaviours under paid and altruistic donation models. It provides contextual information of the current semen donation situation in Canada, while drawing upon relevant literature and research data from other countries as references. The author also attempts to re-conceptualize the meanings of altruism through exploring the complex interplay between psycho-social and institutional factors in influencing donors' behaviours. Although there is a substantial amount of research studying the impacts on donor recruitment when payment is withdrawn, very few research studies are found that focus on exploring altruistic donor recruitment strategies. It is unrealistic to expect the altruistic donation culture to emerge spontaneously in Canada without any multi-level efforts to coordinate the recruitment strategies. Research programmes are greatly needed to generate empirical knowledge that can guide the development of altruistic donor recruitment models geared to the current socio-cultural environment and legislative framework in Canada. The findings will be invaluable when the legislation comes up for parliamentary review in the near future.

  7. iDASH: integrating data for analysis, anonymization, and sharing

    Science.gov (United States)

    Bafna, Vineet; Boxwala, Aziz A; Chapman, Brian E; Chapman, Wendy W; Chaudhuri, Kamalika; Day, Michele E; Farcas, Claudiu; Heintzman, Nathaniel D; Jiang, Xiaoqian; Kim, Hyeoneui; Kim, Jihoon; Matheny, Michael E; Resnic, Frederic S; Vinterbo, Staal A

    2011-01-01

    iDASH (integrating data for analysis, anonymization, and sharing) is the newest National Center for Biomedical Computing funded by the NIH. It focuses on algorithms and tools for sharing data in a privacy-preserving manner. Foundational privacy technology research performed within iDASH is coupled with innovative engineering for collaborative tool development and data-sharing capabilities in a private Health Insurance Portability and Accountability Act (HIPAA)-certified cloud. Driving Biological Projects, which span different biological levels (from molecules to individuals to populations) and focus on various health conditions, help guide research and development within this Center. Furthermore, training and dissemination efforts connect the Center with its stakeholders and educate data owners and data consumers on how to share and use clinical and biological data. Through these various mechanisms, iDASH implements its goal of providing biomedical and behavioral researchers with access to data, software, and a high-performance computing environment, thus enabling them to generate and test new hypotheses. PMID:22081224

  8. Gamblers Anonymous as a Recovery Pathway: A Scoping Review.

    Science.gov (United States)

    Schuler, Andrée; Ferentzy, Peter; Turner, Nigel E; Skinner, Wayne; McIsaac, Kathryn E; Ziegler, Carolyn P; Matheson, Flora I

    2016-12-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligibility and extracted relevant data from eligible articles. Three reviewers independently assessed the methodological quality of the included studies using the Mixed Methods Appraisal Tool. We identified 17 studies in 25 publications that were eligible for inclusion. Most studies were conducted in the United States, were cross-sectional in design, and involved both male and female adult participants. Results indicate that the evidence for the effectiveness of GA either as a control condition or in conjunction with formal treatment or medication is inconsistent. An emphasis on patience, using the Serenity Prayer as a way to gain acceptance of financial matters and reality, and absolute assertion of identity as a "compulsive gambler" were identified as important aspects of GA's recovery culture. There is a need for large-scale randomized controlled trials to determine GA's effectiveness, as well as research exploring the mechanisms through which GA works, barriers to GA as a recovery approach, and the status of women in the fellowship.

  9. On the Anonymity Risk of Time-Varying User Profiles

    Directory of Open Access Journals (Sweden)

    Silvia Puglisi

    2017-04-01

    Full Text Available Websites and applications use personalisation services to profile their users, collect their patterns and activities and eventually use this data to provide tailored suggestions. User preferences and social interactions are therefore aggregated and analysed. Every time a user publishes a new post or creates a link with another entity, either another user, or some online resource, new information is added to the user profile. Exposing private data does not only reveal information about single users’ preferences, increasing their privacy risk, but can expose more about their network that single actors intended. This mechanism is self-evident in social networks where users receive suggestions based on their friends’ activities. We propose an information-theoretic approach to measure the differential update of the anonymity risk of time-varying user profiles. This expresses how privacy is affected when new content is posted and how much third-party services get to know about the users when a new activity is shared. We use actual Facebook data to show how our model can be applied to a real-world scenario.

  10. Delineating social network data anonymization via random edge perturbation

    KAUST Repository

    Xue, Mingqiang

    2012-01-01

    Social network data analysis raises concerns about the privacy of related entities or individuals. To address this issue, organizations can publish data after simply replacing the identities of individuals with pseudonyms, leaving the overall structure of the social network unchanged. However, it has been shown that attacks based on structural identification (e.g., a walk-based attack) enable an adversary to re-identify selected individuals in an anonymized network. In this paper we explore the capacity of techniques based on random edge perturbation to thwart such attacks. We theoretically establish that any kind of structural identification attack can effectively be prevented using random edge perturbation and show that, surprisingly, important properties of the whole network, as well as of subgraphs thereof, can be accurately calculated and hence data analysis tasks performed on the perturbed data, given that the legitimate data recipient knows the perturbation probability as well. Yet we also examine ways to enhance the walk-based attack, proposing a variant we call probabilistic attack. Nevertheless, we demonstrate that such probabilistic attacks can also be prevented under sufficient perturbation. Eventually, we conduct a thorough theoretical study of the probability of success of any}structural attack as a function of the perturbation probability. Our analysis provides a powerful tool for delineating the identification risk of perturbed social network data; our extensive experiments with synthetic and real datasets confirm our expectations. © 2012 ACM.

  11. Analytic neutrality, anonymity, abstinence, and elective self-disclosure.

    Science.gov (United States)

    Shill, Merton A

    2004-01-01

    Recent contributions to the psychoanalytic literature propose new ways of understanding analytic neutrality, anonymity, abstinence, and self-disclosure. They advocate elective self-disclosure by the analyst as an antidote to the allegedly game-playing quality of transference and resistance analysis. The analytic relationship, they assert, becomes unreal when attempts are made to observe the principles of neutrality and abstinence. Both are seen as ill-conceived because of the irreducible subjectivity and unwarranted authority of the analyst. These relational and interactional views are criticized because (1) they ignore the fact that transference and resistance analysis have from Freud onward been accepted as minimal criteria qualifying a clinical process as psychoanalytic; (2) elective self-disclosure carries metapsychological implications dismissing not only Freud's theory of motivation but motivation as a basic feature of human personality; (3) they do not recognize interpersonal relations as mental events and so do not consider the ego's ability to create intrapsychic representations of object relations; (4) elective self-disclosures within the empathic parameters of the analytic situation are themselves unreal compared to the reality of the patient's experience with other objects. Abstinence and neutrality as ideals facilitate maintenance of an internal holding environment or container for the analyst's countertransference.

  12. Addiction Counseling Accreditation: CACREP's Role in Solidifying the Counseling Profession

    Science.gov (United States)

    Hagedorn, W. Bryce; Culbreth, Jack R.; Cashwell, Craig S.

    2012-01-01

    In this article, the authors discuss the Council for Accreditation of Counseling and Related Educational Programs' (CACREP) role in furthering the specialty of addiction counseling. After sharing a brief history and the role of counselor certification and licensure, the authors share the process whereby CACREP developed the first set of…

  13. Behavior online : Does anonymous computer communication reduce gender inequality?

    NARCIS (Netherlands)

    Postmes, T; Spears, R

    Two studies examined dominance and self-stereotyping in mixed-sex groups who had online discussions. Gender differences in dominance varied as a function of several contextual variables: individuation, the accessibility of gender stereotypes, and the fit between group task and stereotype. Results of

  14. Breastfeeding counsel against cancers

    Directory of Open Access Journals (Sweden)

    Prameela Kannan Kutty

    2016-05-01

    Full Text Available The anticancer potential by breastfeeding is not fully tapped in the light of the present knowledge of the subject. Literature indicates that breastmilk has anticancer action but may underestimate its full capacity. The protective spectrum within breastmilk hints on the need for a more comprehensive understanding of it as an anticancer tool. Exclusive breastfeeding could confer protection from carcinogenesis with a greater impact than realised. A literature review was conducted using four electronic databases. Selected areas were extracted after thorough perusal of the articles. The uninitiated would take exclusive breastfeeding seriously if actively counselled as an anticancer tool. Advice on details of the breastfeeding process and holistic information on breastfeeding may endow a greater impact among the skeptics. Counselling the breastfeeding mother on information sometimes not imparted, such as on maternal nutrition, details of the process of breastfeeding, benefits of direct breastfeeding versus milk expression and her psychosocial well being may make a difference in optimising anticancer action that exists in breastmilk. Additionally, its anticancer potential provides a platform to universally improve physical and psychosocial well being of women who breastfeed. Statistics of protection by breastfeeding in some maternal and childhood cancers are evident. “Bio-geno-immuno-nutrition” of breastmilk may shield the mother and infant from carcinogenesis in more ways than appreciated. The molecular basis of mother-to-infant signals and their “energies” need to be researched. Breastfeeding as a modifiable behaviour provides cost effective nutrition with potential for both cancer immunoprophylaxis and immunotherapy.

  15. Psychosocial counselling of identifiable sperm donors

    NARCIS (Netherlands)

    Visser, M. [=Marja; Mochtar, M. H.; de Melker, A. A.; van der Veen, F.; Repping, S.; Gerrits, T.

    2016-01-01

    What do identifiable sperm donors feel about psychosocial counselling? Identifiable sperm donors found it important that psychosocial counselling focused on emotional consequences and on rules and regulations and they expected to have access to psychosocial counselling at the time that

  16. Counseling in Turkey: An Evolving Field

    Science.gov (United States)

    Stockton, Rex; Guneri, Oya Yerin

    2011-01-01

    This article provides a brief history of counseling and addresses the current issues and future trends of counseling in Turkey. Special emphasis is placed on the factors that impede the development of school counseling as a discipline.

  17. Motivational Interviewing and Rehabilitation Counseling Practice

    Science.gov (United States)

    Wagner, C. C.; McMahon, B. T.

    2004-01-01

    This article explores commonalities between rehabilitation counseling and the counseling approach known as motivational interviewing. Motivational interviewing is an empirically supported, clientcentered, directive counseling approach designed to promote client motivation and reduce motivational conflicts and barriers to change. The underpinnings…

  18. Abortion Counseling and the School Counselor

    Science.gov (United States)

    Duncan, Jack A.; Moffett, Catherine F.

    1974-01-01

    Abortion counseling is now legally within the purview of the school counselor. It is therefore essential that counselors determine their role in abortion counseling, the kind of training necessary, and whether professional organizations should develop counseling guidelines. (RP)

  19. Use of WhatsApp in Higher Education: What's Up with Assessing Peers Anonymously?

    Science.gov (United States)

    Güler, Çetin

    2017-01-01

    The aim of this study is to investigate the use of WhatsApp application in anonymous peer assessment in higher education. The mobile phone application WhatsApp was used as both an anonymous and nonanonymous peer assessment tool in a classroom environment. The participants of the study were the students of two classes (sophomores and juniors), half…

  20. Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference.

    Science.gov (United States)

    Teich, Al; Frankel, Mark S.; Kling, Rob; Lee, Yaching

    1999-01-01

    Reports the results of a conference on the Internet and anonymous communication organized by the American Association for the Advancement of Science (AAAS). Discusses how anonymous communications can be shaped by the law, education, and public awareness, and highlights the importance of involving all affected interests in policy development.…

  1. Toward Analysis of the Relations Among the Youth Counterculture, Telephone Hotlines, and Anonymity

    Science.gov (United States)

    Baizerman, Michael

    1974-01-01

    During the 1960's, there emerged innovative human service programs for youth. Among the actual differences in these programs compared to their older, established human service agencies was (is) the prominent position of the social value of client anonymity. This anonymity is examined in an attempt to understand its role. (RC)

  2. "People Are Either Too Fake or Too Real": Opportunities and Challenges in Tie-Based Anonymity

    DEFF Research Database (Denmark)

    Ma, Xiao; Andabili, Nazanin; Barkhuus, Louise

    2017-01-01

    In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these “tie-based” anonymity services may be notably different than other social media services. We use semi-structu...

  3. The Risk of a Halo Bias as a Reason to Keep Students Anonymous during Grading

    Science.gov (United States)

    Malouff, John M.; Emmerton, Ashley J.; Schutte, Nicola S.

    2013-01-01

    Experts have advocated anonymous grading as a means of eliminating actual or perceived evaluator bias in subjective student assessment. The utility of anonymity in assessment rests on whether information derived from student identity can unduly influence evaluation. The halo effect provides a conceptual background for why a bias might occur. In…

  4. Encouraging College Student Active Engagement in Learning: Student Response Methods and Anonymity

    Science.gov (United States)

    Barr, M. L.

    2017-01-01

    The purpose of this study was to examine the role of anonymity in encouraging college students to be more cognitively engaged in lectures. Kinesiology majors from three universities were asked to respond to questions during two consecutive lectures using response methods of opposing degrees of anonymity, one using "clickers" and the…

  5. Adlerian Counseling for Parent Education.

    Science.gov (United States)

    Piercy, Fred P.

    The helping professions must aid parents in understanding their children and in providing parents with methods to improve family relationships. Adlerian counseling is presented as one potentially useful method of reaching this goal. The basic principles and democratic philosophy of Adlerian counseling are outlined, and emphasis is placed on the…

  6. Group Counseling for Navy Children.

    Science.gov (United States)

    Mitchum, Nancy Taylor

    1991-01-01

    Conducted six-session group counseling program for Navy children (n=22) enrolled in public schools whose fathers were on deployment. Pretest and posttest scores on the Coopersmith Self-Esteem Inventory suggest that participation in the group counseling unit positively affected self-esteem of Navy children whose fathers were on deployment. Found…

  7. Archives: Edo Journal of Counselling

    African Journals Online (AJOL)

    Items 1 - 6 of 6 ... Archives: Edo Journal of Counselling. Journal Home > Archives: Edo Journal of Counselling. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register · Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives. 1 - 6 of 6 Items. 2011 ...

  8. Defense Mechanisms in Group Counseling.

    Science.gov (United States)

    Clark, Arthur J.

    1992-01-01

    Presents considerations and strategies for conceptualizing, recognizing, and modifying defense mechanisms through the group counseling process. Provides awareness of defense mechanisms in planning for and implementation of group counseling, describes interaction patterns for identifying defenses among group participants, and clarifies modification…

  9. School Counseling in China Today

    Science.gov (United States)

    Thomason, Timothy C.; Qiong, Xiao

    2008-01-01

    This article provides a brief overview of the development of psychological thinking in China and social influences on the practice of school counseling today. Common problems of students are described, including anxiety due to pressure to perform well on exams, loneliness and social discomfort, and video game addiction. Counseling approaches used…

  10. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    Directory of Open Access Journals (Sweden)

    Balázs Bodó

    2014-11-01

    Full Text Available This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs. Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of online political activism. Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders. Through the analysis of Wikileaks, the anonymous whistleblowing website, it describes how strong PETs enable the development of hacktivism 2.0, where the source of threat is shifted from outsiders to insiders. Insiders have access to documents with which power can be exposed, and who, by using PETs, can anonymously engage in political action. We also describe the emergence of a third generation of hacktivists who use PETs to disengage and create their own autonomous spaces rather than to engage with power through anonymous whistleblowing.

  11. Attribute Utility Motivated k-anonymization of datasets to support the heterogeneous needs of biomedical researchers.

    Science.gov (United States)

    Ye, Huimin; Chen, Elizabeth S

    2011-01-01

    In order to support the increasing need to share electronic health data for research purposes, various methods have been proposed for privacy preservation including k-anonymity. Many k-anonymity models provide the same level of anoymization regardless of practical need, which may decrease the utility of the dataset for a particular research study. In this study, we explore extensions to the k-anonymity algorithm that aim to satisfy the heterogeneous needs of different researchers while preserving privacy as well as utility of the dataset. The proposed algorithm, Attribute Utility Motivated k-anonymization (AUM), involves analyzing the characteristics of attributes and utilizing them to minimize information loss during the anonymization process. Through comparison with two existing algorithms, Mondrian and Incognito, preliminary results indicate that AUM may preserve more information from original datasets thus providing higher quality results with lower distortion.

  12. Statistical disclosure limitation of health data based on Pk-anonymity.

    Science.gov (United States)

    Kimura, Eizen; Chida, Koji; Ikarashi, Dai; Hamada, Koki; Ishihara, Ken

    2012-01-01

    The Act for the Protection of Personal Information in Japan considers as personal information any quasi-identifier that may be used to obtain information that identifies individuals through comparisons with datasets. Studies using health records are not widely conducted because of the concern regarding the safety of anonymized health records. To increase the safety of such records, we used the Pk-anonymity method. In this method, attributes are probabilistically randomized and then reconstructions are performed on the basis of statistical information from perturbed data. Hence, it is expected to provide more precise statistics and more reliably preserve privacy than the traditional "k-anonymity" method. We anonymized health records, performed cross tabulation, and assessed the error rate using original data. This study shows that the Pk-anonymity method can be used to perform safety statistical disclosures with low error rates, even in small cases.

  13. A hidden service model based on HS-HS anonymous network

    Science.gov (United States)

    Meng, Yitong; Zhao, Xing; Fei, Jinlong; Zhu, Yuefei

    2017-10-01

    The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmission mechanism and link establishment protocol and Hidden Service communication process, in view of the Hidden node number too much, link building Service for too long and too redundant link problem. An improved hidden service model HS-HS is proposed that incorporating multiple transmission link and reuse, and at the same time will be important transit point for reuse protection link anonymity, through the ExperimenTor simulation environment test, verify the improved model of HS-HS can be more effective in guarantee anonymity and security, improve the overall efficiency of data transmission, to meet the needs of today's anonymous service.

  14. Guiding change: provider voices in youth pre-abortion counselling in urban Vietnam.

    Science.gov (United States)

    Nguyen, Helen Kim Hong; Martin, Philip; Chinh, Nguyen Quoc; Cong, Duong Dinh

    2010-08-01

    Pre-abortion counselling has a role in promoting safe sex practices and in preventing repeated unplanned pregnancies and repeated abortions among abortion-seeking women. Such counselling is essential in Vietnam, especially given the common use of abortion. Arguably, in Ho Chi Minh City, Vietnam, the delivery of pre-abortion counselling is more urgent for young women, who have historically been ignored by State reproductive health initiatives and are increasingly exposed to transmission of sexually transmitted infections (STIs), unplanned pregnancies and abortion. This paper charts urban Vietnamese service providers' discourses in pre-abortion counselling specific for reducing risks of additional unwanted pregnancies, repeat abortion and STI/HIV transmission among young Vietnamese women. Thirteen providers working in counselling delivery, management and programme-planning at the Reproductive Health Care Centre of Ho Chi Minh City participated in this study. Through qualitative interviews, this paper elicits a range of provider attitudes, considerations and approaches in pre-abortion counselling and presents these discourses using participant anecdotes. Demonstrated among participant responses were five key pre-abortion counselling phases for promoting effective family planning among young women. Topics covered in these counselling phases included abortion complications, post-abortion fertility return, contraception, behaviour change and STI/HIV prevention and sexual and reproductive health basics (SRH). The service provider discourses gleaned from this study are foundational for further research and development of best practice guidelines in pre-abortion counselling.

