WorldWideScience

Sample records for anonymous sex counselling

  1. Single-Sex Counseling Groups and Minicourses for Women Students.

    Science.gov (United States)

    Kidd, Nancy V.; Hudson, George R.

    1978-01-01

    Women students in a community college were studied to determine the effects of single-sex counseling groups and two single-sex minicourses on reducing alienation and increasing self-regard and inner direction in women. (Author)

  2. Marriage Equality for Same-Sex Couples: Counseling Psychologists as Social Change Agents

    Science.gov (United States)

    Rostosky, Sharon S.; Riggle, Ellen D. B.

    2011-01-01

    The denial of civil marriage rights is a specific example of minority stress that can negatively affect the psychosocial well-being of self-identified lesbian, gay, bisexual, transgender, and queer (LGBTQ) individuals in same-sex partnerships, their families, and their allies. Counseling psychologists have an important role in addressing the…

  3. Alcoholics Anonymous

    Science.gov (United States)

    ... Banners Site Help What's New Welcome to Alcoholics Anonymous ® NEED HELP WITH A DRINKING PROBLEM? If you ... drinking problem, wish to learn more about Alcoholics Anonymous or want to find A.A. near you, ...

  4. Anonymous Gossiping

    CERN Document Server

    Datta, Anwitaman

    2010-01-01

    In this paper we introduce a novel gossiping primitive to support privacy preserving data analytics (PPDA). In contrast to existing computational PPDA primitives such as secure multiparty computation and data randomization based approaches, the proposed primitive `anonymous gossiping' is a communication primitive for privacy preserving personalized information aggregation complementing such traditional computational analytics. We realize this novel primitive by composing existing gossiping mechanisms for peer sampling & information aggregation and onion routing technique for establishing anonymous communication. This is more an `ideas' paper, rather than providing concrete and quantified results.

  5. Against anonymity.

    Science.gov (United States)

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile. PMID:24724540

  6. Group Anonymity

    CERN Document Server

    Chertov, Oleg; 10.1007/978-3-642-14058-7_61

    2010-01-01

    In recent years the amount of digital data in the world has risen immensely. But, the more information exists, the greater is the possibility of its unwanted disclosure. Thus, the data privacy protection has become a pressing problem of the present time. The task of individual privacy-preserving is being thoroughly studied nowadays. At the same time, the problem of statistical disclosure control for collective (or group) data is still open. In this paper we propose an effective and relatively simple (wavelet-based) way to provide group anonymity in collective data. We also provide a real-life example to illustrate the method.

  7. Efficacy of Personalized Cognitive Counseling in Men of Color who Have Sex with Men: Secondary Data Analysis from a Controlled Intervention Trial

    OpenAIRE

    Dilley, James W.; Schwarcz, Sandy; Murphy, Jessie; Joseph, Charlotte; Vittinghoff, Eric; Scheer, Susan

    2010-01-01

    In a previous report, we demonstrated the efficacy of a cognitively based counseling intervention compared to standard counseling at reducing episodes of unprotected anal intercourse (UAI) among men who have sex with men (MSM) seeking HIV testing. Given the limited number of efficacious prevention interventions for MSM of color (MOC) available, we analyzed the data stratified into MOC and whites. The sample included 196 white MSM and 109 MOC (23 African Americans, 36 Latinos, 22 Asians, eight...

  8. Counselling clients to follow 'the rules' of safe sex and ARV treatment

    DEFF Research Database (Denmark)

    Mubanda Rasmussen, Louise

    behaviour. To explore this phenomenon, the paper analyses a number of dynamics characterising HIV counselling in Uganda, including the pressures of the global bio-political project to ‘save lives’ with ART, the counsellors' working conditions in resource-constrained clinics, the professional authority of...

  9. High Linkage to Care in a Community-Based Rapid HIV Testing and Counseling Project Among Men Who Have Sex With Men in Copenhagen

    DEFF Research Database (Denmark)

    Qvist, Tavs; Cowan, Susan Alice; Graugaard, Christian;

    2014-01-01

    of the Copenhagen MSM community provided sexually transmitted infection counseling and rapid HIV testing. In addition, syphilis testing and hepatitis B vaccination were offered. The clinic was staffed with specially trained, predominantly non-health care personnel, and services were anonymous and free of charge...... out the established health care system. Checkpoint diagnosed 37 new HIV cases, posed no barrier to successful linkage to care, was noninferior in quickly reducing community viral load, was cost-effective, reached younger MSM, and proved an ideal platform for trying out new interventions and test forms......, which conventional health care providers have not yet embraced....