  15. Social networks as mediators of the effect of Alcoholics Anonymous.

    Science.gov (United States)

    Kaskutas, Lee Ann; Bond, Jason; Humphreys, Keith

    2002-07-01

    This study tested the hypothesis that the relationship between Alcoholics Anonymous (AA) involvement and reduced substance use is partially explained (or 'mediated') by changes in social networks. This is a naturalistic longitudinal study of the course of alcohol problems. Study sites were the 10 largest public and private alcohol treatment programs in a northern California county. Three hundred and seventy-seven men and 277 women were recruited upon seeking treatment at study sites. At baseline and 1-year follow-up, we assessed alcohol consequences and dependence symptoms, consumption, social support for abstinence, pro-drinking social influences and AA involvement. In the structural equation model, AA involvement was a significant predictor of lower alcohol consumption and fewer related problems. The size of this effect decreased by 36% when network size and support for drinking were included as mediators. In logistic regression models predicting abstinence at follow-up, AA remained highly significant after including social network variables but was again reduced in magnitude. Thirty-day abstinence was predicted by AA involvement (OR=2.9), not having pro-drinking influences in one's network (OR=0.7) and having support for reducing consumption from people met in AA (versus no support; OR=3.4). In contrast, having support from non-AA members was not a significant predictor of abstinence. For alcohol-related outcomes other than abstinence, significant relationships were found for both AA-based and non-AA-based support. The type of social support specifically given by AA members, such as 24-hour availability, role modeling and experientially based advice for staying sober, may help to explain AA's mechanism of action. Results highlight the value of focusing on outcomes reflective of AA's goals (such as abstinence) when studying how AA works.

  16. Anonymity In Survey Courses as Tool for More Diverse Engagement

    Science.gov (United States)

    Samson, P. J.

    2017-12-01

    It is not uncommon that students in introductory survey courses are reluctant to participate in verbal inquiry. In a survey submitted to students of CLIMATE 102, Extreme Weather, over the past four semesters about 45% of male students professed comfort in asking verbal questions in a large lecture hall but less than 25% of females and only 15% of students for whom English is not their first language. Hence, large lecture hall courses may be inadvertently dissuading the inclusion of many of the students we wish to encourage to participate in our discipline. To combat this a system was used in CLIMATE 102 wherein students could pose questions digitally and anonymously. These questions could be seen by all and answered by all. The instructor and/or teaching assistant can also participate and answer or offer corrections to others' answers. The use of this system had three important outcomes: The number of questions posed during class time rose dramatically from previous semesters when only verbal questions were entertained. The number of questions in CLIMATE 102 with this system generally exceeded 500 per semester where the number of students 200. The number of per-capita questions from female students exceeded the male students, thus differences in gender inquiry was eliminated. The number of per-capita questions from students whose first language was not English equaled the native English-speaking students. While it is the goal of higher education to encourage students to participate verbally in class discussions it is important to provide a "safe" environment in the first year(s) as many students are initially uncomfortable participating verbally in class. We hypothesize, but have not researched, that through this process students have the opportunity to see that their questions are as valid as others' in the class and will subsequently gain the confidence to participate verbally.

  17. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    Science.gov (United States)

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  18. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  19. Nondirective counseling interventions with schizophrenics.

    Science.gov (United States)

    Gerwood, J B

    1993-12-01

    Counseling interventions with paranoid schizophrenics can be daunting. While chemical, directive, and behavioral controls often are considered important, nondirective counseling techniques used by the therapeutic staff may help schizophrenic patients explore their thoughts and feelings. Several nondirective concepts pioneered by Carl Rogers are examined. These methods, which represent basic concepts of the person-centered approach, are empathy, unconditional positive regard, and congruence. A brief illustration of an interaction with a patient diagnosed as paranoid schizophrenic is presented to suggest the effectiveness of Rogerian counseling.

  20. Sex Therapy

    Science.gov (United States)

    ... therapists have graduate degrees and can demonstrate their competence in sex therapy by becoming credentialed by the ... ways to resolve your concerns and improve your communication and intimacy. Talking about sex and intimacy may ...

  1. Serbs in the poetry of Theodore Prodromos and anonymous Manganeios

    Directory of Open Access Journals (Sweden)

    Stanković Vlada

    2006-01-01

    Full Text Available Numerous rhetorical writings of the Comnenian period constitute a fruitful field of research, both with respect to historical data, i.e. hard historical facts hidden, though still recognizable, behind the peculiar and somewhat abstract mode of expression of the authors of the twelfth century, and with regard to the poetics of the literary works themselves, i.e. the internal elements characteristic not only for the genre chosen, but also for each particular author. A comparative, historical and literary approach to these works renders their sense clearer and their complex allusions more readily understood. This is a matter of some importance, since allusions constitute one of the basic elements of historical rhetoric, which reached its peak at the time of Emperor Manuel Komnenos (1143-1180, especially during the first half of his reign, i.e. till the end of the fifties of the twelfth century. The poetry of Theodore Prodromes and of the somewhat younger Anonymous ('Prodromos' Manganeios is an excellent example of this intertwining of historical and literary elements, i.e. of the presentation of historical data through rhetorical patterns. One has to concentrate on individual works attempting to determine, as far as possible, the date of composition, the circumstances of writing and the purpose of a particular poem, the occasion for which it was written and the character of the expected audience, in order to better understand both the poetry written by these two rhetoricians and the individual features of the authors, as well as their respective positions in the circle around Emperor Manuel Komnenos. The poems dealt with in the present paper stand out for calling the Serbs by their real name. This naming practice was invariably employed by both rhetoricians in cases when new achievements of the basileus were to be announced and proclaimed immediately after the event, on the occasions of first reports, first celebrations of the new victories and

  2. 77 FR 73558 - Sex Offender Registration Amendments

    Science.gov (United States)

    2012-12-11

    ... 1380, Washington, DC 20004. FOR FURTHER INFORMATION CONTACT: Rorey Smith, Deputy General Counsel, (202) 220-5797, or rorey.smith@csosa.gov . Questions about this publication are welcome, but inquiries... addition, the Sex Offender Registration and Notification Act (SORNA), Title I of the Adam Walsh Child...

  3. [Counselling customers with psychotropic vs. cardiovascular prescriptions: a survey among Austrian community pharmacists].

    Science.gov (United States)

    Hagmair, Gisela; Amering, Michaela; Kaiser, Gerda; Katschnig, Heinz

    2014-01-01

    Prescriptions for psychotropic drugs in general and their share of all prescriptions have substantially risen over the last decades. Thus, also counselling by pharmacists becomes more important in this area. This study focuses on how community pharmacists see their own role when counselling persons with prescriptions for psychotropic medication and how this differs from counselling persons with other types of prescriptions. Based on the Toronto Community Pharmacists' Questionnaire an online questionnaire was developed with the assistance of the Austrian Pharmacists Association. This instrument elicits pharmacists' attitudes toward and professional interactions with users of psychotropic drugs on the one hand and of cardiovascular medication on the other. After a pilot study the questionnaire - which was to be filled in anonymously - was put on a web portal for six months and Austrian community pharmacists were invited to answer it. 125 pharmacists completed the questionnaire. Overall it was reported, that new customers with psychotropic prescriptions were less often counselled than those with prescriptions for cardiovascular medication. The main reasons for this difference seem to be the lack of privacy in public pharmacies, the fear of stigmatising customers with psychotropic medication and a perceived lack of training concerning the treatment of mental disorders. In addition to improving such training, it was suggested that seminars and workshops for communication skills should be organised. The reduced frequency in counselling new customers with psychotropic medication is related to a lack of privacy in public pharmacies, fear of stigmatising customers and a perceived need for improving the training on the treatment of mental disorders.

  4. Anonymity and pseudonymity in whistleblowing to the U.S. Office of Research Integrity.

    Science.gov (United States)

    Price, A R

    1998-05-01

    Given the concerns expressed by members of the academic and legal community about whether (and how) to handle anonymous and pseudonymous allegations of scientific misconduct, this paper summaries the experiences of the Office of Research Integrity and its predecessor from 1989 through 1997. Although the record shows that research institutions and the ORI have treated such allegations seriously, the fraction of complainants to the ORI who remain anonymous is small (8% of 986 allegations); few anonymous complaints are sufficiently substantive to be pursued (4% of the 357 formal cases opened in the ORI); and only 1 of these 13 cases resulted in an ORI finding of scientific misconduct.

  5. Sex Headaches

    Science.gov (United States)

    Sex headaches Overview Sex headaches are brought on by sexual activity — especially an orgasm. You may notice a dull ache in your head ... severe headache just before or during orgasm. Most sex headaches are nothing to worry about. But some ...

  6. "Innovations" On Hold: Sex Education in the Greek Primary Schools

    Science.gov (United States)

    Gerouki, Margarita

    2009-01-01

    Purpose: This paper seeks to examine the way sex and relationships education programs, as part of Health Education extra curriculum activities, have been implemented in the Greek primary schools. Design/methodology/approach: The paper presents and discusses data from an anonymous survey research questionnaire distributed to the 68 Elementary…

  7. 38 CFR 21.9580 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.9580...) VOCATIONAL REHABILITATION AND EDUCATION Post-9/11 GI Bill Counseling § 21.9580 Counseling. An individual may receive counseling from VA before beginning training and during training. VA will apply the provisions of...

  8. 28 CFR 550.43 - Drug counseling.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Drug counseling. 550.43 Section 550.43... Drug Services (Urine Surveillance and Counseling for Sentenced Inmates in Contract CTCs) § 550.43 Drug counseling. (a) Drug counseling shall be provided to sentenced inmates in contract community treatment...

  9. 38 CFR 21.100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.100... Counseling § 21.100 Counseling. (a) General. A veteran requesting or being furnished assistance under Chapter 31 shall be provided professional counseling services by Vocational Rehabilitation and Employment (VR...

  10. 38 CFR 21.7600 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.7600...) VOCATIONAL REHABILITATION AND EDUCATION Educational Assistance for Members of the Selected Reserve Counseling § 21.7600 Counseling. A reservist may receive counseling from VA before beginning training and during...

  11. 38 CFR 21.6100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.6100... Recipients Counseling § 21.6100 Counseling. General. A veteran requesting or being furnished assistance under this temporary program shall be provided professional counseling services by the Vocational...

  12. 38 CFR 21.8100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.8100... Vietnam Veterans-Spina Bifida and Covered Birth Defects Counseling § 21.8100 Counseling. An eligible child requesting or receiving services and assistance under this subpart will receive professional counseling by VR...

  13. 24 CFR 214.300 - Counseling services.

    Science.gov (United States)

    2010-04-01

    ... or a HUD roster of counselors, designed to meet a special housing counseling need, may be permitted... HOUSING COUNSELING PROGRAM Program Administration § 214.300 Counseling services. (a) Basic requirements... educational sessions must also offer individual counseling on the same topics covered in the group educational...

  14. Genetic Counseling as an Educational Process.

    Science.gov (United States)

    Eddy, James M.; St. Pierre, Richard

    Historically genetic counseling programs have not included strong educational components or sound educational foundations. This paper deals with some of the drawbacks of current genetic counseling programs and the implications for education in the genetic counseling process. The author adopts a broad definition of genetic counseling which…

  15. Psychological Aspects of Career Counseling.

    Science.gov (United States)

    Corbishley, M. Anne; Yost, Elizabeth B.

    1989-01-01

    Because career decision making affects all aspects of a person's life, career counseling must take into account client expectations, psychological characteristics and personality traits, nonverbal cues, and psychological variables affecting the counselor-client relationship. (SK)

  16. HUD Approved Housing Counseling Agencies

    Data.gov (United States)

    Department of Housing and Urban Development — HUD sponsors housing counseling agencies throughout the country that can provide advice on buying a home, renting, defaults, foreclosures, and credit issues. This...

  17. Counselling Psychology in South Africa.

    Science.gov (United States)

    Bantjes, Jason; Kagee, Ashraf; Young, Charles

    The origin and development of counselling psychology in South Africa has been profoundly influenced by the country's socio-political history and the impact of apartheid. As a result of this, counselling psychologists in the country face a number of challenges and opportunities for the future. In this paper we provide a portrait of counselling psychology in South Africa by describing the current character of the specialty and the context in which South African psychologists work. We critically discuss the challenges that the specialty faces to meet the country's mental health care needs, contest the current Scope of Practice; affirm multiculturalism without essentializing or reifying race and ethnicity, and build an evidence base for community interventions in the country. We also consider how, in the future, counselling psychologists in South Africa may make a more meaningful contribution within public health and the country's health care and education systems.

  18. Counselling Psychology in South Africa

    Science.gov (United States)

    Bantjes, Jason; Kagee, Ashraf; Young, Charles

    2016-01-01

    The origin and development of counselling psychology in South Africa has been profoundly influenced by the country’s socio-political history and the impact of apartheid. As a result of this, counselling psychologists in the country face a number of challenges and opportunities for the future. In this paper we provide a portrait of counselling psychology in South Africa by describing the current character of the specialty and the context in which South African psychologists work. We critically discuss the challenges that the specialty faces to meet the country’s mental health care needs, contest the current Scope of Practice; affirm multiculturalism without essentializing or reifying race and ethnicity, and build an evidence base for community interventions in the country. We also consider how, in the future, counselling psychologists in South Africa may make a more meaningful contribution within public health and the country’s health care and education systems. PMID:27867261

  19. Between coaching and social counselling

    Directory of Open Access Journals (Sweden)

    Toni Vrana

    2012-03-01

    The basic difference between coaching and social counselling lies in a different interpretation of the client' starting situation. Social counselling understands the client' starting situation as problematic and attempts to normalize it, while coaching understands it as normal and attempts to develop it. The key similarity of the two approaches is encour- agement of the clients' own initiative. Coaching needs to be investigated within the field of developmental conceptions, since its focus on results supports, unintentionally, the dominant developmental paradigm. Focusing on solutions in coaching is questionable also within an organization, where its interests may channel the course of clients' search for their own solutions. The counselling doctrine of coaching can gain valuable insights by a reassessment of the concepts of development and normality, a domain in which it is likely to encounter social counselling.

  20. Career Counseling with Unemployed Youth.

    Science.gov (United States)

    Amundson, N. E.

    1983-01-01

    Based on the view that unemployment can cause both community and individual problems, describes a model counseling intervention designed to counteract the negative trends associated with unemployment. Presents facilitative, confrontive, conceptual, prescriptive, and catalytic interventions. (RC)

  1. Genetic Counseling in Hearing Impairment.

    Science.gov (United States)

    Fraser, George R.

    1979-01-01

    The problem of counseling is dealt with mainly in the context of severe hearing impairment, since moderate forms are often due to illness or other nongenetic factors and do not constitute a grave handicap. (DLS)

  2. Genetic Counseling in Military Hospitals

    Science.gov (United States)

    1987-04-01

    mother allegedly mistreated for preeclampsia at Tripler Army Medical Center could maintain an action for medical malpractice nothwithstanding Feres.1 2...perinatologists at most military hospitals perform genetic counseling. Due to their primary responsibilities fo management of high risk pregnancies

  3. The importance of legal counsel

    Directory of Open Access Journals (Sweden)

    Betsy Fisher

    2017-02-01

    Full Text Available At each stage of the resettlement process, the presence of counsel – legal advocates – can help refugees to present their complete cases efficiently and avoid unnecessary rejections. This provides benefits to decision makers as well.

  4. Counseling Services for Women in Marriage Age

    Directory of Open Access Journals (Sweden)

    Frischa Meivilona Yendi

    2015-11-01

    Full Text Available Marriage is a bond between the outer and inner man as a husband who has not aged 25 years and women 21 years old wife is not with the purpose of achieving happiness. Marriage and family counseling is a profession that will be developed in Indonesia. Counseling emphasizes on changes contained in the family system. Stages counseling, theory and dynamics as well as the use of counseling skills in marriage and family counseling has similarities with individual counseling and group counseling.

  5. 13 CFR 113.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials. 113.425 Section 113.425 Business Credit and Assistance SMALL BUSINESS... Activities Prohibited § 113.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A...

  6. 24 CFR 3.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling materials. 3.425 Section 3.425 Housing and Urban Development Office of the Secretary, Department... Activities Prohibited § 3.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A...

  7. 38 CFR 23.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 23.425 Section 23.425 Pensions, Bonuses, and Veterans' Relief DEPARTMENT... Activities Prohibited § 23.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A...

  8. 18 CFR 1317.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling materials. 1317.425 Section 1317.425 Conservation of Power and Water Resources... Activities Prohibited § 1317.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A...

  9. 14 CFR 1253.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials. 1253.425 Section 1253.425 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE... § 1253.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall...

  10. 29 CFR 36.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Counseling and use of appraisal and counseling materials. 36... in Education Programs or Activities Prohibited § 36.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of...

  11. 31 CFR 28.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 28.425 Section 28.425 Money and Finance: Treasury Office of the Secretary of the....425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not...

  12. Between coaching and social counselling

    OpenAIRE

    Toni Vrana

    2012-01-01

    Coaching appears to be another modern counselling approach, practiced initially in the business world. It can to be analyzed through a comparison with social counselling. The roots of coaching go back to Ancient Greece.. Plato used to propagate the art of aksing questions by recording the Socratic dialogue. Today coaching is in substance related to mentoring, tutoring and coaching in sport. The core of the activity - according to different coaching definitions - is discovering the hidden pote...

  13. Postpartum adolescents' contraceptive counselling preferences.

    Science.gov (United States)

    Sober, Stephanie; Shea, Judy A; Shaber, Allison G; Whittaker, Paul G; Schreiber, Courtney A

    2017-04-01

    The optimal approach for provision and timing of postpartum contraceptive counselling for adolescents has not been established. To reduce repeat pregnancies from current USA levels of nearly 20%, a better understanding is needed of postpartum adolescent females' preferences regarding contraceptive counselling and delivery. Semi-structured interviews with 30 USA postpartum teens (97% Black) explored pregnancy prevention and contraceptive counselling. Transcripts were independently coded by two researchers and inter-rater reliability calculated using Kappa coefficients. With a standard content analysis approach, common themes were identified, coded and summarized. Findings indicated pregnancy prevention was important - two thirds of subjects reported becoming pregnant 'too soon', almost all did not desire another child for at least 6 years and most indicated that pregnancy prevention was either 'very' or 'extremely' important right now. The subjects described doctors and their prenatal clinic as their most accurate sources of contraception information, but stated that doctors and parents were the most helpful sources. All were comfortable discussing contraception with providers and had a desire for shared decision making. While many had received written materials, most preferred in-person contraceptive counselling. Optimally, participants suggested that contraceptive counselling would be provided by a physician, begin antepartum and almost all preferred to leave the hospital with their chosen method of contraception. Pregnancy prevention is important for postpartum adolescents as most desired to delay future childbearing. In-person contraceptive counselling should begin in the antepartum period and include provision of contraception prior to discharge.

  14. Characteristics of US Health Care Providers Who Counsel Adolescents on Sports and Energy Drink Consumption

    Directory of Open Access Journals (Sweden)

    Nan Xiang

    2014-01-01

    Full Text Available Objective. To examine the proportion of health care providers who counsel adolescent patients on sports and energy drink (SED consumption and the association with provider characteristics. Methods. This is a cross-sectional analysis of a survey of providers who see patients ≤17 years old. The proportion providing regular counseling on sports drinks (SDs, energy drinks (EDs, or both was assessed. Chi-square analyses examined differences in counseling based on provider characteristics. Multivariate logistic regression calculated adjusted odds ratios (aOR for characteristics independently associated with SED counseling. Results. Overall, 34% of health care providers regularly counseled on both SEDs, with 41% regularly counseling on SDs and 55% regularly counseling on EDs. On adjusted modeling regular SED counseling was associated with the female sex (aOR: 1.44 [95% CI: 1.07–1.93], high fruit/vegetable intake (aOR: 2.05 [95% CI: 1.54–2.73], family/general practitioners (aOR: 0.58 [95% CI: 0.41–0.82] and internists (aOR: 0.37 [95% CI: 0.20–0.70] versus pediatricians, and group versus individual practices (aOR: 0.59 [95% CI: 0.42–0.84]. Modeling for SD- and ED-specific counseling found similar associations with provider characteristics. Conclusion. The prevalence of regular SED counseling is low overall and varies. Provider education on the significance of SED counseling and consumption is important.

  15. Confronting Sex in the Media: Implications and Counseling Recommendations

    Science.gov (United States)

    Ballam, Stacy M.; Granello, Paul F.

    2011-01-01

    The media greatly influences the sexual development of our youth and impacts society on a macro level. The messages that the media sends to our youth are contradictory to what families and professionals, such as educators and counselors, attempt to instill in our youth. This article addresses the urgent need for parents, educators, and counselors…

  16. Counseling Adult Sex Offenders: Unique Challenges and Treatment Paradigms.

    Science.gov (United States)

    Priest, Ronnie; Smith, Annalee

    1992-01-01

    Reviews current definitions and research literature related to characteristics of adults who sexually victimize children. Presents discussion of pedophilia as a sexual deviation. Examines treatment issues that may confront counselors engaged in treating adults who sexually victimize children and discusses implications for practitioners. (Author/NB)

  17. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    NARCIS (Netherlands)

    Bodó, B.

    2014-01-01

    This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of

  18. The Role of the Anonymous Voice in Post-Publication Peer Review Versus Traditional Peer Review

    Directory of Open Access Journals (Sweden)

    Jaime A. Teixeira da Silva

    2015-12-01

    Full Text Available Traditional peer review (TPR has several limitations and weaknesses. Post-publication peer review is one practical way to repair the ills of TPR and reinforce it. A literature that is marked by errors is unhealthy and should, if given the opportunity, be corrected or further improved. The anonymous voice is one source of critique and differs from the blind peer review in TPR in which the reviewer remains anonymous to the authors and/or vice versa, but the identity is known to the editor. If unregulated, the anonymous voice can pose a threat to established editorial norms in TPR, to one of the most important criteria of science publishing, i.e., transparency, and to worthwhile discussion. Yet, if the anonymous voice is not heard, then a vast and potentially valuable pool of untapped opinions may be lost, opinions that may provide valuable solutions to improving TPR.

  19. Anonymous letters? DNA and fingerprints technologies combined to solve a case.

    Science.gov (United States)

    Barbaro, A; Cormaci, P; Teatino, A; La Marca, A; Barbaro, A

    2004-12-02

    Two brothers, living in two different cities, received two different anonymous letters. We performed latent prints development and DNA research on the letters and also on a glass used by a cousin suspected to be the letters' sender.

  20. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  1. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    Directory of Open Access Journals (Sweden)

    Tomas A. Lipinski

    2002-01-01

    Full Text Available This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has altered the traditional legal paradigm of responsibility and as a result creates potential problems for the future of anonymous speech on the Internet.  As a result plaintiffs are no longer pursuing litigation against service providers but taking their dispute directly to the anonymous speaker. Second, several cases have arisen in the United States where plaintiffs have requested that the identity of an anonymous Internet speaker be revealed.  These cases are surveyed.  Third, the cases are analyzed in order to determine the factors that courts require to be present before the identity of an anonymous speaker will be revealed.  The release is typically accomplished by the enforcement of a discovery subpoena instigated by the party seeking the identity of the anonymous speaker. The factors courts have used are as follows: jurisdiction, good faith (both internal and external, necessity (basic and sometimes absolute, and at times proprietary interest. Finally, these factors are applied in three scenarios--e-commerce, education, and employment--to guide institutions when adopting policies that regulate when the identity of an anonymous speaker--a customer, a student or an employee--would be released as part of an internal initiative, but would nonetheless be consistent with developing legal standards.

  2. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    OpenAIRE

    Feng Tao; Zhao Ming-Tao

    2017-01-01

    Tor (The Second Onion Router) is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was use...

  3. Religiosity and sexuality: counseling provided by Brazilian Protestant pastors.

    Science.gov (United States)

    Hoga, Luiza Akiko Komura; Rodolpho, Juliana Reale Caçapava; de Souza Penteado, Priscilla Evelyn; Borges, Ana Luiza Vilela; Chávez Alvarez, Rocío Elizabeth

    2013-06-01

    This qualitative study aimed to explore counseling about sexuality and contraception provided to the church community. The oral history method was performed. Data were collected through in-depth face-to-face interviews with 18 Brazilian Protestant pastors and were examined using thematic analysis. Four themes were identified from the data: (a) Counseling based on Christian doctrine provided to preserve the integrity of the family; (b) Adequate performance of gender roles is essential to preserve harmony in the family; (c) Recommendations for sex with pleasure and the free use of contraceptives in marriage; (d) Distinct positions regarding abortion: clearly forbidden versus permissible when authorized by law. The pastors provide traditional counselings regarding sexuality and the use of contraceptives is stimulated within the marriage. The main aim of the counselings given to the church community is the preservation of family integrity. The exploration of patients religious backgrounds and its consideration is essential in the planning and implementation of a culturally meaningful and non-conflicting healthcare. Copyright © 2013 Elsevier B.V. All rights reserved.

  4. Verbal Venting in the Social Web: Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments

    Directory of Open Access Journals (Sweden)

    Leonie Rösner

    2016-08-01

    Full Text Available Scholars often blame the occurrence of aggressive behavior in online discussions on the anonymity of the Internet; however, even on today’s less anonymous platforms, such as social networking sites, users write plenty of aggressive comments, which can elicit a whole wave of negative remarks. Drawing on the social identity and deindividuation effects (SIDE model, this research conducts a laboratory experiment with a 2 (anonymity vs. no anonymity × 2 (aggressive norm vs. non-aggressive norm between-subjects design in order to disentangle the effects of anonymity, social group norms, and their interactions on aggressive language use in online comments. Results reveal that participants used more aggressive expressions in their comments when peer comments on a blog included aggressive wording (i.e., the social group norm was aggressive. Anonymity had no direct effect; however, we found a tendency that users’ conformity to an aggressive social norm of commenting is stronger in an anonymous environment.

  5. Estimates of Non-Heterosexual Prevalence: The Roles of Anonymity and Privacy in Survey Methodology.

    Science.gov (United States)

    Robertson, Ronald E; Tran, Felix W; Lewark, Lauren N; Epstein, Robert

    2017-08-07

    When do people feel comfortable enough to provide honest answers to sensitive questions? Focusing specifically on sexual orientation prevalence-a measure that is sensitive to the pressures of heteronormativity-the present study was conducted to examine the variability in U.S. estimates of non-heterosexual identity prevalence and to determine how comfortable people are with answering questions about their sexual orientation when asked through commonly used survey modes. We found that estimates of non-heterosexual prevalence in the U.S. increased as the privacy and anonymity of the survey increased. Utilizing an online questionnaire, we rank-ordered 16 survey modes by asking people to rate their level of comfort with each mode in the context of being asked questions about their sexual orientation. A demographically diverse sample of 652 individuals in the U.S. rated each mode on a scale from -5 (very uncomfortable) to +5 (very comfortable). Modes included anonymous (name not required) and non-anonymous (name required) versions of questions, as well as self-administered and interviewer-administered versions. Subjects reported significantly higher mean comfort levels with anonymous modes than with non-anonymous modes and significantly higher mean comfort levels with self-administered modes than with interviewer-administered modes. Subjects reported the highest mean comfort level with anonymous online surveys and the lowest with non-anonymous personal interviews that included a video recording. Compared with the estimate produced by an online survey with a nationally representative sample, surveys utilizing more intrusive methodologies may have underestimated non-heterosexual prevalence in the U.S. by between 50 and 414%. Implications for public policy are discussed.

  6. Ethical issues in genetic counseling.

    Science.gov (United States)

    Than, Nandor Gabor; Papp, Zoltan

    2017-08-01

    Genetics has made great progress in the past decades, and prenatal diagnosis, predictive genetic testing, and genetic counseling have drawn the limelight of public attention. Because the subject of genetic counseling is of crucial consequence for both the short and long term, its ethical aspects are paramount. The question is whether mankind is mature enough to use this extraordinary knowledge in the right way for the benefit of the society. In the center of ethical questions is the comprehensiveness of information provided to the couples or patients and counseling them about results and making informed educated decisions. In addition, it is crucial how sensitive personal information is treated and whether and how it should be made public. Copyright © 2017. Published by Elsevier Ltd.

  7. Sex determination

    Indian Academy of Sciences (India)

    The sex-determining system differs considerably among organisms. Even among insect species, the genetic system for sex-determination is highly diversified. In Drosophila melanogaster, somatic sexual differentiation is regulated by a well characterized genetic hierarchy X : A > Sxl > tra/tra2 > dsx and fru. This cascade ...

  8. Creating Sex

    DEFF Research Database (Denmark)

    Cahana, Jonathan

    2016-01-01

    Thomas Laqueur’s influential yet controversial study Making Sex has, in many ways, revolutionized our understanding of sexuality in antiquity. Yet, most of Laqueur’s critics and supporters stressed the one-sex body, while the crux of his argument is the primacy of gender. Moreover, a systematic...

  9. Sex Offenders.

    Science.gov (United States)

    Hayes, Susan

    1991-01-01

    This paper on the problem of sex offending among individuals with intellectual disabilities examines the incidence of this problem, characteristics of intellectually disabled sex offenders, determination of whether the behavior is a paraphilia or functional age-related behavior, and treatment options, with emphasis on the situation in New South…

  10. High prevalence of HIV infection among young men who have sex with men in New York City.

    Science.gov (United States)

    Koblin, B A; Torian, L V; Guilin, V; Ren, L; MacKellar, D A; Valleroy, L A

    2000-08-18

    To determine the prevalence of HIV infection and risk behaviors among young men who have sex with men (MSM) aged 15-22 years in New York City. An anonymous cross-sectional survey. The 1998 Young Men's Survey in New York City (YMS-NYC), was a multistage probability survey of 541 MSM aged 15-22 years who attend public venues. After identification of venues and their associated high attendance time periods, random samples of venues and time periods were selected on a monthly basis. At each sampling event, potential participants were approached to determine eligibility. Eligible and willing men were interviewed, counselled and had a blood specimen drawn. Between December 1997 and September 1998, 115 sampling events were conducted. Of 612 men enrolled, 541 reported ever having had sex with a male partner. The HIV seroprevalence among the 541 MSM sampled was 12.1%. The HIV seroprevalence was 18.4% among African-Americans, 16.7% among persons of mixed race, 8.8% among Latino individuals and 3.1% among white men. HIV seroprevalence was 5.0% among 15-18 year olds and 16.4% among 19-22 year olds. A total of 65.5% of MSM were susceptible to hepatitis B virus infection (HBV). Almost half (46.1%) of the men reported unprotected anal sex in the previous 6 months and 16.3% reported ever having had an STD. Multiple regression analyses found that being older, of mixed race, black or ever having had an STD was associated with being HIV antibody positive. These data identify a large subgroup of MSM in need of effective HIV and HBV primary and secondary prevention programs.

  11. Educational counselling for older people

    Directory of Open Access Journals (Sweden)

    Maša Bizovičar

    2009-12-01

    Full Text Available The role and mission of older people’s education are changing in today’s productivity- oriented, aging society, the learning society. Older people can be active only if they can join a social group and get involved in new, challenging activities. The Third-Age University of Ljubljana provides education and learning facilities and offers counseling services, developed within the Ljubljana Urban Region Lifelong Learning Project. Counseling for education and learning enables the elderly to get involved in various activities to put into practice the principles of lifelong learning and active aging.

  12. The cost of quality: Implementing generalization and suppression for anonymizing biomedical data with minimal information loss.

    Science.gov (United States)

    Kohlmayer, Florian; Prasser, Fabian; Kuhn, Klaus A

    2015-12-01

    With the ARX data anonymization tool structured biomedical data can be de-identified using syntactic privacy models, such as k-anonymity. Data is transformed with two methods: (a) generalization of attribute values, followed by (b) suppression of data records. The former method results in data that is well suited for analyses by epidemiologists, while the latter method significantly reduces loss of information. Our tool uses an optimal anonymization algorithm that maximizes output utility according to a given measure. To achieve scalability, existing optimal anonymization algorithms exclude parts of the search space by predicting the outcome of data transformations regarding privacy and utility without explicitly applying them to the input dataset. These optimizations cannot be used if data is transformed with generalization and suppression. As optimal data utility and scalability are important for anonymizing biomedical data, we had to develop a novel method. In this article, we first confirm experimentally that combining generalization with suppression significantly increases data utility. Next, we proof that, within this coding model, the outcome of data transformations regarding privacy and utility cannot be predicted. As a consequence, existing algorithms fail to deliver optimal data utility. We confirm this finding experimentally. The limitation of previous work can be overcome at the cost of increased computational complexity. However, scalability is important for anonymizing data with user feedback. Consequently, we identify properties of datasets that may be predicted in our context and propose a novel and efficient algorithm. Finally, we evaluate our solution with multiple datasets and privacy models. This work presents the first thorough investigation of which properties of datasets can be predicted when data is anonymized with generalization and suppression. Our novel approach adopts existing optimization strategies to our context and combines different

  13. Counseling as an Art: The Creative Arts in Counseling.

    Science.gov (United States)

    Gladding, Samuel T.

    In this book counseling approaches with a variety of populations are examined using these creative arts: music; dance/movement; imagery; visual arts; literature; drama; and play and humor. It is noted that all of these arts are process-oriented, emotionally sensitive, socially directed, and awareness-focused. Chapter 1 discusses the history,…

  14. Marriage Counseling: A Christian Approach to Counseling Couples.

    Science.gov (United States)

    Worthington, Everett L., Jr.

    1990-01-01

    Describes approach to marriage counseling based on cognitive behavioral therapy and structural and strategic marital therapies aimed at Christian couples. Uses shared Christian values between counselor and clients to promote increased marital commitment, marital satisfaction, and personal spiritual growth. Maintains marital satisfaction might be…

  15. Perceptions of Clients and Counseling Professionals regarding Spirituality in Counseling

    Science.gov (United States)

    Morrison, Julie Q.; Clutter, Stacy M.; Pritchett, Elaine M.; Demmitt, Alan

    2009-01-01

    Although current research indicates that psychotherapeutic change both affects and is affected by spiritual concerns, relatively little is known about the degree to which spirituality is used as an intervention in counseling and how it is perceived by clients and mental health professionals. The purpose of this study was to examine the perceptions…

  16. Continuum of Counseling Goals: A Framework for Differentiating Counseling Strategies.

    Science.gov (United States)

    Bruce, Paul

    1984-01-01

    Presents counseling goals in a developmental continuum similar in concept to Maslow's hierarchy of needs. Discusses ego development goals, socialization goals, developmental goals, self-esteem goals, and self-realization goals and describes characteristics and implications of the continuum. (JAC)

  17. BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-12-01

    Full Text Available With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication. To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates. “BIX” is an abbreviation for “Blockchain Information Exchange.” Their purpose is equivalent to X.509 certificates: to support security services for users and transactions, but also enhanced with anonymity. This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use. The BIX Certification Infrastructure (BCI as a distributed public ledger is also briefly described.

  18. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ling Xiong

    2017-11-01

    Full Text Available Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  19. Anonymization for outputs of population health and health services research conducted via an online data center.

    Science.gov (United States)

    O'Keefe, Christine M; Westcott, Mark; O'Sullivan, Maree; Ickowicz, Adrien; Churches, Tim

    2017-05-01

    Online data centers (ODCs) are becoming increasingly popular for making health-related data available for research. Such centers provide good privacy protection during analysis by trusted researchers, but privacy concerns may still remain if the system outputs are not sufficiently anonymized. In this article, we propose a method for anonymizing analysis outputs from ODCs for publication in academic literature. We use as a model system the Secure Unified Research Environment, an online computing system that allows researchers to access and analyze linked health-related data for approved studies in Australia. This model system suggests realistic assumptions for an ODC that, together with literature and practice reviews, inform our solution design. We propose a two-step approach to anonymizing analysis outputs from an ODC. A data preparation stage requires data custodians to apply some basic treatments to the dataset before making it available. A subsequent output anonymization stage requires researchers to use a checklist at the point of downloading analysis output. The checklist assists researchers with highlighting potential privacy concerns, then applying appropriate anonymization treatments. The checklist can be used more broadly in health care research, not just in ODCs. Ease of online publication as well as encouragement from journals to submit supplementary material are likely to increase both the volume and detail of analysis results publicly available, which in turn will increase the need for approaches such as the one suggested in this paper.

  20. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

    Science.gov (United States)

    Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-11-21

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  1. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  2. Sex Differences in Cannabis Use and Effects: A Cross-Sectional Survey of Cannabis Users

    OpenAIRE

    Cuttler, Carrie; Mischley, Laurie K.; Sexton, Michelle

    2016-01-01

    Abstract Introduction: Despite known sex differences in the endocannabinoid system of animals, little attention has been paid to sex differences in human's cannabis use patterns and effects. The purpose of the present study was to examine sex differences in cannabis use patterns and effects in a large sample of recreational and medical cannabis users. Methods: A large sample (n=2374) of cannabis users completed an anonymous, online survey that assessed their cannabis use practices and experie...