  10. Anonymity in Voting Revisited

    Science.gov (United States)

    Jonker, Hugo; Pieters, Wolter

    According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in e-voting. First, we identify and categorise the types of attack that can be a threat to anonymity of the voter, including different types of vote buying and coercion. This analysis leads to a categorisation of anonymity in voting in terms of a) the strength of the anonymity achieved and b) the extent of interaction between voter and attacker. Some of the combinations, including weak and strong receipt-freeness, are formalised in epistemic logic.

  11. Lack of HIV Testing and Awareness of HIV Infection among Men Who Have Sex with Men, Beijing, China

    Science.gov (United States)

    Choi, Kyung-Hee; Lui, Hui; Guo, Yaqi; Han, Lei; Mandel, Jeffrey S.

    2006-01-01

    In China, men who have sex with men (MSM) are at high risk for HIV. However, little is known about their HIV testing behavior. From September 2001 to January 2002, we recruited 482 men through social networks and MSM venues. We conducted HIV testing and counseling, and anonymous, standardized face-to-face interviews. Eighty-two percent of…

  12. Using Meditation in Addiction Counseling

    Science.gov (United States)

    Young, Mark E.; DeLorenzi, Leigh de Armas; Cunningham, Laura

    2011-01-01

    Meditation has been studied as a way of reducing stress in counseling clients since the 1960s. Alcoholics Anonymous, Narcotics Anonymous, and new wave behavior therapies incorporate meditation techniques in their programs. This article identifies meditation's curative factors and limitations when using meditation in addiction settings.

  13. Anonymizing Unstructured Data

    CERN Document Server

    Motwani, Rajeev

    2008-01-01

    In this paper we consider the problem of anonymizing datasets in which each individual is associated with a set of items that constitute private information about the individual. Illustrative datasets include market-basket datasets and search engine query logs. We formalize the notion of k-anonymity for set-valued data as a variant of the k-anonymity model for traditional relational datasets. We define an optimization problem that arises from this definition of anonymity and provide a constant factor approximation algorithm for the same. We evaluate our algorithms on the America Online query log dataset.

  14. An Anonymity Revocation Technology for Anonymous Communication

    Science.gov (United States)

    Antoniou, Giannakis; Batten, Lynn; Parampalli, Udaya

    A number of privacy-enhancing technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who use PETs have been proposed. These are known as anonymity revocation technologies (ARTs). However, the construction of ARTs has been developed in an ad hoc manner without a theoretical basis outlining the goals and underlying principles. In this chapter we present a set of fundamental principles and requirements for construction of an ART, identifying the necessary features. We then propose an abstract scheme for construction of an ART based on these features.

  15. Quantum anonymous voting with anonymity check

    International Nuclear Information System (INIS)

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  16. [Self-disclosure on the Internet: the effects of anonymity of the self and the other].

    Science.gov (United States)

    Sato, Hirotsune; Yoshida, Fujio

    2008-02-01

    The effects of anonymity on self-disclosure were investigated in a CMC (computer-mediated communication) situation by separately manipulating the anonymity of the self and the other. It was hypothesized that anonymity of the self would enhance disclosure, whereas anonymity of the other would decrease it. Female undergraduate students (n = 60) were randomly assigned to a 2 (self: anonymous or non-anonymous) x 2 (other: anonymous or non-anonymous) experimental design. The anonymity of the self and the other was manipulated in the profile, such as the photo, name, and sex of the self or the other, on the computer screen. The results indicated that anonymity of the self decreased the feeling of anxiety, but had no effect on disclosure, whereas anonymity of the other decreased the feeling of closeness and decreased the intimacy of disclosure. PMID:18402057

  17. True Anonymity Without Mixes

    Science.gov (United States)

    Molina-Jimenez, C.; Marshall, L.

    2002-04-01

    Anonymizers based on mix computers interposed between the sender and the receiver of an e-mail message have been used in the Internet for several years by senders of e-mail messages who do not wish to disclose their identity. Unfortunately, the degree of anonymity provided by this paradigm is limited and fragile. First, the messages sent are not truly anonymous but pseudo-anonymous since one of the mixes, at least, always knows the sender's identity. Secondly, the strength of the system to protect the sender's identity depends on the ability and the willingness of the mixes to keep the secret. If the mixes fail, the sender/'s anonymity is reduced to pieces. In this paper, we propose a novel approach for sending truly anonymous messages over the Internet where the anonymous message is sent from a PDA which uses dynamically assigned temporary, non-personal, random IP and MAC addresses. Anonymous E-cash is used to pay for the service.

  18. Economical quantum anonymous transmissions

    International Nuclear Information System (INIS)

    We present a new information-theoretically secure protocol for the anonymous transmission of quantum information. Different from the pioneering works, we use single photons to construct anonymous entanglement instead of multi-partite entangled states in this protocol, and therefore we reduce the complexity of physical implementation in practice.

  19. Anonymity, Deindividuation and Aggression.

    Science.gov (United States)

    Baron, Robert S.

    Several writers suggest that reducing one's sense of individuality reduces social restraints. The author suggests that the effect of uniformity of appearance on aggression is unclear when anonymity is held constant. This poses a problem of interpretation given that a distinction must be made between lack of individuality and anonymity. One must…

  20. Anonymity in science.

    Science.gov (United States)

    Neuroskeptic

    2013-05-01

    The history of science is replete with important works that were originally published without the author's legal name being revealed. Most modern scientists will have worked anonymously in their capacity as peer reviewers. But why is anonymity so popular? And is it a valid approach? I argue that pseudonymity and anonymity, although not appropriate for all forms of scientific communication, have a vital role to play in academic discourse. They can facilitate the free expression of interpretations and ideas, and can help to ensure that suggestions and criticisms are evaluated dispassionately, regardless of their source. PMID:23570959

  1. Trust in Anonymity Networks

    Science.gov (United States)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  2. Internet-Facilitated, Voluntary Counseling and Testing (VCT) Clinic-Based HIV Testing among Men Who Have Sex with Men in China

    OpenAIRE

    Zou, Huachun; Wu, Zunyou; Yu, JianPing; Li, Min; Ablimit, Muhtar; Li, Fan; Poundstone, Katharine

    2013-01-01

    Objective To explore the feasibility of using Internet outreach to encourage men who have sex with men (MSM) to get tested for HIV at voluntary counseling and testing (VCT) clinics in Beijing and Urumqi, China. Methods From June to August 2007, two volunteers contacted MSM using instant messaging, online chat rooms, mobile phone, and e-mail (active recruitment). Banners with study information were put at the front pages of three major Chinese gay websites (passive recruitment). Those contacte...

  3. Suicidal ideation and sex differences in relation to 18 major psychiatric disorders in college and university students: anonymous web-based assessment.

    Science.gov (United States)

    Tupler, Larry A; Hong, Jennifer Y; Gibori, Ron; Blitchington, Timothy F; Krishnan, K Ranga R

    2015-04-01

    College/university students are at high risk for psychiatric disorder and suicide secondary to age, campus stressors, and social pressures. We therefore report frequencies of 18 Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision disorders and suicidal ideation (SI) acquired anonymously from a Web site receiving 113,181 visits from more than 1,500 predominantly US colleges/universities. Depression was foremost, followed by social phobia and eating disorders. Substance-related disorders were less frequent than expected. SI occurred in 47.1% of students, with women evidencing somewhat stronger findings than men. SI was more associated with substance, bipolar, and panic disorders than depression. Self-reported emotional volatility exceeded thoughts of self-harm for all disorders. The results support two subtypes of suicide risk: dysphoric premeditators and those primarily angry and/or impulsive. Clinicians and researchers should therefore consider suicide as an independent psychopathological phenomenon that includes emotional volatility as a risk factor and thoroughly evaluate psychiatric disorders potentially conferring greater suicidal propensity than depression. PMID:25784307

  4. A Pilot Trial of a Sexual Health Counseling Intervention for HIV-Positive Gay and Bisexual Men Who Report Anal Sex without Condoms

    Science.gov (United States)

    Hart, Trevor A.; Stratton, Natalie; Coleman, Todd A.; Wilson, Holly A.; Simpson, Scott H.; Julien, Rick E.; Adam, Barry D.