  3. Genetic Counseling Supervisors' Self-Efficacy for Select Clinical Supervision Competencies.

    Science.gov (United States)

    Finley, Sabra Ledare; Veach, Pat McCarthy; MacFarlane, Ian M; LeRoy, Bonnie S; Callanan, Nancy

    2016-04-01

    Supervision is a primary instructional vehicle for genetic counseling student clinical training. Approximately two-thirds of genetic counselors report teaching and education roles, which include supervisory roles. Recently, Eubanks Higgins and colleagues published the first comprehensive list of empirically-derived genetic counseling supervisor competencies. Studies have yet to evaluate whether supervisors possess these competencies and whether their competencies differ as a function of experience. This study investigated three research questions: (1) What are genetic counselor supervisors' perceptions of their capabilities (self-efficacy) for a select group of supervisor competencies?, (2) Are there differences in self-efficacy as a function of their supervision experience or their genetic counseling experience, and 3) What training methods do they use and prefer to develop supervision skills? One-hundred thirty-one genetic counselor supervisors completed an anonymous online survey assessing demographics, self-efficacy (self-perceived capability) for 12 goal setting and 16 feedback competencies (Scale: 0-100), competencies that are personally challenging, and supervision training experiences and preferences (open-ended). A MANOVA revealed significant positive effects of supervision experience but not genetic counseling experience on participants' self-efficacy. Although mean self-efficacy ratings were high (>83.7), participant comments revealed several challenging competencies (e.g., incorporating student's report of feedback from previous supervisors into goal setting, and providing feedback about student behavior rather than personal traits). Commonly preferred supervision training methods included consultation with colleagues, peer discussion, and workshops/seminars.

  4. Understanding women's desires for contraceptive counseling at the time of first-trimester surgical abortion.

    Science.gov (United States)

    Matulich, Melissa; Cansino, Catherine; Culwell, Kelly R; Creinin, Mitchell D

    2014-01-01

    The objective was to investigate whether or not women presenting for a first-trimester surgical abortion want to discuss contraception on the day of their procedure. Between October 2012 and January 2013, an anonymous self-administered survey was distributed to women receiving first-trimester surgical abortions at four northern California family planning clinics. The survey obtained demographic information about each woman and inquired about her desire for contraceptive counseling during her appointment. Results were analyzed using both univariate and multivariable regression analyses to assess trends in responses related to desire for contraceptive counseling based on demographic and other variables. Of the 199 respondents, 64% reported that they did not want to talk to a counselor or doctor about contraception on the day of their abortion. About half of the women (52%) who did not want to discuss contraception indicated they already knew what they wanted for pregnancy prevention. Of the 25% who reported that they did want to discuss contraception, the most important topic desired from the counseling was identification of methods that were easier to use than what they used previously. The majority of women seeking first-trimester surgical abortion may not desire additional information about contraception on the day of the procedure. This study demonstrates that a significant proportion of women may not want contraceptive counseling on the day of a planned surgical abortion. © 2013.

  5. Feasibility and acceptability of couple counselling and pelvic floor muscle training after operation for prostate cancer

    DEFF Research Database (Denmark)

    Karlsen, Randi V; E Bidstrup, Pernille; Hvarness, Helle

    2017-01-01

    Can intervention, which consists of up to six couple counselling sessions, group instruction in pelvic floor muscle training (PFMT), up to three individual PFMT sessions and a DVD home training program. We examined its feasibility on the basis of the recruitment rate, adherence to and acceptability...... of the intervention, the response rate and changes in erectile and sexual functioning measured on the International Index of Erectile Function at baseline and at eight and 12 months. RESULTS: The recruitment rate was 14%. One couple withdrew, six couples attended 1-4 counselling sessions, and all patients attended...... PFMT until continence was achieved. The response rate on outcomes was 85% for patients and 71% for partners. The couples reported that counselling improved their sex life but it did not improve their ability to talk openly about sex. Most patients found that the physiotherapist improved...

  6. Psychosocial counselling of identifiable sperm donors

    NARCIS (Netherlands)

    Visser, M.; Mochtar, M.H.; de Melker, A.A.; van der Veen, F.; Repping, S.; Gerrits, T.

    2016-01-01

    STUDY QUESTION: What do identifiable sperm donors feel about psychosocial counselling? SUMMARY ANSWER: Identifiable sperm donors found it important that psychosocial counselling focused on emotional consequences and on rules and regulations and they expected to have access to psychosocial

  7. Behavioral Counseling to Prevent Skin Cancer

    Science.gov (United States)

    Understanding Task Force Recommendations Behavioral Counseling to Prevent Skin Cancer The U.S. Preventive Services Task Force (Task Force) has issued a final recommendation statement on Behavioral Counseling ...

  8. Genetic Counseling for Congenital Heart Defects

    Science.gov (United States)

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Genetic Counseling for Congenital Heart Defects Updated:Jan 19,2018 ... person with congenital heart disease considers having children. Genetic counseling can help answer these questions and address your ...

  9. Sex Stereotyping and Sex Discrimination

    Science.gov (United States)

    Hegarty, Moira

    1977-01-01

    Although unable to find any evidence to indicate that secondary schools in Canada have or have not made any progress in reducing sex stereotyping or sex discrimination, the author states that the Canadian educational system is aware of its responsibility to uphold non-sexist standards for its young students. Discusses some research done on undoing…

  10. Sources of Referral in Student Financial Counseling

    OpenAIRE

    Shinae Choi; Suzanne Bartholomae; Clinton G. Gudmunson; Jonathan Fox

    2016-01-01

    This study evaluates sources of referral to financial counseling and varied declines in financial stress across the financial counseling process. College students came to counseling most often through self-referral. Younger students and women were more likely to respond to institutional referrals. There were two clearly discernable periods of decline in financial stress, smaller interim declines occurring after requesting appointments and larger declines that occurred in counseling sessions. ...

  11. Effects of Various Group Approaches on Self-Actualization of Graduate Counseling Students.

    Science.gov (United States)

    Johnson, Sarah; Johnson, Norbert

    1979-01-01

    Graduate counseling students were assigned by sex to a marathon group, a shorter session group, a combination session group, and control group to determine impact on self-actualization. The personal orientation inventory indicated some significant positive movement for treatment groups. No one approach was significantly more effective than the…

  12. Declining Counseling Research in Counseling Psychology Journals: Is the Sky Falling?

    Science.gov (United States)

    Lichtenberg, James W.

    2011-01-01

    Scheel et al. note a rather precipitous decline over the past 30 years in the number and proportion of counseling-related research articles appearing in "Journal of Counseling Psychology" ("JCP") and "The Counseling Psychologist" ("TCP"). Certainly, counseling psychology as a field has changed over its 65-year history, and a great deal of that…

  13. 36 CFR 1211.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 1211.425 Section 1211.425 Parks, Forests, and Public Property NATIONAL... Education Programs or Activities Prohibited § 1211.425 Counseling and use of appraisal and counseling...

  14. Counseling Ethics Education Experience: An Interpretive Case Study of the First Year Master's Level Counseling Students

    Science.gov (United States)

    Zakaria, Noor Syamilah

    2013-01-01

    Counseling ethics competency is an important part of counselor identity development as required by the counseling profession training standards, and counseling ethics education is one major component of knowledge acquisition in counseling profession. Counselor educators and counselor education training programs have a core responsibility to…

  15. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  16. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  17. RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks

    Science.gov (United States)

    Wei, Yu-Chih; Chen, Yi-Ming; Shan, Hwai-Ling

    In Vehicular Networks, for enhancing driving safety as well as supporting other applications, vehicles periodically broadcast safety messages with their precise position information to neighbors. However, these broadcast messages make it easy to track specific vehicles and will likely lead to compromise of personal privacy. Unfortunately, current location privacy enhancement methodologies in VANET, including Pseudonymization, K-anonymity, Random silent period, Mix-zones and path confusion, all suffer some shortcomings. In this paper, we propose a RSSI (Received Signal Strength Indicator)-based user centric anonymization model, which can significantly enhance the location privacy and at the same time ensure traffic safety. Simulations are performed to show the advantages of the proposed method. In comparison with traditional random silent period method, our method can increase at least 47% of anonymity in both simple and correlation tracking.

  18. Counseling Psychology's Wide New Horizons

    Science.gov (United States)

    Takooshian, Harold

    2003-01-01

    Is it truly important to "internationalize" counseling psychology? If so, how can we best do this? This reaction to Leong and Ponterotto (2003) documents four general points about international psychology today--its origins, growth, ethnocentrism, and diversity--and relates these to their bold and comprehensive proposal to…

  19. Language Matters in Counselling Diversity

    Science.gov (United States)

    Lee, Billy

    2017-01-01

    The paper presents a personal view of some issues around therapeutic conversations involving difference and minority experience. Language, discourse and mother-tongue are explored from different theoretical standpoints and considered alongside concepts of difference, otherness and the unvoiced. Intercultural counselling offers a framework for…

  20. College Student Depression: Counseling Billy

    Science.gov (United States)

    Mobley, A. Keith

    2008-01-01

    A substantial portion of the college student population experiences affective disorders. This case study presents the conceptualization, course of treatment, and outcomes for a male college student presenting for counseling with depression. A review of Adlerian, cognitive-behavioral, and Gestalt techniques is provided. (Contains 1 figure.)

  1. Counseling Intervention in Cancer Therapy.

    Science.gov (United States)

    Pusateri-Vlach, Nancy F.; Moracco, John C.

    1981-01-01

    Recounts the history of cancer treatment to illustrate the long-standing tradition of a holistic approach to the investigation and treatment of cancer, discusses the growing emphasis on holistic cancer treatment and the importance of counseling in such treatment. (Author)

  2. Board Certification in Counseling Psychology

    Science.gov (United States)

    Crowley, Susan L.; Lichtenberg, James W.; Pollard, Jeffrey W.

    2012-01-01

    Although specialty board certification by the American Board of Professional Psychology (ABPP) has been a valued standard for decades, the vast majority of counseling psychologists do not pursue board certification in the specialty. The present article provides a brief history of board certification in general and some historical information about…

  3. Neuropsychological Counseling in Hospital Settings.

    Science.gov (United States)

    Larson, Paul C.

    1992-01-01

    Explores integration of counseling psychology and neuropsychology in hospital setting. Sees example of such interchange occurring in rehabilitation unit or hospital where psychologist has responsibilities for helping patients, families, and staff to understand implications of central nervous system dysfunction and to adapt to changes. Discusses…

  4. INTRODUCING OVER THE COUNTER COUNSELING

    Directory of Open Access Journals (Sweden)

    Nataša Bakić-Mirić

    2009-01-01

    Full Text Available A pharmacist in today’s world has a great responsibility – to help and educate patients about diverse ways for effective self-treatment. Whereas self-care is becoming increasingly popular among patients today the availability of over-the-counter medications makes it possible for patients to treat numerous conditions on their own but still under the supervision of a healthcare provider. During the pharmacist-patient encounter, the pharmacist’s obligation is to evaluate the patient’s medical condition, provide proper advice and counsel the patient on the proper course of treatment to be taken. Also by employing effective over the counter (OTC counseling as the most proper means in a pharmacist/patient communication process and, accordingly, rapport building in the OTC area, the pharmacist needs to demonstrate high energy, enthusiasm, respect, empathy, know-how of sensitive intercultural issues alongside personal appearance, body language, eye contact that all together make his/her personal “signature”. Accordingly, apart from patient education, the primary objective of OTC counseling becomes to educate pharmacists on basic principles used in assisting patients in the selection of over-the-counter (OTC products, provide examples of proper communication techniques for effective patient counseling concerning the OTC products (i.e. dosage, administration technique, storage, food and beverage interaction, monitoring etc where the pharmacist plays the key role in helping patients maximize their pharmaceutical care.

  5. Family Assessment and Genetic Counseling.

    Science.gov (United States)

    Carpenter, Pat; And Others

    Presented are two papers from a panel discussion on prenatal diagnosis and genetic counseling with families. D. Blackston (director of the Developmental Evaluation Clinic, Decatur, Georgia) points out that a concise family history, pregnancy and birth data, developmental history, careful physical examination, and appropriate laboratory studies are…

  6. New Careers in Genetic Counseling

    Science.gov (United States)

    Klein, Easy

    1976-01-01

    A graduate program at Sarah Lawrence College is designed to bridge the gap between the medical community with its advanced knowledge of genetics and couples facing hereditary diseases or handicaps. The aim is to train these middle-level professionals to counsel couples. (LBH)

  7. Guiding the Family: Practical Counseling Techniques.

    Science.gov (United States)

    Grunwald, Bernice Bronia; McAbee, Harold V.

    This book, intended as a text for therapists and counselors in family counseling, is based on principles of Adlerian psychology. The first chapter examines Adlerian theory and family counseling. Basic principles of individual psychology are applied to family counseling, and the goals of children with disturbing behavior are discussed. Reasons why…

  8. Counseling in Switzerland: Past, Present, and Future

    Science.gov (United States)

    Thomas, Roslyn; Henning, Stacy

    2012-01-01

    The authors review counseling in Switzerland and compare it with counseling in the United States. They evaluate the role of professional associations and programs and argue that the evolution of counseling is situated within the history and economic, social, and political systems of Switzerland. Findings suggest that Swiss counselors are ready to…

  9. Alabama Counseling Association Journal, 1997-1998.

    Science.gov (United States)

    Magnuson, Sandy, Ed.; Norem, Ken, Ed.

    1998-01-01

    This document consists of the two issues of the "Alabama Counseling Association Journal" published during 1997. The focus of the journal is on communicating ideas and information that will help counselors to implement the counseling role and develop the profession of counseling. The following articles are contained in issue 1:…

  10. A Framework for Chaos Theory Career Counselling

    Science.gov (United States)

    Pryor, Robert G. L.

    2010-01-01

    Theory in career development counselling provides a map that counsellors can use to understand and structure the career counselling process. It also provides a means to communicate this understanding and structuring to their clients as part of the counselling intervention. The chaos theory of careers draws attention to the complexity,…

  11. Identifying Role Diffusion in School Counseling

    Science.gov (United States)

    Astramovich, Randall L.; Hoskins, Wendy J.; Gutierrez, Antonio P.; Bartlett, Kerry A.

    2013-01-01

    Role ambiguity in professional school counseling is an ongoing concern despite recent advances with comprehensive school counseling models. The study outlined in this article examined role diffusion as a possible factor contributing to ongoing role ambiguity in school counseling. Participants included 109 graduate students enrolled in a…

  12. 28 CFR 551.113 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Counseling. 551.113 Section 551.113... Pretrial Inmates § 551.113 Counseling. (a) When consistent with institution security and good order, pretrial inmates may be allowed the opportunity to receive counseling services with convicted inmates. (b...

  13. 24 CFR 206.41 - Counseling.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Counseling. 206.41 Section 206.41... CONVERSION MORTGAGE INSURANCE Eligibility; Endorsement Eligible Mortgagors § 206.41 Counseling. (a) List... receive counseling. (b) Information to be provided. A counselor must discuss with the mortgagor: (1) The...

  14. Professional Counseling in Taiwan: Past to Future

    Science.gov (United States)

    Guo, Yuh-Jen; Wang, Shu-Ching; Combs, Don C.; Lin, Yi-Chun; Johnson, Veronica

    2013-01-01

    Because of the recent introduction of a licensure law, professional counseling has grown rapidly in Taiwan after decades of slow development. The authors provide a historical review of the development of professional counseling in Taiwan and discuss the current status and future trajectory of professional counseling in Taiwan.

  15. Evolving Expectations for Personality Traits in Counselling ...

    African Journals Online (AJOL)

    Practising counselling psychologists are aware of the dynamics and stress that therapists experience; therefore, the effort expended on counselling psychologists in training that will succeed and be satisfied with their work is an important concern. Counselling professionals may increasingly recognize the role of personality ...

  16. Understanding Philosophical Counseling | Sivil | South African ...

    African Journals Online (AJOL)

    philosophical counseling by exploring its points of convergence to and deviation from its complimentary parts – philosophy and counseling. The practical and applied orientation of philosophical counseling seems worlds apart from what many consider to exemplify philosophy – theoretical, intellectual and abstract concern ...

  17. Senior Legal Counsel | IDRC - International Development Research ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Legal Counsel works with, and provides legal and strategic advice to, staff throughout the Centre, at all levels. The Legal Counsel assists the Corporate Secretary and General Counsel in advising, and providing support to, Centre management and the Board of Governors on corporate governance matters.

  18. Psychological counselling and indigenous African knowledge ...

    African Journals Online (AJOL)

    Psychological counselling relates to basic humanity and universal values such as the regard for human dignity, healthy socialisation, and emotional health. Counselling individuals who experience emotional or relational problems is a function of the helping and health care professions. Effective counselling should provide ...

  19. 249 Marriage Counselling in Multicultural Society, Nigerian ...

    African Journals Online (AJOL)

    User

    2012-01-24

    Jan 24, 2012 ... The researcher sees Multicultural Counselling as a helping relationship, which involves two or more ... pastors and elders in the counselling profession. Some recommendations were made as ... Multicultural counselling is a helping relationship which involves two or more persons with different culture, ...

  20. Globalization and Counseling: Professional Issues for Counselors

    Science.gov (United States)

    Lorelle, Sonya; Byrd, Rebekah; Crockett, Stephanie

    2012-01-01

    Scholars have examined globalization for many years in terms of its impact on individuals, but it remains a concept not often discussed in the counseling literature. As counseling transforms from a Western-based practice to a global phenomenon, it is important to understand professional counseling within an international and multicultural context.…

  1. Student-to-Student Counseling. Final Report.

    Science.gov (United States)

    Baldwin, Roland A.

    The success of a student-to-student counseling Program which involves counseling of students by peers is attributed to greater acceptance of peer counselors by students because they 'speak the same language' and share the same problems. Counseling is conducted informally through telephone calls, in cafeterias and in classrooms. The student…

  2. Infusing Counseling Skills in Test Interpretation.

    Science.gov (United States)

    Rawlins, Melanie E.; And Others

    1991-01-01

    Presents an instructional model based on Neurolinguistic Programming that links counseling student course work in measurement and test interpretation with counseling techniques and theory. A process incorporating Neurolinguistic Programming patterns is outlined for teaching graduate students the counseling skills helpful in test interpretation.…

  3. Nigerian Journal of Clinical and Counselling Psychology

    African Journals Online (AJOL)

    The Nigerian Journal of Clinical and Counselling Psychology is concerned with the psychological, social, behavioural, medical, paediatric and ethical aspects of the applied field of clinical and counselling psychology. The journal publishes contributions of research, clinical, counselling and theoretical interest. Contributions ...

  4. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    Directory of Open Access Journals (Sweden)

    Salma Umme

    2011-04-01

    Full Text Available Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004/23/EC. To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225 in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004/23/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  5. Children from anonymous donors: an inquiry into homosexual and heterosexual parents' attitudes.