    2016-01-01

    Background Even in the presence of promising biomedical treatment as prevention, HIV incidence among men who have sex with men has not always decreased. Counseling interventions, therefore, continue to play an important role in reducing HIV sexual transmission behaviors among gay and bisexual men and other men who have sex with men. The present study evaluated effects of a small-group counseling intervention on psychosocial outcomes and HIV sexual risk behavior. Method HIV-positive (HIV+) peer counselors administered seven 2-hour counseling sessions to groups of 5 to 8 HIV+ gay and bisexual men. The intervention employed information provision, motivational interviewing, and behavioral skills building to reduce sexual transmission risk behaviors. Results There was a significant reduction in condomless anal sex (CAS) with HIV-negative and unknown HIV-status partners, from 50.0% at baseline to 28.9% of the sample at 3-month follow-up. Findings were robust even when controlling for whether the participant had an undetectable viral load at baseline. Significant reductions were also found in the two secondary psychosocial outcomes, loneliness and sexual compulsivity. Conclusions The findings provide preliminary evidence that this intervention may offer an efficient way of concurrently reducing CAS and mental health problems, such as sexual compulsivity and loneliness, for HIV+ gay and bisexual men. Trial Registration ClinicalTrials.gov NCT02546271 PMID:27054341

  5. 32 CFR 196.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling... Programs or Activities Prohibited § 196.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling...

  6. 45 CFR 618.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Activities Prohibited § 618.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or guidance...

  7. 34 CFR 106.36 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling... Programs or Activities Prohibited § 106.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling...

  8. 45 CFR 2555.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Activities Prohibited § 2555.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or guidance...

  9. Anonymity in the Internet

    OpenAIRE

    Federrath, Hannes

    2006-01-01

    Research in Privacy Enhancing Technology has meanwhile a tradition of at least 20 years. One application (if not the most significant at the present) of Privacy Enhancing Technology is anonymous Web surfing. While weak protection can be achieved by simple proxy solutions, strong anonymity needs more effort: Systems like JAP and TOR are based on the idea of the "mix network" introduced by David Chaum in 1981. The talk presents selected basic privacy enhancing techniques, available practical so...

  10. Performance evaluation of various K- anonymity techniques

    Science.gov (United States)

    Maheshwarkar, Nidhi; Pathak, Kshitij; Chourey, Vivekanand

    2011-12-01

    Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked with the private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. This paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. This paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.

  11. Anonymous Mobile Payment Solution

    Directory of Open Access Journals (Sweden)

    Alhaj Ali Jalila

    2015-09-01

    Full Text Available The evolution and increasing popularity of mobile handheld devices has led to the development of payment applications. The global acceptance of mobile payments is hindered by security and privacy concerns. One of the main problems evoked is the anonymity related with banking transactions. In this paper I propose a new secured architecture for mobile banking. Anonymity and privacy protection are the measures to be enhanced in order to satisfy people’s current needs. The banking platform must provide the highest level of security for messages exchanged between bank and the customer.

  12. Anonymous Biometric Access Control

    Directory of Open Access Journals (Sweden)

    Shuiming Ye

    2009-01-01

    Full Text Available Access control systems using the latest biometric technologies can offer a higher level of security than conventional password-based systems. Their widespread deployments, however, can severely undermine individuals' rights of privacy. Biometric signals are immutable and can be exploited to associate individuals' identities to sensitive personal records across disparate databases. In this paper, we propose the Anonymous Biometric Access Control (ABAC system to protect user anonymity. The ABAC system uses novel Homomorphic Encryption (HE based protocols to verify membership of a user without knowing his/her true identity. To make HE-based protocols scalable to large biometric databases, we propose the k-Anonymous Quantization (kAQ framework that provides an effective and secure tradeoff of privacy and complexity. kAQ limits server's knowledge of the user to k maximally dissimilar candidates in the database, where k controls the amount of complexity-privacy tradeoff. kAQ is realized by a constant-time table lookup to identity the k candidates followed by a HE-based matching protocol applied only on these candidates. The maximal dissimilarity protects privacy by destroying any similarity patterns among the returned candidates. Experimental results on iris biometrics demonstrate the validity of our framework and illustrate a practical implementation of an anonymous biometric system.

  13. 6 CFR 17.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 17.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...

  14. 7 CFR 15a.36 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling... Education Programs and Activities Prohibited § 15a.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in...

  15. 49 CFR 25.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 25.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...

  16. 45 CFR 86.36 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 86.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...

  17. 10 CFR 5.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials... in Education Programs or Activities Prohibited § 5.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in...

  18. 22 CFR 229.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 229.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...

  19. 22 CFR 146.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 146.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...

  20. 10 CFR 1042.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials... on the Basis of Sex in Education Programs or Activities Prohibited § 1042.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...

  1. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  2. Privacy and Anonymity

    OpenAIRE

    Wacks, R

    2014-01-01

    Since the beginning of the digital area, privacy and anonymity have been impacted drastically (both, positively and negatively), by the different technologies developed for communications purposes. The broad possibilities that the Internet offers since its conception, makes it a mandatory target for those entities that are aiming to know and control the different channels of communication and the information that flows through. In this paper, we address the current threats against privacy and...

  3. Mediated Traceable Anonymous Encryption

    OpenAIRE

    Izabachène, Malika; Pointcheval, David; Vergnaud, Damien

    2010-01-01

    The notion of key privacy for asymmetric encryption schemes was formally defined by Bellare, Boldyreva, Desai and Pointcheval in 2001: it states that an eavesdropper in possession of a ciphertext is not able to tell which specifi key, out of a set of known public keys, is the one under which the ciphertext was created. Since anonymity can be misused by dishonest users, some situations could require a tracing authority capable of revoking key privacy when illegal behavior is detected. Prior wo...

  4. Anonymity in Large Societies

    OpenAIRE

    Andrei Gomberg; Cesar Martinelli; Ricard Torres

    2002-01-01

    In a social choice model with an infinite number of agents, there may occur "equal size" coalitions that a preference aggregation rule should treat in the same manner. We introduce an axiom of equal treatment with respect to a measure of coalition size and explore its interaction with common axioms of social choice. We show that, provided the measure space is sufficiently rich in coalitions of the same measure, the new axiom is the natural extension of the concept of anonymity, and in particu...

  5. Vanished Twins and Misdiagnosed Sex: A Case Report with Implications in Prenatal Counseling Using Noninvasive Cell-Free DNA Screening.

    Science.gov (United States)

    Kelley, James F; Henning, George; Ambrose, Anthony; Adelman, Alan

    2016-01-01

    Cell-free DNA testing is a recently introduced method for screening pregnant women for fetal trisomy, which is associated with some common significant genetic diseases, as well as the sex of the fetus. The case described here demonstrates the connection between the ultrasound "vanishing twin" phenomenon and the misdiagnosis of prenatal sex using cell-free DNA testing. PMID:27170800

  6. Anonymous Publish-Subscribe Overlays

    OpenAIRE

    Daubert, Jörg

    2016-01-01

    Freedom of speech is a core value of our society. While it can be exercised anonymously towards undesired observers in the physical world, the Internet is based on unique and nonanonymous identifiers (IDs) for every participant. Anonymity, however, is a crucial requirement to exercise freedom of speech using the Internet without having to face political persecution. To achieve anonymity, messages must be unlinkable to senders an receivers. That means that messages cannot be linked to IDs and ...

  7. Unintended Effects of Anonymous Resumes

    OpenAIRE

    Behaghel, Luc; Crépon, Bruno; Le Barbanchon, Thomas

    2014-01-01

    We evaluate an experimental program in which the French public employment service anonymized resumes for firms that were hiring. Firms were free to participate or not; participating firms were then randomly assigned to receive either anonymous resumes or name-bearing ones. We find that participating firms become less likely to interview and hire minority candidates when receiving anonymous resumes. We show how these unexpected results can be explained by the self-selection of firms into the p...

  8. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  9. A pilot trial of integrated behavioral activation and sexual risk reduction counseling for HIV-uninfected men who have sex with men abusing crystal methamphetamine.

    Science.gov (United States)

    Mimiaga, Matthew J; Reisner, Sari L; Pantalone, David W; O'Cleirigh, Conall; Mayer, Kenneth H; Safren, Steven A

    2012-11-01

    Crystal methamphetamine use is a major driver behind high-risk sexual behavior among men who have sex with men (MSM). Prior work suggests a cycle of continued crystal methamphetamine use and high-risk sex due to loss of the ability to enjoy other activities, which appears to be a side effect of this drug. Behavioral activation (BA) is a treatment for depression that involves learning to reengage in life's activities. We evaluated a novel intervention for crystal methamphetamine abuse and high-risk sex in MSM, incorporating 10 sessions of BA with integrated HIV risk reduction counseling (RR). Forty-four subjects were screened, of whom 21 met initial entry criteria. A total of 19 participants enrolled; 16 completed an open-phase study of the intervention. Behavioral assessments were conducted at baseline, 3 months postbaseline, and 6 months postbaseline. Linear mixed effects regression models were fit to assess change over time. Mean unprotected anal intercourse (UAI) episodes decreased significantly from baseline to acute postintervention (β=-4.86; 95% confidence interval [CI]=-7.48, -2.24; p=0.0015) and from baseline to 6 months postbaseline (β=-5.07; 95% CI=-7.85, -2.29; p=0.0017; test of fixed effects χ(2)=16.59; df=2,13; p=0.0002). On average, there was a significant decrease over time in the number of crystal methamphetamine episodes in the past 3 months (χ(2)=22.43; df=2,15; p<0.0001), and the number of days of crystal methamphetamine use in the past 30 days (χ(2)=9.21; df=2,15; p=0.010). Statistically significant reductions in depressive symptoms and poly-substance use were also maintained. Adding behavioral activation to risk reduction counseling for MSM with problematic crystal methamphetamine use may augment the potency of a risk reduction intervention for this population. Due to the small sample size and time intensive intervention, future testing in a randomized design is necessary to determine efficacy, with subsequent effectiveness testing. PMID