    Science.gov (United States)

    Brewaeys, A; Ponjaert-Kristoffersen, I; Van Steirteghem, A C; Devroey, P

    1993-01-01

    This study compared two groups of homosexual and heterosexual parents with respect to their attitudes towards the donor-origin of their children. All couples had applied at the Fertility Clinic for artificial insemination with anonymous donor sperm (AID). Both groups had used anonymous donors in order to conceive. However, the sexual orientation of the parents and the presence or absence of a social father was different in the two groups. By comparing such different families it was hoped to obtain insight into those factors which influence parents' attitudes concerning donor insemination. Twenty-five lesbian and 25 heterosexual parents were interviewed. The open-ended questionnaires solicited information on the following issues: attitudes towards secrecy/disclosure of the use of a donor, views on anonymity/identity registration of the donor, parents' cognitive and emotional representation of the donor. Response rates differed between the groups: all homosexual parents consented to the interview and 44% of the heterosexual parents did so. Parents' attitudes depended on several variables. The different family structures were related to different motivations for AID treatment. For heterosexual couples, the use of a donor offered them the opportunity to become a 'normal family'. For homosexual couples, creating a two-mother family unit meant going one step further in 'being different'. Attitudes towards the use of a donor were consequently different: heterosexual couples chose secrecy and donor anonymity. Homosexual parents intended to inform their children. Of these homosexual parents, 40% would prefer the identity of the donor to be registered. This evolution towards removal of the anonymity seemed to be encouraged by the openness surrounding the use of a donor itself. In both groups it remained difficult to reduce the donor to an anonymous sperm cell, fantasies and questions about the donor continued to exist over the years.

  6. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    LENUS (Irish Health Repository)

    Walsh, Anthony PH

    2011-04-20

    Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004\\/23\\/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004\\/23\\/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  7. Biblical counselling regarding inner change

    Directory of Open Access Journals (Sweden)

    Y. Campbell-Lane

    2005-07-01

    Full Text Available The concept of inner change is not only the ultimate goal of counselling; it is also a central concept of the gospel. Biblical counselling entails a Scriptural understanding of the nature of change and aims at helping the counsellee change his/her inner life under the guidance of the Holy Spirit. Change is the essence of the process of sanctification, entailing “putting off” (laying off sinful ways of life, renewing the mind, and ”putting on” (“clothing” oneself with godly ways of life (Eph. 4:22 ff.; Col. 3:8 ff.; Rom. 12:1-2. Although believers have a new identity in Christ, they still suffer from the effect of sin and have to grow in sanctification. Often the believer has not been instructed about changing previous irrational and unbiblical beliefs, behaviour, and habits, and he/she thus still integrates these negative results of sin into his/her new life. Unless old patterns are replaced with new ones, the counsellee can revert to sinful habits, unbiblical beliefs and behavioural patterns. A pastoral counsellor thus needs to teach the counsellee that God has made provision for him/her to change. A worldly anthropology-psychology is entirely opposed to the Biblical doctrines of sin and sanctification. Effective Biblical counselling depends on a Biblical anthropology and world view. A Biblical counsellor should promote holiness and a lifestyle in accordance with Biblical guidelines, thus shaping the counsellee to the likeness of Jesus Christ. When a Biblical counsellor ministers the Word of God in a life-transforming way, then God himself changes the counsellee from the inside out. A counsellor may not ignore sin and its effect as it will limit the effectiveness of counselling in facilitating lasting change in the life of a counsellee. It is important that a Biblical counseller understands the nature of change and is equipped with knowledge about, and the character of change.

  8. Darknet and bitcoin, the obscure and anonymous side of the internet in healthcare.

    Science.gov (United States)

    Masoni, Marco; Guelfi, Maria Renza; Gensini, Gian Franco

    2016-11-14

    Illegal activities prosecutable by law in the real life can be committed on the internet alike. In the healthcare domain, we refer mainly to selling of illegal and counterfeit drugs, exchange of pedo-pornographic material and marketing of stolen medical records. These illegal activities are made easier by recent developments of the Internet that medical community must be aware of: darknet and bitcoin. The first allows anonymous surfing and the last anonymous financial transactions. After discussing which healthcare areas are affected by these technological developments of the Internet and the deriving consequences, then the Authors express their opinion on what actions can be taken to protect internet community.

  9. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  10. Why Sex?

    DEFF Research Database (Denmark)

    Nielsen, Rasmus

    2006-01-01

    It is assumed that most organisms have sex because the resulting genetic recombination allows Darwinian selection to work better. It is now shown that in water fleas, recombination does lead to fewer deleterious mutations.......It is assumed that most organisms have sex because the resulting genetic recombination allows Darwinian selection to work better. It is now shown that in water fleas, recombination does lead to fewer deleterious mutations....

  11. Sex work and sex trafficking.

    Science.gov (United States)

    Ditmore, M; Saunders, P

    1998-01-01

    Preventing HIV infection and other sexually transmitted diseases (STDs), as well as sexual and physical violence, are major occupational health and safety concerns for prostitutes. Considerable evidence shows that anti-prostitution laws facilitate violence and abuse against prostitutes and may increase their risk of contracting HIV/STDs. For example, police often take advantage of existing laws against prostitution to demand money or sex. In general, the strict enforcement of anti-prostitution laws marginalizes prostitutes from services which could help them avoid abuse and promotes an environment in which prostitutes must take risks to avoid detection and arrest. One strategy to improve prostitutes' lives would therefore be to remove laws which prevent them from working safely and from travelling abroad to work legally. Projects in which prostitutes are actively involved have helped break down stereotypes against prostitutes, while police-sex worker liaison projects in Scotland and Australia have led to higher levels of reporting of crimes against prostitutes. The Network of Sex Work Projects (NSWP), an organization which links sex worker health programs around the world, has found that the incidence of HIV/STDs among prostitutes is lowest when they have control over their work conditions; access to condoms, lubricants, and other safe sex materials; and respect of their basic human and legal rights. People need to understand that consensual involvement in sex work is different from forced sex trafficking.

  12. HIV-related behaviors, social support and health-related quality of life among men who have sex with men and women (MSMW: a cross-sectional study in Chongqing, China.

    Directory of Open Access Journals (Sweden)

    Jiang-Peng Chen

    Full Text Available Health-related quality of life (HRQOL has become commonly used both as a concept and as a field of research. However, little is known about the HRQOL of men who have sex with men and women (MSMW. The aim of this study was to examine HIV-related behaviors, social support, and HRQOL status and explore its predictors among MSMW.An anonymous cross-sectional study was conducted by snowball sampling method in 2013. A total of 563 Chinese MSM completed a structured questionnaire. The HRQOL and social support were measured with the Chinese version of the World Health Organization Quality of Life Scale (WHOQOL-BRFE and the Social Support Rating Scale (SSRS, respectively.Of the 563 MSM analyzed, 77 (13.68% were MSMW who had a higher proportion of in-marriage and preference for an insertive role as compared with the men who have sex with men only (MSMO (P<0.05. As high as 70.13% of MSMW had no regular sex partners and 72.73% of MSMW reported engaging in unprotected anal sex in the last six months. 36.36% had tested for HIV, while only 12.99% had accepted HIV voluntary counseling and testing (VCT services. The scores of objective support and subjective support in MSMW were significantly higher than that of MSMO (P<0.05. No statistically significant difference was found in scores of all the four domains of the HRQOL between MSMW and MSMO. When comparing the HRQOL scores of MSMW with the Chinese general population reference group, the scores of MSMW were significantly lower in physical health domain. In a multivariate regression model, age, monthly income, sexual role, VCT acceptability, subjective support were associated with variability in HRQOL.To improve the HRQOL among MSMW, more attention needs to be paid to those with low social support, low-income, the old and those prefer a receptive role during anal sex populations.

  13. [Does really sex addiction exist?].

    Science.gov (United States)

    Echeburúa, Enrique

    2012-01-01

    Hypersexual Disorder has been proposed as a new psychiatric disorder for DSM-V, characterized by an increased frequency and intensity of sexually motivated fantasies, arousal, urges, and enacted behavior in association with an impulsivity component. Excessive appetitive and consummatory behaviors, including hypersexuality, can become a non-chemical addiction. Sexual addiction afflicts people having paraphilic or nonparaphilic behaviors associated with progressive risk-taking sexual behaviors, escalation or progression of sexual behaviors (tolerance), loss of control and significant adverse psychosocial consequences, such as unplanned pregnancy, pair-bond dysfunction, marital separation, financial problems and sexually transmitted diseases including HIV. The most common behaviors involved in sexual addiction are fantasy sex, compulsive masturbation, pornography, cybersex, voyeuristic sex, anonymous sex and multiple sexual partners. These behaviors are intended to reduce anxiety and other dysphoric affects (e.g., shame and depression). Axis I psychiatric diagnosis, especially mood disorders, psychoactive substance abuse disorders and attention deficit hyperactivity disorders, are common comorbid disorders with sexual addiction. There are significant gaps in the current scientific knowledge base regarding the clinical course, development risk factors and family history and data on women with sexual addiction are lacking.

  14. [Counseling interventions for smoking cessation: systematic review].

    Science.gov (United States)

    Alba, Luz Helena; Murillo, Raúl; Castillo, Juan Sebastián

    2013-04-01

    A systematic review on efficacy and safety of smoking cessation counseling was developed. The ADAPTE methodology was used with a search of Clinical Practice Guidelines (CPG) in Medline, EMBASE, CINAHL, LILACS, and Cochrane. DELBI was used to select CPG with score over 60 in methodological rigor and applicability to the Colombian health system. Smoking cessation rates at 6 months were assessed according to counseling provider, model, and format. In total 5 CPG out of 925 references were selected comprising 44 systematic reviews and meta-analyses. Physician brief counseling and trained health professionals' intensive counseling (individual, group, proactive telephone) are effective with abstinence rates between 2.1% and 17.4%. Only practical counseling and motivational interview were found effective intensive interventions. The clinical effect of smoking cessation counseling is low and long term cessation rates uncertain. Cost-effectiveness analyses are recommended for the implementation of counseling in public health programs.

  15. The Comparison of Attention Biases to Opiates in Substance Dependent and Treated Clients of Therapeutic Clinics and Narcotics Anonymous Memberships

    Directory of Open Access Journals (Sweden)

    Javad Enayat

    2012-11-01

    Full Text Available Aim: The purpose of this study was to compare the attention bias about tempting incentives related to opium materials in treated, addicted and normal people. Duration of consumption and treating were also considered. Method: In this causal-comparative study population was all addicted people who were referred to the rehabilitation offices, addiction treatment clinic, rebirthing centers and Narcotics Anonymous of East Azerbaijan. This study consisted of five groups of men, including addicted to opium materials which are divided into two groups namely: long consumption period and people with short consumption period, also, treated people including long term treated and short term treated, and a normal control group. Altogether, 103 selected people were studied. Sample groups were similar in terms of age, education, and sex. For measuring attention bias towards tempting stimuli related opiates, a words recognition test was used. This test included three subtests and one recognition test. The recognition scores for the three categories of words were measured. Results: The findings indicated that there was a difference in attention against opium material incentives between control group and the mild and severe consumers groups. Also there were significant differences between treated people with the short time distance and control group, and control group had less temptation and biases in comparison to the other groups. Finally, those who have mild consumption are threatened more in comparison with the control group. Conclusion: The findings have applied implications.

  16. Bayesian modeling of consumer behavior in the presence of anonymous visits

    Science.gov (United States)

    Novak, Julie Esther

    Tailoring content to consumers has become a hallmark of marketing and digital media, particularly as it has become easier to identify customers across usage or purchase occasions. However, across a wide variety of contexts, companies find that customers do not consistently identify themselves, leaving a substantial fraction of anonymous visits. We develop a Bayesian hierarchical model that allows us to probabilistically assign anonymous sessions to users. These probabilistic assignments take into account a customer's demographic information, frequency of visitation, activities taken when visiting, and times of arrival. We present two studies, one with synthetic and one with real data, where we demonstrate improved performance over two popular practices (nearest-neighbor matching and deleting the anonymous visits) due to increased efficiency and reduced bias driven by the non-ignorability of which types of events are more likely to be anonymous. Using our proposed model, we avoid potential bias in understanding the effect of a firm's marketing on its customers, improve inference about the total number of customers in the dataset, and provide more precise targeted marketing to both previously observed and unobserved customers.

  17. Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2015-10-01

    Full Text Available In a multi-receiver encryption system, a sender chooses a set of authorized receivers and sends them a message securely and efficiently, as the message is well encrypted and only one ciphertext corresponding to the message is generated no matter how many receivers the sender has chosen. It can be applied to video conferencing systems, pay-per-view channels, remote education, and so forth. Due to privacy considerations, an authorized receiver may not expect that his identity is revealed. In 2010, anonymous multi-receiver identity-based (ID-based encryption was first discussed, and furthermore, many works on the topic have been presented so far. Unfortunately, we find that all of those schemes fail to prove the chosen ciphertext attacks (CCA security in either confidentiality or anonymity. In this manuscript, we propose the first anonymous multi-receiver ID-based authenticated encryption scheme with CCA security in both confidentiality and anonymity. In the proposed scheme, the identity of the sender of a ciphertext can be authenticated by the receivers after a successful decryption. In addition, the proposed scheme also is the first CCA-secure one against insider attacks. Moreover, only one pairing computation is required in decryption.

  18. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  19. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...

  20. Medical Relabeling in Gamblers Anonymous: The Construction of an Ideal Member.

    Science.gov (United States)

    Turner, David N.; Saunders, Danny

    1990-01-01

    Observed 2 Gamblers Anonymous (GA) groups in South Wales over a 12-month period. Determined 2 broad consequences arose from encountering fellow sufferers: acceptance of diagnosis and commitment to recovery and to will of GA, or rejection of the diagnosis with the knowledge that they are returning to the outside world with a reconstituted…

  1. A globally optimal k-anonymity method for the de-identification of health data.

    Science.gov (United States)

    El Emam, Khaled; Dankar, Fida Kamal; Issa, Romeo; Jonker, Elizabeth; Amyot, Daniel; Cogo, Elise; Corriveau, Jean-Pierre; Walker, Mark; Chowdhury, Sadrul; Vaillancourt, Regis; Roffey, Tyson; Bottomley, Jim

    2009-01-01

    Explicit patient consent requirements in privacy laws can have a negative impact on health research, leading to selection bias and reduced recruitment. Often legislative requirements to obtain consent are waived if the information collected or disclosed is de-identified. The authors developed and empirically evaluated a new globally optimal de-identification algorithm that satisfies the k-anonymity criterion and that is suitable for health datasets. Authors compared OLA (Optimal Lattice Anonymization) empirically to three existing k-anonymity algorithms, Datafly, Samarati, and Incognito, on six public, hospital, and registry datasets for different values of k and suppression limits. Measurement Three information loss metrics were used for the comparison: precision, discernability metric, and non-uniform entropy. Each algorithm's performance speed was also evaluated. The Datafly and Samarati algorithms had higher information loss than OLA and Incognito; OLA was consistently faster than Incognito in finding the globally optimal de-identification solution. For the de-identification of health datasets, OLA is an improvement on existing k-anonymity algorithms in terms of information loss and performance.

  2. A context-sensitive approach to anonymizing spatial surveillance data: impact on outbreak detection.

    Science.gov (United States)

    Cassa, Christopher A; Grannis, Shaun J; Overhage, J Marc; Mandl, Kenneth D

    2006-01-01

    The use of spatially based methods and algorithms in epidemiology and surveillance presents privacy challenges for researchers and public health agencies. We describe a novel method for anonymizing individuals in public health data sets by transposing their spatial locations through a process informed by the underlying population density. Further, we measure the impact of the skew on detection of spatial clustering as measured by a spatial scanning statistic. Cases were emergency department (ED) visits for respiratory illness. Baseline ED visit data were injected with artificially created clusters ranging in magnitude, shape, and location. The geocoded locations were then transformed using a de-identification algorithm that accounts for the local underlying population density. A total of 12,600 separate weeks of case data with artificially created clusters were combined with control data and the impact on detection of spatial clustering identified by a spatial scan statistic was measured. The anonymization algorithm produced an expected skew of cases that resulted in high values of data set k-anonymity. De-identification that moves points an average distance of 0.25 km lowers the spatial cluster detection sensitivity by less than 4% and lowers the detection specificity less than 1%. A population-density-based Gaussian spatial blurring markedly decreases the ability to identify individuals in a data set while only slightly decreasing the performance of a standardly used outbreak detection tool. These findings suggest new approaches to anonymizing data for spatial epidemiology and surveillance.

  3. HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

    Directory of Open Access Journals (Sweden)

    Campos Javier

    2011-01-01

    Full Text Available Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, we propose and implement HOP, a novel solution based on cryptographic Host Identity Protocol (HIP that offers security and user-level anonymity in MANET environments while maintaining good performance levels. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT relationship anonymity, along with source/destination HIT anonymity when combined with multihoming. Afterward we detail how we integrate our improved version of HIP with the OLSR routing protocol to achieve efficient support for pseudonyms. We implemented our proposal in an experimental testbed, and the results obtained show that performance levels achieved are quite good, and that the integration with OLSR is achieved with a low overhead.

  4. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  5. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  6. A Quantitative Study on Anonymity and Professionalism within an Online Free Open Access Medical Education Community.

    Science.gov (United States)

    Dimitri, Daneilla; Gubert, Andrea; Miller, Amanda B; Thoma, Brent; Chan, Teresa

    2016-09-18

    The increasing use of social media to share knowledge in medical education has led to concerns about the professionalism of online medical learners and physicians. However, there is a lack of research on the behavior of professionals within open online discussions. In 2013, the Academic Life in Emergency Medicine website (ALiEM.com) launched a series of moderated online case discussions that provided an opportunity to explore the relationship between anonymity and professionalism. Comments from 12 case discussions conducted over a one-year period were analyzed using modified scales of anonymity and professionalism derived by Kilner and Hoadley. Descriptive statistics and Spearman calculations were conducted for the professionalism score, anonymity score, and level of participation. No correlation was found between professionalism and anonymity scores (rho = -0.004, p = 0.97). However, the number of comments (rho = 0.35, p professional environment through the use of a website with a positive reputation, the modelling of respectful behaviour by the moderators, the norms of the broader online community, and the pre-specified objectives for each discussion.

  7. Open and Anonymous Peer Review in a Digital Online Environment Compared in Academic Writing Context

    Science.gov (United States)

    Razi, Salim

    2016-01-01

    This study compares the impact of "open" and "anonymous" peer feedback as an adjunct to teacher-mediated feedback in a digital online environment utilising data gathered on an academic writing course at a Turkish university. Students were divided into two groups with similar writing proficiencies. Students peer reviewed papers…

  8. Brother-Sister Incest: Data from Anonymous Computer-Assisted Self Interviews

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel; Stroupe, Walter

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self interview. Forty were classified as victims of brother-sister incest, 19 were classified as victims of father-daughter incest, and 232 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The…

  9. Peer Feedback in Anonymous Peer Review in an EFL Writing Class in Spain

    Science.gov (United States)

    Coté, Robert A.

    2014-01-01

    The present study reports the results of a process of peer feedback through anonymous peer review in an EFL writing class. Numerous studies have reported on the benefits of peer review (PR) in the ESL/EFL writing classroom. However, the literature also identifies social issues that can negatively affect the outcome of face-to-face PR. In this…

  10. Romantic Relationship Advice from Anonymous Online Helpers: The Peer Support Adolescents Exchange

    Science.gov (United States)

    Kim, Jung-Eun; Weinstein, Emily C.; Selman, Robert L.

    2017-01-01

    This empirical study investigates adolescents' responses to peers' personal accounts of romantic relationship difficulties posted to an online forum. We analyze 440 anonymous responses to personal accounts of four romantic relationship issues: controlling partners, break-ups, trust issues, and partner cruelty. Responses were categorized, in order…

  11. Preconception and prenatal genetic counselling.

    Science.gov (United States)

    Ioannides, Adonis S

    2017-07-01

    Identifying individuals at risk of having children affected by genetic conditions or congenital anomalies allows counselling that aims to inform reproductive decisions. This process takes place either at the preconception or early prenatal stage, although more options are available if risks are identified before the pregnancy. Preconception counselling covers issues that can affect the health of the mother and baby including folic acid supplementation. Carrier screening for autosomal recessive diseases, such as beta thalassaemia, has resulted in a significantly reduced incidence in many countries. National organisations, however, advocate more in-depth research before such screening recommendations apply to the general population. Recently, advances in genomic technologies have made it possible to greatly expand the scope of genetic screening, with the aim of providing more comprehensive information to prospective parents. This is a complex field, and research should focus on how the technology can be put to best use in the future. Copyright © 2017. Published by Elsevier Ltd.

  12. [The pre-pregnancy counseling].

    Science.gov (United States)

    Le Guern, V; Guettrot-Imbert, G; Costedoat-Chalumeau, N

    2015-03-01

    Pre-pregnancy counseling is one of the keys of success of pregnancy in women with autoimmune or systemic diseases, especially lupus or antiphospholipid syndrome. This type of consultation should be offered to all women with systemic diseases, giving the possibility to allow a pregnancy or to explain why this project should be delayed, to anticipate some problems, to give comprehensive informations to the couple, to organize the multidisciplinary monitoring, to adapt treatments, and finally, to verify the validity of some vaccinations. The generalization of pre-pregnancy counseling should allow to minimize risks for both mother and fetus, then, to improve the prognosis of these high risk pregnancies. Copyright © 2014. Published by Elsevier SAS.

  13. Surgical patient selection and counseling

    Science.gov (United States)

    Ziegelmann, Matt; Köhler, Tobias S.; Bailey, George C.; Miest, Tanner; Alom, Manaf

    2017-01-01

    The objectives of patient selection and counseling are ultimately to enhance successful outcomes. However, the definition for success is often narrowly defined in published literature (ability to complete surgery, complications, satisfaction) and fails to account for patient desires and expectations, temporal changes, natural history of underlying diseases, or independent validation. Factors associated with satisfaction and dissatisfaction are often surgery-specific, although correlation with pre-operative expectations, revisions, and complications are common with most procedures. The process of appropriate patient selection is determined by the integration of patient and surgeon factors, including psychological capacity to handle unsatisfactory results, baseline expectations, complexity of case, and surgeon volume and experience. Using this model, a high-risk scenario includes one in which a low-volume surgeon performs a complex case in a patient with limited psychological capacity and high expectations. In contrast, a high-volume surgeon performing a routine case in a male with low expectations and abundant psychiatric reserve is more likely to achieve a successful outcome. To further help identify patients who are at high risk for dissatisfaction, a previously published mnemonic is recommended: CURSED Patient (compulsive/obsessive, unrealistic, revision, surgeon shopping, entitled, denial, and psychiatric). Appropriate patient counseling includes setting appropriate expectations, reviewing the potential and anticipated risks of surgery, post-operative instruction to limit complications, and long-term follow-up. As thorough counseling is often a time-consuming endeavor, busy practices may elect to utilize various resources including educational materials, advanced practice providers, or group visits, among others. The consequences for poor patient selection and counseling may range from poor surgical outcomes and patient dissatisfaction to lawsuits, loss of

  14. Subjectivity and professional vocational counselling

    OpenAIRE

    Müller, Marina

    2004-01-01

    In this work, I shall deal with the psychodynamic approach to subjectivity in P.V.C. To this effect, I want to develop the concept of subject and subjectivity, its variation and historical-social construction and its approach in counselling, from a psychodynamic conceptual framework in P.V.C. with a short reference to the theoretical sources on which this approach is founded. Departamento de Psicología

  15. Prenatal counseling regarding cesarean delivery.

    Science.gov (United States)

    Leeman, Lawrence M

    2008-09-01

    In 1970, the cesarean delivery rate in the United States was 5.5% and women receiving prenatal care only required the knowledge that cesarean delivery was an uncommon solution to dire obstetric emergencies. In 2008, when almost one in three women deliver by cesarean, counseling on cesarean delivery must be part of each woman's prenatal care. The content of that discussion varies based on the woman's obstetric history and the anticipated mode of delivery.

  16. Counseling of children and adolescents in community pharmacies: Results from a 14-day observational study.

    Science.gov (United States)

    Carpenter, Delesha M; Abraham, Olufunmilola; Alexander, Dayna S; Horowitz, Katherine

    2016-01-01

    To characterize community pharmacists' interactions with children and their caregivers. This observational study was conducted over a 14-day period in 3 community pharmacies. Trained researchers used an observation guide to document information about prescriptions that were picked up for children 7 to 17 years of age. Research assistants recorded: 1) when the prescription was picked up; 2) who picked up the prescription; 3) who was counseled by the pharmacist; 4) which pharmacy staff members interacted with the family; 5) pick-up location; 6) wait time; 7) how many questions the child or caregiver asked pharmacy staff; and 8) caregiver gender. Additional details such as the child's age, sex, and medication information were obtained from the prescription. One hundred sixteen prescriptions were dispensed to 97 families. Most families picked up prescriptions on weekdays (84%) and after school (53%). Fifty-four percent of prescriptions were refills, and most (38%) were for mental health conditions. Only 28 children (29%) accompanied their caregivers to pick up their prescription. Nineteen caregivers (20%) received counseling; children were never counseled separately by pharmacists. Families with younger children were more likely to receive counseling than older children (β = -0.28; P = 0.01). Children infrequently accompany their parents to pick up their prescriptions, which limits pharmacists' opportunities to counsel children about their medications. Even when children are present, they rarely receive counseling from pharmacists. Copyright © 2016 American Pharmacists Association®. Published by Elsevier Inc. All rights reserved.

  17. Teaching Genetic Counseling Skills: Incorporating a Genetic Counseling Adaptation Continuum Model to Address Psychosocial Complexity.

    Science.gov (United States)

    Shugar, Andrea

    2017-04-01

    Genetic counselors are trained health care professionals who effectively integrate both psychosocial counseling and information-giving into their practice. Preparing genetic counseling students for clinical practice is a challenging task, particularly when helping them develop effective and active counseling skills. Resistance to incorporating these skills may stem from decreased confidence, fear of causing harm or a lack of clarity of psycho-social goals. The author reflects on the personal challenges experienced in teaching genetic counselling students to work with psychological and social complexity, and proposes a Genetic Counseling Adaptation Continuum model and methodology to guide students in the use of advanced counseling skills.

  18. Guidelines for counselling in infertility: outline version.

    Science.gov (United States)

    Boivin, J; Appleton, T C; Baetens, P; Baron, J; Bitzer, J; Corrigan, E; Daniels, K R; Darwish, J; Guerra-Diaz, D; Hammar, M; McWhinnie, A; Strauss, B; Thorn, P; Wischmann, T; Kentenich, H

    2001-06-01

    The Guidelines for Counselling in Infertility describe the purpose, objectives, typical issues and communication skills involved in providing psychosocial care to individuals using fertility services. The Guidelines are presented in six sections. The first section describes how infertility consultations differ from other medical consultations in obstetrics and gynaecology, whereas the second section addresses fundamental issues in counselling, such as what is counselling in infertility, who should counsel and who is likely to need counselling. Section 3 focuses on how to integrate patient-centred care and counselling into routine medical treatment and section 4 highlights some of the special situations which can provoke the need for counselling (e.g. facing the end of treatment, sexual problems). Section 5 deals exclusively with third party reproduction and the psychosocial implications of gamete donation, surrogacy and adoption for heterosexual and gay couples and single women without partners. The final section of the Guidelines is concerned with psychosocial services that can be used to supplement counselling services in fertility clinics: written psychosocial information, telephone counselling, self-help groups and professionally facilitated group work. This paper summarizes the different sections of the Guidelines and describes how to obtain the complete text of the Guidelines for Counselling in Infertility.

  19. Alcoholics Anonymous

    Science.gov (United States)

    ... China Colombia Costa Rica Cuba Cyprus Czech Republic Denmark Dominican Republic Ecuador Egypt El Salvador Estonia Faroe ... Make a contribution | Self-Support Press/Media | Archives & History | A.A. General Service Board Calendar | G.S.O. ...

  20. The practice of OTC counseling by community pharmacists in Parana, Brazil

    Directory of Open Access Journals (Sweden)

    Halila GC

    2015-12-01

    Full Text Available Background: In order to provide appropriate advice to the patient at the time of dispensing and over-the-counter (OTC medication counseling, community pharmacists need access to current and reliable information about medicines. Brazilian pharmacists have assumed new functions such as prescribing medication, in a dependent model, based in protocols. Objective: To examine the practice of community pharmacists in a Brazilian State, focusing on OTC recommendation. Method: A cross-sectional survey of community pharmacists in a state of Brazil was conducted from October 2013 to January 2014, with data collection through a pre-piloted self-administered anonymous survey via Survey Monkey® platform. Following ethical approval, the online instrument was sent to 8,885 pharmacists registered in Parana State, Brazil, focusing on professionals working in community pharmacies. The questionnaire assessed the community pharmacy setting, the search for information, the knowledge of the evidence-based practice, the important factors to consider when recommending an OTC medicine, and the pharmacist prescribing. Responses were imported into SPSS® (version 22.0 for analysis. Nonparametric tests were used to assess the association between responses and demographic information with a significance level less than 5% (p<0.05. Results: Of the pharmacists, 97.4% dispensed medications and counseled patients for a median of six hours per day. Product's efficacy (97% and adverse effects (62.3% were the most important factors taken into account when counseling a nonprescription medicine. Few pharmacists knew the meaning of terms related to evidence-based health. Most respondents agreed that pharmacists have the necessary training to prescribe. Conclusion: Over-the-counter medication counseling is a daily practice among Brazilian pharmacists. Learning needs exist for community pharmacists in relation to evidence-based practice. Thus, sources of information with good evidence

  1. Adolescent Substance Abuse in Mexico, Puerto Rico and The United States: Effect of Anonymous versus Confidential Survey Formats

    Science.gov (United States)

    Latimer, William W.; O'Brien, Megan S.; Vasquez, Marco A.; Medina-Mora, Maria Elena; Rios-Bedoya, Carlos F.; Floyd, Leah J.

    2006-01-01

    Anonymous surveys have been widely used worldwide to describe adolescent substance use yet cannot elucidate causal drug abuse predictors. Studies in the U.S. have generally found that anonymous and confidential surveys yield comparable levels of self-reported substance use, yet the effect of survey format on youth self-report has not been…

  2. Emergence of Informal Educative Space out of an Anonymous Online Bulletin Board in Korea during the Global Economic Crisis

    Science.gov (United States)

    Kang, Dae Joong; Choi, Seon Joo; Lee, SeungHyeop

    2013-01-01

    This study aimed to understand how people learn and teach informally in an anonymous online bulletin board, the primary purpose of which is not learning and teaching. We conducted a qualitative analysis of comments and replies tagged to the most popular postings of an anonymous online bulletin board, during the global economic crisis in 2008-2009.…

  3. [Online Counselling: The prospect of a therapeutic connection].

    Science.gov (United States)

    Giotakos, O; Papadomarkaki, E

    2016-01-01

    Over the last few years, Internet has become an integral part of daily life. An abundant source of information and a principal gateway of communication between individuals, Internet has been continuously gaining considerable ground as a tool of awareness and intervention in the area of public health. With regard to the field of mental health, Internet exhibits a credible potential in facilitating dialogue not only between experts and their beneficiaries but also between stakeholders. Moreover and with regard to various aspects of public concern, it can serve as a circulation portal of educational material between students and teachers. The advent of remote support services dates back in the decade of 1970-1980. In the present time, they consist of informative guides and self-help groups or online counselling. The latter is defined as the process in which both parties, namely the therapist and the client, are involved in an oral or written conciliation through means of an internet connection, videoconferencing, live chat or e-mail exchange. The benefits of this practice - accessibility, relocation, convenience, anonymity, facilitation of face-to-face psychotherapy and low cost - could make online counseling, in specific cases, the treatment of choice. While the usage of the World Wide Web seems promising for the rectification of mental health disorders, there is some debate among experts regarding the ethical aspect of practicing psychotherapy in an interactive digital environment. Issues such as technical expertise and the tackling of related problems, difficulties in the diagnostic process, interchange of verbal and nonverbal cues, crisis management, safeguarding the therapeutic alliance, protection of personal data, age restriction, keeping boundaries in relation to the setting, the time and the dynamics of the therapeutic relationship and, finally, training and supervisory process of online therapist, are some subjects of disagreement. Relevant research reveals

  4. [Workplace Stress Counseling for Nurses: A Community Counseling Model].

    Science.gov (United States)

    Lin, Jen-Hsiang; Hsiao, Shiuan-Tzu

    2017-04-01

    Nurses play an integral role in providing medical services, with the quality of nursing care related closely to the level of success that these services achieve. Nursing is a high-stress occupation with a relatively high risk of work burnout, which has been associated with reduced workplace satisfaction, increased turnover, and reduced patient safety. In recent years, the high level of work-related stress in nursing has been an important issue for the government, academia, and industry. Although various plans and policies have been developed to improve the nursing environment in order to reduce stress, these have focused only on the general nursing-practice environment without substantive consideration of the impact of psychological, social, and cultural factors on nursing work stress. The present article introduces a community-counseling model and proposes a strategic plan that is designed to reduce the workplace stress of clinical nurses. We hope that the proposed model may substantially improve the problem of nursing stress and prevent work burnout. This model provides a reference for advanced nursing colleagues. Associated programs may be developed for other hospitals and organizations that use the community-counseling model.

  5. Developments in infertility counselling and its accreditation.

    Science.gov (United States)

    Monach, Jim

    2013-03-01

    Infertility counselling was placed in a unique position by the passage of the Human Fertilisation and Embryology Act 1990 and the requirement that couples being treated should be offered counselling. However professional counselling was, and largely still is, at a stage at which there was no universal agreement on the knowledge, standards or qualifications required for practice. Nevertheless, infertility counselling became the first example of counselling to be required by statute, beyond the more generalised requirement in adoption birth records access. Counselling is intended to describe skilled talking therapy offered by a professional with specific training and qualifications directed to helping individuals and couples to achieve goals they own themselves. The therapeutic intervention of counselling is primarily directed to helping clients in a stressful situation to deploy their own coping skills effectively and thus make the difficult choices inseparable from ART. Counselling outcome research consistently demonstrates the effectiveness of the sort of counselling delivered in assisted conception units with mild-moderate anxiety and depression delivered by skilled and experienced practitioners. This article reviews the role of counsellors as members of the assisted conception clinical team and the status of regulation and accreditation in this very new profession.

  6. Current Institutional Trends in Research Productivity in Counseling Psychology Journals

    Science.gov (United States)

    Diegelman, Nathan M.; Uffelman, Rachel A.; Wagner, Kimberly S.; Diegelman, Sally A.

    2005-01-01

    This study investigated institutional publication activity in counseling psychology journals for the 10-year period from 1993 to 2002. Four journals reported by counseling psychology training directors as prime publication outlets for the field of counseling psychology were used: "Journal of Counseling Psychology," "The Counseling Psychologist,"…

  7. 15 CFR 0.735-38 - Availability for counseling.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Availability for counseling. 0.735-38... AND CONDUCT Administration § 0.735-38 Availability for counseling. (a) The General Counsel of the... part; and (3) Coordinate the counseling services provided under this part and assure that counseling...

  8. Gestures in Guidance and Counselling and Their Pedagogical ...

    African Journals Online (AJOL)

    The purpose of this paper was to x-ray the implications of gestures, their usage and relevance in guidance and counselling. ... non-verbal cues in counselling do not stand on its own but embedded in other counselling techniques used during a counselling process from the beginning to the ending of counselling interview.

  9. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.

  10. THE WIKILEAKS´S CASE AND ANONYMITY: EFFECTS ON THE INFORMATION FREEDOM

    Directory of Open Access Journals (Sweden)

    Marlus Heriberto Arns de Oliveira

    2015-10-01

    Full Text Available The Constitution of the Federative Republic of Brazil, enacted in 1988 during the democratization process of the country after the end of an authoritarian regime preceded by several others that show a non-democratic tradition in the Brazilian Republic, remained still remnants an authoritarian Patronizing and Paternalist state, the example of the final part of the Article 5, item IV, which claims to be the free expression of thought, but forbids anonymity, prohibition which deserves to be rethought, especially on the internet, where the navigation data of people deserve protection, as well as their rights to remain anonymous, a fact which entails the need for reflection on the scope and how best to interpret the constitutional provision cited, a debate that, in the proposed article will deal think the ideas of paternalism, authoritarianism and freedom, whose focus will be about within the Internet, social networks and the Knowledge Society.

  11. An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-02-01

    With the development of wireless networks and medical sensors, wireless body area networks are playing more and more important role in the field of healthcare service. The data transmitted in WBANs is very sensitive since it will be used in clinical diagnoses or measurements. Therefore, security and privacy of communication in WBANs derive increasing attentions from the academia and industry. In this paper, we propose an identity (ID)-based efficient anonymous authentication scheme for WBANs using elliptic curve cryptosystem (ECC). Due to the ID-based concept, there is no certificate is needed in the proposed scheme. Moreover, the proposed scheme not only provides mutual authentication between the client and the application provider but also provides client anonymity. Performance analysis shows that improvements of 50.58% and 3.87% in the client side and the application provider side separately. Then the proposed scheme is more suitable for WBANs.