  10. Efficient Anonymizations with Enhanced Utility

    Directory of Open Access Journals (Sweden)

    Jacob Goldberger

    2010-08-01

    Full Text Available One of the most well studied models of privacy preservation is k-anonymity. Previous studies of k-anonymization used various utility measures that aim at enhancing the correlation between the original public data and the generalized public data. We, bearing in mind that a primary goal in releasing the anonymized database for datamining is to deducemethods of predicting the private data from the public data, propose a new information-theoretic measure that aims at enhancing the correlation between the generalized public data and the private data. Such a measure significantly enhances the utility of the released anonymized database for data mining. We then proceed to describe a new algorithm that is designed to achieve k-anonymity with high utility, independently of the underlying utility measure. That algorithm is based on a modified version of sequential clustering which is the method of choice in clustering. Experimental comparison with four well known algorithms of k-anonymity show that the sequential clustering algorithm is an efficient algorithm that achieves the best utility results. We also describe a modification of the algorithm that outputs k-anonymizations which respect the additional security measure of l-diversity.

  11. Narcotics Anonymous: Anonymity, admiration, and prestige in an egalitarian community

    OpenAIRE

    Snyder, Jeffrey K.; Fessler, Daniel M.T.

    2014-01-01

    Narcotics Anonymous (NA) supports long-term recovery for those addicted to drugs. Paralleling social dynamics in many small-scale societies, NA exhibits tension between egalitarianism and prestige-based hierarchy, a problem exacerbated by the addict’s personality as characterized by NA’s ethnopsychology.  We explore how NA’s central principle of anonymity normatively translates into egalitarianism among group members.  Turning to the lived reality of membership, building on Carr’s (2011) conc...

  12. Anonymous Transactions in Computer Networks

    Science.gov (United States)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  13. HIV prevention among female sex workers in Africa.

    Science.gov (United States)

    Scheibe, A; Drame, F M; Shannon, K

    2012-01-01

    Sex work occurs to meet the demand for sexual services and is a universal phenomenon. In Africa sex work takes many forms and is an important source of income for many women. Yet sex worker reproductive health needs remain largely unmet. The criminalisation of sex work; community and service provider stigma; violence; substance use and limited access to health services and prevention commodities contribute to the high HIV burden evident among female sex workers in Africa. Following UNAIDS' three pillar approach to HIV prevention and sex work we present an overview of current opportunities, barriers and suggestions to improve HIV prevention policy and programming for sex work in Africa. Universal access to a comprehensive package of HIV services is the first pillar. Reproductive health commodities; voluntary and anonymous HIV counselling and testing; treatment of sexually transmitted infections, HIV and opportunistic infections; harm reduction for substance use and psychosocial support services make up the recommended package of services. The second pillar is a sex worker-supportive environment. The inclusion of sex worker programmes within national HIV strategic planning; sex worker-led community mobilisation and the establishment of sex work community networks (comprised of sex workers, health service providers, law enforcers and other stakeholders) enable effective programme implementation and are recommended. The reduction of sex worker vulnerability and addressing structural issues form the final pillar. The decriminalisation of sex work; development of supportive policy; gender equality and economic development are key factors that need to be addressed to increase sex worker resilience. Evidence supports the public health benefit of human rights based approaches to HIV prevention; moralistic and restrictive policy and laws towards sex work are harmful and should be removed. The establishment of these pillars will increase sex worker safety and enhance the

  14. Anonymity-Proof Voting Rules

    OpenAIRE

    Conitzer, Vincent

    2007-01-01

    A (randomized, anonymous) voting rule maps any multiset of total orders of (aka. votes over) a fixed set of alternatives to a probability distribution over these alternatives. A voting rule f is neutral if it treats all alternatives symmetrically. It satisfies participation if no voter ever benefits from not casting her vote. It is falsename-proof if no voter ever benefits from casting additional (potentially different) votes. It is anonymity-proof if it satisfies participation and it i...