  12. Anonymous three-party password-authenticated key exchange scheme for Telecare Medical Information Systems.

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Dong, Na; Wong, Duncan S

    2014-01-01

    Telecare Medical Information Systems (TMIS) provide an effective way to enhance the medical process between doctors, nurses and patients. For enhancing the security and privacy of TMIS, it is important while challenging to enhance the TMIS so that a patient and a doctor can perform mutual authentication and session key establishment using a third-party medical server while the privacy of the patient can be ensured. In this paper, we propose an anonymous three-party password-authenticated key exchange (3PAKE) protocol for TMIS. The protocol is based on the efficient elliptic curve cryptosystem. For security, we apply the pi calculus based formal verification tool ProVerif to show that our 3PAKE protocol for TMIS can provide anonymity for patient and doctor while at the same time achieves mutual authentication and session key security. The proposed scheme is secure and efficient, and can be used in TMIS.

  13. A Semantic-Based K-Anonymity Scheme for Health Record Linkage.

    Science.gov (United States)

    Lu, Yang; Sinnott, Richard O; Verspoor, Karin

    2017-01-01

    Record linkage is a technique for integrating data from sources or providers where direct access to the data is not possible due to security and privacy considerations. This is a very common scenario for medical data, as patient privacy is a significant concern. To avoid privacy leakage, researchers have adopted k-anonymity to protect raw data from re-identification however they cannot avoid associated information loss, e.g. due to generalisation. Given that individual-level data is often not disclosed in the linkage cases, but yet remains potentially re-discoverable, we propose semantic-based linkage k-anonymity to de-identify record linkage with fewer generalisations and eliminate inference disclosure through semantic reasoning.

  14. A Framework For Enhancing Privacy In Location Based Services Using K-Anonymity Model

    Directory of Open Access Journals (Sweden)

    Jane Mugi

    2015-08-01

    Full Text Available Abstract This paper presents a framework for enhancing privacy in Location Based Services using K-anonymity model. Users of location based services have to reveal their location information in order to use these services however this has threatened the user privacy. K-anonymity approach has been studied extensively in various forms. However it is only effective when the user location is fixed. When a user moves and continuously sends their location information the location service provider can approximate user trajectory which poses a threat to the trajectory privacy of the user. This framework will ensure that user privacy is enhanced for both snapshot and continuous queries. The efficiency and effectiveness of the proposed framework was evaluated the results indicate that the proposed framework has high success rate and good run time performance.

  15. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  16. Anonymous three-party password-authenticated key exchange scheme for Telecare Medical Information Systems.

    Directory of Open Access Journals (Sweden)

    Qi Xie

    Full Text Available Telecare Medical Information Systems (TMIS provide an effective way to enhance the medical process between doctors, nurses and patients. For enhancing the security and privacy of TMIS, it is important while challenging to enhance the TMIS so that a patient and a doctor can perform mutual authentication and session key establishment using a third-party medical server while the privacy of the patient can be ensured. In this paper, we propose an anonymous three-party password-authenticated key exchange (3PAKE protocol for TMIS. The protocol is based on the efficient elliptic curve cryptosystem. For security, we apply the pi calculus based formal verification tool ProVerif to show that our 3PAKE protocol for TMIS can provide anonymity for patient and doctor while at the same time achieves mutual authentication and session key security. The proposed scheme is secure and efficient, and can be used in TMIS.

  17. Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party

    Directory of Open Access Journals (Sweden)

    Jingyu Hua

    2017-01-01

    Full Text Available In collaborative data publishing (CDP, an m-adversary attack refers to a scenario where up to m malicious data providers collude to infer data records contributed by other providers. Existing solutions either rely on a trusted third party (TTP or introduce expensive computation and communication overheads. In this paper, we present a practical distributed k-anonymization scheme, m-k-anonymization, designed to defend against m-adversary attacks without relying on any TTPs. We then prove its security in the semihonest adversary model and demonstrate how an extension of the scheme can also be proven secure in a stronger adversary model. We also evaluate its efficiency using a commonly used dataset.

  18. The social dynamics of selling sex in Mombasa, Kenya

    African Journals Online (AJOL)

    AJRH Managing Editor

    counselling, and condom distribution interventions among FSWs, unprotected sexual intercourse remains a large behavioural challenge. Research on this topic has been limited primarily to establishing the frequency of high risk sexual behaviour without a comprehensive ..... Young men want to have sex but can't pay for it.

  19. Five-year monitoring of a gay-friendly voluntary counselling and testing facility in Switzerland: who got tested and why?

    Directory of Open Access Journals (Sweden)

    Gumy Cédric

    2012-06-01

    Full Text Available Abstract Background An increase in new HIV cases among men who have sex with men (MSM has been reported in Switzerland since 2001. A rapid result HIV testing for MSM through voluntary counselling and testing (VCT facility (“Checkpoint” was opened in Geneva in 2005. This gay-friendly facility, the first to open in Switzerland, provides testing for sexually transmitted infections (STI and rapid result HIV testing and counselling. Our objective was to analyze Checkpoint’s activity over its first five years of activity and its ability to attract at-risk MSM. Methods We used routine data collected anonymously about the facility activity (number of clients, number of tests, and test results and about the characteristics of the clientele (sociodemographic data, sexual risk behaviour, and reasons for testing from 2005 to 2009. Results The yearly number of HIV tests performed increased from 249 in 2005 to 561 in 2009. The annual proportion of positive tests among tests performed varied between 2% and 3%. Among MSM clients, the median annual number of anal intercourse (AI partners was three. Roughly 30% of all MSM clients had at least one unprotected anal intercourse (UAI experience in the previous 12 months with a partner of different/unknown HIV status. The main reason for testing in 2007, 2008, and 2009 was “sexual risk exposure” (~40%, followed by “routine” testing (~30% and “condom stopping in the beginning of a new steady relationship” (~10%. Clients who came to the facility after a sexual risk exposure, compared to clients who came for "routine testing" or "condom stopping" reasons, had the highest number of AI partners in the previous 12 months, were more likely to have had UAI with a partner of different/unknown HIV status in the previous 12 months (respectively 57.3%, 12.5%, 23.5%, more likely to have had an STI diagnosed in the past (41.6%, 32.2%, 22.9%, and more likely to report recent feelings of sadness or depression

  20. Un algorithme probabiliste d'election et d'arbre couvrant sur des reseaux anonymes

    OpenAIRE

    Lavallee, Ivan; Lavault, C.

    1989-01-01

    Dans le present rapport, nous proposons deux variantes d'un algorithme distribue, probabiliste, asynchrone d'election et de construction d'arbre couvrant dans des reseaux anonymes a topologie quelconque. A notre connaissance, cet algorithme est le premier du genre, a etre totalement et rigoureusement specifie. Il est fonde sur un precedent algorithme deterministe d'election pour reseaux de processus a identites distinctes. Nous montrons ici comment construire les deux variantes, suivant deux ...

  1. Facebook’s Ugly Sisters: Anonymity and Abuse on Formspring and Ask.fm

    OpenAIRE

    Binns, Amy

    2013-01-01

    New question and answer websites Ask.fm and Formspring have brought highly specific and personal abuse to a new level amongst young people by providing easy anonymity to users within a circle of offline friendship groups culled from Facebook. Relatively unknown due to their unattractiveness to adults, these sites are growing rapidly and have already been associated with at least eight suicides amongst teenagers. \\ud \\ud Media educators at school level encouraging self-awareness of social medi...

  2. Nursing lives in the blogosphere: A thematic analysis of anonymous online nursing narratives.

    Science.gov (United States)

    Castro, Aimee; Andrews, Gavin

    2018-02-01

    The aim of this study was to explore the work-life narratives of nurses through a thematic analysis of the nursing accounts they post in their publicly accessible, anonymous blogs. Many nurses participate on social media. Blogs have been advocated as a self-reflective tool in nursing practice, yet as far as the authors are aware, no previous studies have explored nurses' individual blogs for their potential to reveal nurses' perceptions of nursing work. The research design was qualitative description. Between May-August 2015, Internet search engines were used to discover lists of nursing blogs recommended by organizations representing nurses' interests. Recommended blogs were purposively sampled. Four anonymous blogs written by nurses from different nursing specialties met the sampling criteria. All 520 of their entries from 2014 were read and copied into NVivo 10, where an inductive coding process was followed. Three major themes arose in these nurses' online discussions of their work lives: they truly care about and value their nursing work, but they are feeling stressed and burnt out and they are using their anonymous blogs to share factors that frustrate them in their nursing work. Three main areas of frustration were revealed: teamwork problems, challenging patients and families, and management issues. Anonymous nursing blogs offer valuable, longitudinal insights into nurses' perceptions of their work lives. Nursing blogs should be further explored for ongoing insights into nurses' experiences of nursing work, as well as nurses' recommendations for addressing issues causing them to feel frustrated in their work environments. © 2017 John Wiley & Sons Ltd.

  3. Use of anonymous Web communities and websites by medical consumers in Japan to research drug information.

    Science.gov (United States)

    Kishimoto, Keiko; Fukushima, Noriko

    2011-01-01

    In this study, we investigated the status of researching drug information online, and the type of Internet user who uses anonymous Web communities and websites. A Web-based cross-sectional survey of 10875 male and female Internet users aged 16 and over was conducted in March 2010. Of 10282 analyzed respondents, excluding medical professionals, about 47% reported that they had previously searched the Internet for drug information and had used online resources ranging from drug information search engines and pharmaceutical industry websites to social networking sites and Twitter. Respondents who had researched drug information online (n=4861) were analyzed by two multivariable logistic regressions. In Model 1, the use of anonymous websites associated with age (OR, 0.778; 95% CI, 0.742-0.816), referring to the reputation and the narrative of other Internet users on shopping (OR, 1.640; 95% CI, 1.450-1.855), taking a prescription drug (OR, 0.806; 95% CI, 0.705-0.922), and frequent consulting with non-professionals about medical care and health (OR, 1.613; 95% CI, 1.396-1.865). In Model 2, use of only anonymous websites was associated with age (OR, 0.753; 95% CI, 0.705-0.805), using the Internet daily (OR, 0.611; 95% CI, 0.462-0.808), taking a prescription drug (OR, 0.614; 95% CI, 0.505-0.747), and experience a side effect (OR, 0.526; 95% CI, 0.421-0.658). The analysis revealed the profiles of Internet users who researched drug information on social media sites where the information providers are anonymous and do not necessarily have adequate knowledge of medicine and online information literacy.

  4. Gamblers Anonymous in Israel: a participant observation study of a self-help group.

    Science.gov (United States)

    Cromer, G

    1978-10-01

    This participant observation study of the first Gamblers Anonymous group in Israel is designed to show (1) the ways in which the group helps it members rehabilitate themselves, (2) the three stages through which they must go in order to ensure success, and (3) the reason why some participants fail to do so. The article concludes with a number of observations concerning the extent of gambling in Israel and the different ways that should be developed for dealing with the problem.

  5. [Examination of the Young maladaptive schemes in a group of Gamblers Anonymous].

    Science.gov (United States)

    Katona, Zsuzsa; Körmendi, Attila

    2012-01-01

    Literature of gambling addiction has become widespread in last years. Many studies were written about the vulnerability factors helping the development of addiction, theoretical models, comorbid problems and therapy possibilities. Currently there is no integrated theoretical model that could explain sufficiently the development and maintenance of pathological gambling. The treatment issue is also unresolved. Cognitive psychology is a dynamically developing field of psychology and good results are achieved in gambling treatment with applying cognitive techniques. Jeffrey Young's schema-focused therapy is a recent theoretical and therapeutic direction within cognitive psychology which emphasizes the necessity of emotional changes beside rational ones in the interest of efficiency. The purpose of our research is to examine and analyse active maladaptive schemas among gamblers who are members of Gamblers Anonymous self-help group. 23 control persons and 23 gamblers associated with support group of Gamblers Anonymous took part in our research. The severity of gambling behaviour was measured by Gamblers Anonymous Twenty Questions. For exploring maladaptive schemas we used the shorter 114-item version of the Young Schema Questionnaire (YSQ-S3). All the examined gamblers were considered as problem gamblers based on Gamblers Anonymous Twenty Questions. In the control group there where no active schemas while in the group of gamblers several schemas (Emotional deprivation, Self-sacrifice, Recognition seeking, Emotional inhibition, Unrelenting standards, Self-punitiveness, Insufficient self-control) showed activity. Active schemas show similarity in their matter with main establishments of researches about gamblers and support the role of impulsivity, narcissistic traits, self-medicalization and emotional deprivation in the development and maintenance of pathological gambling.

  6. Mirroring the videos of Anonymous:cloud activism, living networks, and political mimesis

    OpenAIRE

    Fish, Adam Richard

    2016-01-01

    Mirrors describe the multiplication of data across a network. In this article, I examine the politics of mirroring as practiced on videos by the hacktivist network Anonymous. Mirrors are designed to retain visibility on social media platforms and motivate viewers towards activism. They emerge from a particular social structure and propagate a specific symbolic system. Furthermore, mirrors are not exact replicas nor postmodern representations. Rather, mirroring maps a contestation over visibil...

  7. Mutual support and recovery in the Russian Alcoholics Anonymous online community

    Directory of Open Access Journals (Sweden)

    Lyytikäinen Laura

    2016-04-01

    Full Text Available AIMS – In Russia the paradigm of alcoholism as a disease is still in contrast to the general perception of alcoholics as weak-willed. This article studies alcoholism and recovery in Russia through the case study of the Russian Alcoholics Anonymous online group. It studies how people who are seeking help for their drinking problems in this online community come to incorporate a new self-understanding of being ill with alcoholism.

  8. Anonymous As a Cyber Tribe: A New Model for Complex, Non-State Cyber Actors

    Science.gov (United States)

    2015-05-01

    non- state cyber actors. The Air Force values a professional workplace that strictly prohibits racism , sexism, lewd material, and most forms of...AU/ACSC/LIDOWSKI, R/AY15 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY ANONYMOUS AS A CYBER TRIBE: A NEW MODEL FOR COMPLEX, NON- STATE ...government or the Department of Defense. In accordance with Air Force Instruction 51-303, it is not copyrighted, but is the property of the United

  9. Local and global recoding methods for anonymizing set-valued data

    KAUST Repository

    Terrovitis, Manolis

    2010-06-10

    In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to his identity, the publication of such data is still subject to privacy attacks from adversaries who have partial knowledge about the set. Unlike most previous works, we do not distinguish data as sensitive and non-sensitive, but we consider them both as potential quasi-identifiers and potential sensitive data, depending on the knowledge of the adversary. We define a new version of the k-anonymity guarantee, the k m-anonymity, to limit the effects of the data dimensionality, and we propose efficient algorithms to transform the database. Our anonymization model relies on generalization instead of suppression, which is the most common practice in related works on such data. We develop an algorithm that finds the optimal solution, however, at a high cost that makes it inapplicable for large, realistic problems. Then, we propose a greedy heuristic, which performs generalizations in an Apriori, level-wise fashion. The heuristic scales much better and in most of the cases finds a solution close to the optimal. Finally, we investigate the application of techniques that partition the database and perform anonymization locally, aiming at the reduction of the memory consumption and further scalability. A thorough experimental evaluation with real datasets shows that a vertical partitioning approach achieves excellent results in practice. © 2010 Springer-Verlag.

  10. Counseling through Images: Using Photography to Guide the Counseling Process and Achieve Treatment Goals

    Science.gov (United States)

    Ginicola, Misty M.; Smith, Cheri; Trzaska, Jessica

    2012-01-01

    Creative approaches to counseling help counselors to meet the needs of diverse populations. The utility of photography in counseling has been demonstrated through several case studies; however, clear implications of how photography relates to the counseling process have not been well delineated. The existing literature on phototherapy is reviewed…

  11. Trainees versus Staff: Exploring Counseling Outcomes in a College Counseling Center

    Science.gov (United States)

    Ilagan, Guy; Vinson, Mike; Sharp, Julia L.; Havice, Pamela; Ilagan, Jill

    2014-01-01

    Investigators compared counseling outcomes among nonpaid graduate-level trainees and professional staff at a college counseling center. Counseling outcomes for 331 college student participants were measured using the Outcome Questionnaire 45.2 (OQ45.2), employing a pretest--posttest design. The two groups of service providers did not differ…

  12. Career Counselling Development: A Case Study of an Innovative Career Counselling Tool

    Science.gov (United States)

    Papakota, Aikaterini

    2016-01-01

    Promoting the use of new technologies in the career counselling process, the Career Services Office of the Aristotle University of Thessaloniki has developed an easy-to-use career counselling guide containing multimedia applications. The purpose of this career guide, called "Career Counseling@Career Office of Aristotle University of…

  13. Integrating Motivational Interviewing into a Basic Counseling Skills Course to Enhance Counseling Self-Efficacy

    Science.gov (United States)

    Iarussi, Melanie H.; Tyler, Jessica M.; Littlebear, Sarah; Hinkle, Michelle S.

    2013-01-01

    Motivational interviewing (MI), a humanistic counseling style used to help activate clients' motivation to change, was integrated into a basic counseling skills course. Nineteen graduate-level counseling students completed the Counselor Estimate of Self-Efficacy at the start and conclusion of the course. Significant differences were found between…

  14. There is no ``I'' in referee: Why referees should be anonymous

    Science.gov (United States)

    Ucko, Daniel

    2015-03-01

    From the early days of modern science, it has been recognized that scientific claims must be verified by someone who is not the maker of those claims, and who furthermore has no stake in the matter. In other words, claims need to be evaluated objectively, by the community. The way in which this tends to be done is by peer review conducted by journals. Peer review as currently practiced touches on the themes of trust, where the trust is in institutions and procedures that emerge from expert communities. The practice of peer review is viewed as a citizenly duty of scientists in the scientific community, because all scientists take turns serving either as authors, referees, and editors in the peer review process We lack the resources to have a work evaluated by the entire community, so we substitute with a representative. Yet, in most examples of scientific review, the referee or referees are anonymous. This question is particularly important when the peer review process is brought to bear in order to evaluate matters beyond scientific validity, more ``subjective'' criteria such as relative importance, broadness of interest - criteria that do not appear to have an objective standard of comparison and validation. I will show that the anonymity of referees, far from endangering this trust, actually strengthens it. I will show that this anonymity is crucial in order to maintain any objectivity in scientific peer review, and why authors should not try to unmask the referee. Also at American Physical Society (APS).