  15. Technology for Anonymity: Names By Other Nyms.

    Science.gov (United States)

    Wayner, Peter

    1999-01-01

    Provides a summary of some of the technical solutions for producing anonymous communication on the Internet and presents an argument that anonymity is as much a part of crime prevention as requiring people to provide their names. Discusses identity theft; the three major techniques that make anonymous cash possible; and anonymizing Internet…

  16. Piloting a Social Networks Strategy to Increase HIV Testing and Counseling Among Men Who Have Sex with Men in Greater Accra and Ashanti Region, Ghana.

    Science.gov (United States)

    Girault, Philippe; Green, Kimberly; Clement, Nana Fosua; Rahman, Yussif Ahmed Abdul; Adams, Bashiru; Wambugu, Samuel

    2015-11-01

    The 2011 Ghana Men's Study identified a high prevalence of HIV among men who have sex with men (MSM) in Accra/Tema (34.4 %) and in Kumasi (13.6 %), whereas the HIV rate among MSM referred through peer educators (PEs) to HIV testing and counseling (HTC) services in these two sites was substantially lower (8.4 %). These findings raised questions about possible limitations of the peer-education strategy to reach high-risk MSM. Therefore, a pilot study was conducted to assess the feasibility of using a social network strategy (SNS) to identify and refer MSM to HTC services. Within 3 months, 166 MSM were reached and referred to HTC services: 62.7 % reported no recent exposure to PEs; 61.5 % were unaware of their recent HIV serostatus; and 32.9 % were newly diagnosed HIV positive. This pilot study suggests that an SNS could be an important strategy to reach MSM and to increase the uptake of HTC. PMID:25903507

  17. Anonymity and Historical-Anonymity in Location-Based Services

    Science.gov (United States)

    Bettini, Claudio; Mascetti, Sergio; Wang, X. Sean; Freni, Dario; Jajodia, Sushil

    The problem of protecting user’s privacy in Location-Based Services (LBS) has been extensively studied recently and several defense techniques have been proposed. In this contribution, we first present a categorization of privacy attacks and related defenses. Then, we consider the class of defense techniques that aim at providing privacy through anonymity and in particular algorithms achieving “historical k- anonymity” in the case of the adversary obtaining a trace of requests recognized as being issued by the same (anonymous) user. Finally, we investigate the issues involved in the experimental evaluation of anonymity based defense techniques; we show that user movement simulations based on mostly random movements can lead to overestimate the privacy protection in some cases and to overprotective techniques in other cases. The above results are obtained by comparison to a more realistic simulation with an agent-based simulator, considering a specific deployment scenario.

  18. Teaching a Human Sexuality Course: What Are Counseling Students Thinking?

    Science.gov (United States)

    Diambra, Joel F.; Pollard, Brittany L.; Gamble, R. M.; Banks, Breanna P.

    2016-01-01

    The pervasiveness of sexual issues in counseling suggests the necessity of educating counseling students about relevant topics. Students enrolled in a human sexuality course anonymously submitted topical questions and secrets/fantasies. Following a content analysis, findings depicted themes of content and tone that provided curricular implications…

  19. The future of sex counseling: The art and science of nurturing the clouds and rain%性咨询的未来:孕育云雨的艺术和科学

    Institute of Scientific and Technical Information of China (English)

    MALAN Mark Kim; 乔玉玲

    2013-01-01

    Various methods of sex counseling have existed in many cultures since antiquity.In modern times,evidence based scientific methods of sex counseling continue to be developed.There is a broad range of methods from limited to comprehensive diagnosis and treatment.The biological,psychological,social model is generally accepted as the modern standard of care.Sexologists offering comprehensive care must have a multi-disciplinary education in order to co-ordinate the multi-disciplinary treatment patients may require.Sex counseling must be patient focused and is both an art and a science.Technology offers opportunities for sex counseling via internet and by utilizing media resources.Future sex counseling must address the special social conditions of many diverse world cultures to build sexual harmony in couples.Sexually joyful individuals make healthier families and stronger nations.%自古以来在不同文化中就存在各种性咨询的方式.而在现代,性咨询的循证科学持续发展,出现了大量的专项或综合的诊疗方式.由于现代医疗实施了生物心理社会模式,性学家们在提供综合治疗时必须具有多学科的知识以满足病人多方面的治疗需求.性咨询必须以病人为中心,做到科学和艺术的结合.技术进步使得通过互联网和多媒体开展性咨询成为可能.未来的性咨询必须满足不同国家和文化的特定社会状况,以促进伴侣间的性和谐,构建健康的家庭和强大的国家.