  15. Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation

    Directory of Open Access Journals (Sweden)

    Rahaman Sazzadur

    2017-10-01

    Full Text Available Group signature schemes enable anonymous-yet-accountable communications. Such a capability is extremely useful for applications, such as smartphone-based crowdsensing and citizen science. However, the performance of modern group signature schemes is still inadequate to manage large dynamic groups. In this paper, we design the first provably secure verifier-local revocation (VLR - based group signature scheme that supports sublinear revocation, named Sublinear Revocation with Backward unlinkability and Exculpability (SRBE. To achieve this performance gain, SRBE introduces time bound pseudonyms for the signer. By introducing low-cost short-lived pseudonyms with sublinear revocation checking, SRBE drastically improves the efficiency of the group-signature primitive. The backward-unlinkable anonymity of SRBE guarantees that even after the revocation of a signer, her previously generated signatures remain unlinkable across epochs. This behavior favors the dynamic nature of real-world crowdsensing settings. We prove its security and discuss parameters that influence its scalability. Using SRBE, we also implement a prototype named GroupSense for anonymous-yet-accountable crowdsensing, where our experimental findings confirm GroupSense’s scalability. We point out the open problems remaining in this space.

  16. kACTUS 2: Privacy Preserving in Classification Tasks Using k-Anonymity

    Science.gov (United States)

    Kisilevich, Slava; Elovici, Yuval; Shapira, Bracha; Rokach, Lior

    k-anonymity is the method used for masking sensitive data which successfully solves the problem of re-linking of data with an external source and makes it difficult to re-identify the individual. Thus k-anonymity works on a set of quasi-identifiers (public sensitive attributes), whose possible availability and linking is anticipated from external dataset, and demands that the released dataset will contain at least k records for every possible quasi-identifier value. Another aspect of k is its capability of maintaining the truthfulness of the released data (unlike other existing methods). This is achieved by generalization, a primary technique in k-anonymity. Generalization consists of generalizing attribute values and substituting them with semantically consistent but less precise values. When the substituted value doesn’t preserve semantic validity the technique is called suppression which is a private case of generalization. We present a hybrid approach called compensation which is based on suppression and swapping for achieving privacy. Since swapping decreases the truthfulness of attribute values there is a tradeoff between level of swapping (information truthfulness) and suppression (information loss) incorporated in our algorithm.

  17. Potential harms, anonymization, and the right to withdraw consent to biobank research.

    Science.gov (United States)

    Eriksson, Stefan; Helgesson, Gert

    2005-09-01

    This paper discusses the potential harms involved in biobank research and how ethical review, informed consent, withdrawals, and anonymization of samples should be handled in the light of these harms. There is less risk involved in biobank research than in human subject research; it should therefore be treated differently. In our view, anonymization should not be an automatically permissible response to requests for withdrawal. Nor should a request for withdrawal necessarily stop research on identifiable samples. Apart from not being particularly appropriate for protecting the interests of individuals, anonymization of samples has a negative impact on research. We suggest that the current view on withdrawal from research, supported by the Declaration of Helsinki and subsequent ethical guidelines, be abandoned in the context of biobank research and be replaced by an approach inspired by the Nuremberg Code. This approach requires those wishing to withdraw their samples from research to present sufficient reason for doing so. Our interpretation of 'sufficient reason' includes all those involving genuine, deeply felt concerns that are not based on misconceptions. Still, this underlines the fact that we all share a responsibility for health research and that no one should take withdrawal from biobank research lightly.

  18. Does the type of anonymity matter? The impact of visualization on information sharing in online groups.

    Science.gov (United States)

    Wodzicki, Katrin; Schwämmlein, Eva; Cress, Ulrike; Kimmerle, Joachim

    2011-03-01

    Groups who share information in computer-mediated settings often have to deal with the issue of anonymity. Previous research has shown that only people with a prosocial orientation--that is, those whose main interest is to add to the benefit of the group as a whole--are willing to share information in anonymous situations. The willingness to share information by those people with a proself orientation--that is, those who put more emphasis on their personal benefit--can be increased by providing photographs of the other group members. The information-sharing behavior of prosocials, however, suffers from such a deletion of anonymity. In an online experiment, we examined how information-sharing behavior of proselfs may be increased without negatively influencing the information-sharing behavior of prosocials in an online setting. It was shown that even proselfs share information if the group members are visualized in a homogeneous way, while prosocials' information-sharing behavior is not impaired by this visualization. In addition, the results suggest that people's perceived homogeneity of the online group, as well as the importance of the collective goal, are the underlying processes of this effect. These results have important practical implications for the design of online information-sharing settings.

  19. Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

    Directory of Open Access Journals (Sweden)

    Abdel-Shakour Abuzneid

    2015-03-01

    Full Text Available Wireless sensor network (WSN consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc. and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC protocol for WSN.

  20. Causes and strategies of limiting psychoactive substance use by female escort agency sex workers

    Directory of Open Access Journals (Sweden)

    Izabela Ślęzak

    2016-09-01

    Conclusions: Escort agency sex workers use the public support system for addicted individuals to an insignificant extent. They also do not participate in the Anonymous Alcoholics meetings. The crossing stigma related to prostitution and psychoactive substance abuse encourage them to undertake independent attempts to limit consumption, especially such that do not require participation in a therapy or in self-help groups.

  1. Sex and Relationships Education in Schools: The Views and Experiences of Young People

    Science.gov (United States)

    Selwyn, Neil; Powell, Eryl

    2007-01-01

    Purpose: The purpose of the paper is to investigate how young people are using school-based sources of sex and relationships education (SRE) to obtain information and advice. Design/methodology/approach: The paper shows how anonymous self-completion questionnaires were administered to young people aged between 12 and 19 years in three secondary…

  2. The Knowledge, Attitude and Behavior of HIV/AIDS Patients’ Family toward Their Patients before and after Counseling

    Directory of Open Access Journals (Sweden)

    Behnam Honarvar

    2010-12-01

    Full Text Available Background: Acquired immunodeficiency may impose considerableconsequences on patients’ family behaviors towardthem. The objective of the present study was to investigatewhether a counseling program at Behavioral Counseling Centerin the city of Shiraz, Iran could change the attitude, knowledgeand behavior of patients' family members.Methods: 125 HIV/AIDS patients’ family members were interviewed,using a valid and reliable questionnaire before andafter performing counseling sessions at Behavioral CounselingCenter. The findings were analyzed using nonparametric tests.Results: The age of the participants was 40±13 years. Sixty fivepercent were female, 63% married and 79% educated. Forty fourpercent of participants had spousal relationships with their patients.Their knowledge about the main routes of HIV transmissionwere 9.76 ± 2.59 and10.64±0.88 before and after counseling,respectively (P=0.028. Supportive behaviors of families towardtheir patients reached to 79% after counseling compared with 44% before that (P=0.004. Belief to isolate the patients and thepractice of this approach at home dropped from 71% to 15% andfrom 29% to 7% after counseling, respectively (P0.05.Conclusion: Ongoing counseling for HIV/AIDS patients’ familiesat Behavioral Counseling Center of Shiraz did advance theirknowledge about AIDS and improved their attitude and behaviortoward their patients However, the counseling program didnot show remarkable success in some aspects such as the removalof fear about HIV spread in the family or the change ofthe patients’ wives attitude to have protected sex with their HIVinfected husbands.Iran J Med Sci 2010; 35(4: 287-292.

  3. Effect of screening and lifestyle counselling on incidence of ischaemic heart disease in general population

    DEFF Research Database (Denmark)

    Jørgensen, Torben; Jacobsen, Rikke Kart; Toft, Ulla

    2014-01-01

    OBJECTIVE: To investigate the effect of systematic screening for risk factors for ischaemic heart disease followed by repeated lifestyle counselling on the 10 year development of ischaemic heart disease at a population level. DESIGN: Randomised controlled community based trial. SETTING: Suburbs...... of Copenhagen, Denmark PARTICIPANTS: 59 616 people aged 30-60 years randomised with different age and sex randomisation ratios to an intervention group (n=11 629) and a control group (n=47 987). INTERVENTION: The intervention group was invited for screening, risk assessment, and lifestyle counselling up to four...... times over a five year period. All participants with an unhealthy lifestyle had individually tailored lifestyle counselling at all visits (at baseline and after one and three years); those at high risk of ischaemic heart disease, according to predefined criteria, were furthermore offered six sessions...

  4. Effect of screening and lifestyle counselling on incidence of ischaemic heart disease in general population

    DEFF Research Database (Denmark)

    Jørgensen, Torben; Jacobsen, Rikke Kart; Toft, Ulla

    2014-01-01

    OBJECTIVE: To investigate the effect of systematic screening for risk factors for ischaemic heart disease followed by repeated lifestyle counselling on the 10 year development of ischaemic heart disease at a population level. DESIGN: Randomised controlled community based trial. SETTING: Suburbs...... of Copenhagen, Denmark. PARTICIPANTS: 59,616 people aged 30-60 years randomised with different age and sex randomisation ratios to an intervention group (n = 11,629) and a control group (n = 47,987). INTERVENTION: The intervention group was invited for screening, risk assessment, and lifestyle counselling up...... to four times over a five year period. All participants with an unhealthy lifestyle had individually tailored lifestyle counselling at all visits (at baseline and after one and three years); those at high risk of ischaemic heart disease, according to predefined criteria, were furthermore offered six...

  5. Combating human trafficking in the sex trade: can sex workers do it better?

    Science.gov (United States)

    Jana, Smarajit; Dey, Bharati; Reza-Paul, Sushena; Steen, Richard

    2014-12-01

    The dominant anti-trafficking paradigm conflates trafficking and sex work, denying evidence that most sex workers choose their profession and justifying police actions that disrupt communities, drive sex workers underground and increase vulnerability. We review an alternative response to combating human trafficking and child prostitution in the sex trade, the self-regulatory board (SRB) developed by Durbar Mahila Samanwaya Committee (DMSC, Sonagachi). DMSC-led interventions to remove minors and unwilling women from sex work account for over 80% of successful 'rescues' reported in West Bengal. From 2009 through 2011, 2195 women and girls were screened by SRBs: 170 (7.7%) minors and 45 (2.1%) unwilling adult women were assisted and followed up. The remaining 90.2% received counselling, health care and the option to join savings schemes and other community programmes designed to reduce sex worker vulnerability. Between 1992 and 2011 the proportion of minors in sex work in Sonagachi declined from 25 to 2%. With its universal surveillance of sex workers entering the profession, attention to rapid and confidential intervention and case management, and primary prevention of trafficking-including microcredit and educational programmes for children of sex workers-the SRB approach stands as a new model of success in anti-trafficking work. © The Author 2013. Published by Oxford University Press on behalf of Faculty of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  6. Applying quranic contemplation in counseling

    Directory of Open Access Journals (Sweden)

    Daris Tamin

    2016-12-01

    Full Text Available The intent of this research project was to explore the use of Quranic contemplation practices in counseling. In Islamic terminology that mean Quranic contemplation known as Tadabbur Al-Quran. Referring to this objective, this research is on the continuum between basic research and applied research. The research method that has been applied mix method beetwen quantitative and qualitative approaches. Integrating the two methods were considered appropriate for pragmatism paradigm adopted in this research. Based on the results of the research found that: Quranic Contemplation in Counseling that applicable on four general phases, namely: Exploration, Reading Scripture, Developing, and Supplication. In particular, at each session consists of seven steps, namely: (1 build engagement counselee to open his/her heart to accept the Quran as a heart medicine, the instructions for the peace of mind and happiness in life; (2 exposing the problems of the counselee; (3 identify the norms adopted counselee; (4 guiding the counselee for contemplations with Quran in the order: recited, guiding understand the meaning of the verse, raised the focus on words related to the problem, the main message conveyed paragraph, reflecting the message of verses in everyday life; and expand the discussion; (5 made a commitment to change the behavior of current and future; (6 invited to join in the spiritual community; and (7 guided prayer.

  7. [The practice of breastfeeding counseling].

    Science.gov (United States)

    Bueno, Lais Graci dos Santos; Teruya, Keiko Miyasaki

    2004-11-01

    To provide health professionals with information on theory and practice of breastfeeding counseling. MEDLINE, Bireme library, Lilacs, relevant Internet websites, scientific journals, technical books, essays, theses, and national and international publications were selected, studied and used to provide information on the topic. The most important sources of data were: a publication by the World Health Organization (WHO - 1993) and the authors' experience and clinic practice in the assistance of mothers, children and families. A trained pediatrician plays a relevant role on increasing breastfeeding rates and its duration. To improve this performance, in 1993, WHO designed a 40-hour course using an important didactic strategy aimed at health professionals and mothers. The goal was to protect, promote and support maternal nursing. It is a professional way of dealing with the mother by listening and trying to understand her, offering her help on planning, taking decisions, and getting strength on how to deal with pressures, thus increasing her confidence and self-esteem. Scientific evidence proves the effectiveness of Breastfeeding Counseling. Moreover, health professional's knowledge and practice are very important to increase breastfeeding rates.

  8. Mother-daughter Relationship and Sex Education from Mother to Daughter

    OpenAIRE

    Suizu , Hiroko; Ikeda, Rie; Sugiura, Kinuko

    2017-01-01

    The purpose of this study was to investigate the relationship between primigravidae and their mothers and to assess the present state of sex education that primigravidae receive from their mothers. Responses to an anonymous self-administered questionnaire were received from 133 primigravidae. Of these, 42.9% had conversations about sex other than menstruation before their pregnancy and 30.1% had these conversations after pregnancy. Mothers and daughters who had high intimacy between them usua...

  9. (a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems.

    Science.gov (United States)

    Li, Hongtao; Guo, Feng; Zhang, Wenyin; Wang, Jie; Xing, Jinsheng

    2018-02-14

    The widely use of IoT technologies in healthcare services has pushed forward medical intelligence level of services. However, it also brings potential privacy threat to the data collection. In healthcare services system, health and medical data that contains privacy information are often transmitted among networks, and such privacy information should be protected. Therefore, there is a need for privacy-preserving data collection (PPDC) scheme to protect clients (patients) data. We adopt (a,k)-anonymity model as privacy pretection scheme for data collection, and propose a novel anonymity-based PPDC method for healthcare services in this paper. The threat model is analyzed in the client-server-to-user (CS2U) model. On client-side, we utilize (a,k)-anonymity notion to generate anonymous tuples which can resist possible attack, and adopt a bottom-up clustering method to create clusters that satisfy a base privacy level of (a 1 ,k 1 )-anonymity. On server-side, we reduce the communication cost through generalization technology, and compress (a 1 ,k 1 )-anonymous data through an UPGMA-based cluster combination method to make the data meet the deeper level of privacy (a 2 ,k 2 )-anonymity (a 1  ≥ a 2 , k 2  ≥ k 1 ). Theoretical analysis and experimental results prove that our scheme is effective in privacy-preserving and data quality.

  10. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    Science.gov (United States)

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is

  11. Use of the Encouragement Process in Adlerian Counseling

    Science.gov (United States)

    Dinkmeyer, Don C.

    1972-01-01

    Encouragement in all facets of the counseling interview is a critical ingredient in the counseling process. This article sets forth the theory and specific applications of the encouragement process in counseling, as viewed in the socio-teleological model. (Author)

  12. [In Nigeria: sexual permissiveness and sex education].

    Science.gov (United States)

    Demehin, A O

    1983-07-01

    Considering the population explosion in Nigeria which is due both to medical advances and traditional beliefs in large families as well as the recent trend of sexual permissiveness which involves the teenagers population, the author of the article considers that sex education is imperative in Nigeria. However, he sees many obstacles standing in the way of general acceptance of sex education. The husband-wife relationship does not encourage free communication on the subject and colonization has removed the traditional forms of sex education through initiation rites and pre-marital counseling by the elders so that young people nowadays rely mostly on peer information or erotic movies and publications. It seems to the author that the only avenue left open is to teach sex education through the school systems. A systematic review of the provisions for sex education in primary and secondary schools as well as teacher's training colleges bring the author to the conclusion that although the sex education curriculum seems comprehensive on paper, they are mere copies of similar American or Canadian programmes with very little attempt at indigenizing them. Furthermore, the syllabus seem to be concentrated on one year instead of being spread out over the school career. The author expresses his conviction that the topic could easily be made acceptable with the right approach and he advocates grounding sex education teaching in the traditional roots of the students.

  13. Marital and Family Counseling in Prisons.

    Science.gov (United States)

    Showalter, David; Jones, Charlotte Williams

    1980-01-01

    Describes series of successful marital workshops conducted at Kansas State Penitentiary, involving problems of inmates, their wives and children. Marital and family counseling seen as effective in implementing changes in inmates' attitudes and behaviors. Recommends marital counseling in all penitentiaries; suggests social workers work to make…

  14. Marriage Counselling in Multicultural Society, Nigerian Experience ...

    African Journals Online (AJOL)

    The paper also discusses the problems facing the multicultural counselling which include cultural bias among counsellor, lack of knowledge among counsellors and interference of pastors and elders in the counselling profession. Some recommendations were made as follows; development of awareness of cultural values ...

  15. Marital Counseling: An Integrated Brief Therapy Approach.

    Science.gov (United States)

    Magnuson, Sandy; Norem, Ken

    1998-01-01

    Addresses advantages of, and potential pitfalls in, integrated approaches to marital counseling. Presents a sequential approach in which various approaches to marital counseling are integrated without jeopardizing internal consistency and uniformity in treatment. Offers precounseling considerations and procedures for a five-session series.…

  16. Venezuelan Counseling: Advancement and Current Challenges

    Science.gov (United States)

    Vera, George Davy

    2011-01-01

    In the worldwide community it is not well known that counseling and guidance professional practices have a long tradition in Venezuela. Therefore, this contribution's main purpose is to inform the international audience about past and contemporary counseling in Venezuela. Geographic, demographic, and cultural facts about Venezuela are provided.…

  17. Workplace Counselling: Implications For Enhanced Productivity ...

    African Journals Online (AJOL)

    It further presents a model of workplace counseling and concludes that increase in work related trauma and stress, accidents at the workplace, harassment and bullying, absenteeism, low productivity/poor performance and labour turnover will be nipped in the bud if counseling service is provided at the workplace.

  18. Career Counseling and Occupational Preferences Among ...

    African Journals Online (AJOL)

    Career Counseling and Occupational Preferences Among Secondary School Students in Cross River State, Nigeria. ... Annals of Modern Education ... senatorial district of Cross River State, Nigeria to investigate the implication of career counseling on the occupational preferences of senior secondary school students.

  19. Artificial Intelligence, Counseling, and Cognitive Psychology.

    Science.gov (United States)

    Brack, Greg; And Others

    With the exception of a few key writers, counselors largely ignore the benefits that Artificial Intelligence (AI) and Cognitive Psychology (CP) can bring to counseling. It is demonstrated that AI and CP can be integrated into the counseling literature. How AI and CP can offer new perspectives on information processing, cognition, and helping is…

  20. Paradigm Shift In Career Counselling: Implications For ...

    African Journals Online (AJOL)

    However, many of the respondents were aware of the need for a new approach to career counselling. The implication of this finding to entrepreneurship development is the need to adopt a paradigm shift in career counselling. Retraining of practicing counsellors and new training guides for student counsellors as well as the ...