  20. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  1. Genetic Counseling

    Science.gov (United States)

    Genetic counseling provides information and support to people who have, or may be at risk for, genetic disorders. A ... meets with you to discuss genetic risks. The counseling may be for yourself or a family member. ...

  2. Attitudes Toward HIV Voluntary Counseling and Testing (VCT) Among African American Men Who Have Sex With Men: Concerns Underlying Reluctance to Test.

    Science.gov (United States)

    St Lawrence, Janet S; Kelly, Jeffrey A; Dickson-Gomez, Julia; Owczarzak, Jill; Amirkhanian, Yuri A; Sitzler, Cheryl

    2015-06-01

    Contemporary antiretroviral therapy (ART) can produce viral suppression of HIV, maintain health, and prevent onward HIV transmission from infected persons to their sexual partners, giving rise to the concept of treatment as prevention. Successful implementation of test-and-treat strategies rests on the early detection of HIV infection through voluntary counseling and testing (VCT) followed by entry and retention in care, ART initiation and adherence, and subsequent viral suppression. In the United States, African American men who have sex with men (MSM) bear a disproportionate burden of HIV and have high rates of undetected and untreated HIV infection. However, little research has examined racial minority MSM's views about HIV testing. In this study, in-depth interviews were conducted with 96 key informants knowledgeable about racial minority MSM as well as 100 African American MSM community members in Milwaukee, Cleveland, and Miami. Most men in the sample were aware of the availability of testing and knew testing locations, but many voiced great personal ambivalence about being tested, feared knowing their HIV status, expressed concern about stigma and loss of confidentiality, and held beliefs indicative of medical mistrust. Participants did not spontaneously cite benefits of being tested, risk reduction behavior changes made as a consequence of testing, nor the benefits of testing to get early medical care for HIV infection. There is a gap between the public health field's perception of testing benefits and the beliefs about testing held by racial minority MSM in this sample. To increase the desired outcomes from VCT for minority MSM, VCT promotion should address the concerns of African American MSM and underscore the benefits of early entry into medical care. PMID:26010312

  3. Internet-facilitated, voluntary counseling and testing (VCT clinic-based HIV testing among men who have sex with men in China.

    Directory of Open Access Journals (Sweden)

    Huachun Zou

    Full Text Available OBJECTIVE: To explore the feasibility of using Internet outreach to encourage men who have sex with men (MSM to get tested for HIV at voluntary counseling and testing (VCT clinics in Beijing and Urumqi, China. METHODS: From June to August 2007, two volunteers contacted MSM using instant messaging, online chat rooms, mobile phone, and e-mail (active recruitment. Banners with study information were put at the front pages of three major Chinese gay websites (passive recruitment. Those contacted were offered a modest financial incentive to seek HIV testing at existing VCT clinics. Those who subsequently sought HIV testing services at VCT clinics and provided informed consent completed a questionnaire and a blood draw to test for HIV and syphilis. RESULTS: A total of 3,332 MSM were contacted and 429 attended VCT clinics. One out of every 4 men that were recruited through instant messaging actually went for HIV testing, while the recruitment yields for online gay chat rooms, mobile phone contact, and email were 1∶6, 1∶10, and 1∶140, respectively. The majority of participants (80%, 317/399 reported being motivated to seek HIV testing out of concern for their health, and only 3% (11/399 reported being motivated by the financial incentive. Active recruitment tend to recruit MSM who are younger (X(2 = 11.400, P = 0.001, never tested for HIV (X(2 = 4.281, P = 0.039, tested less often (X(2 = 5.638, P = 0.018. CONCLUSION: Internet outreach is a promising way to encourage MSM to seek HIV testing at existing VCT clinics. Active recruitment can target MSM who are younger, never tested for HIV and tested less often.

  4. 43 CFR 41.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling materials. 41.425 Section 41.425 Public Lands: Interior Office of the Secretary of the Interior... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 41.425 Counseling and use...

  5. 28 CFR 54.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 54.425 Section 54.425 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 54.425 Counseling and use...

  6. 44 CFR 19.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling materials. 19.425 Section 19.425 Emergency Management and Assistance FEDERAL... Basis of Sex in Education Programs or Activities Prohibited § 19.425 Counseling and use of appraisal...

  7. 41 CFR 101-4.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Counseling and use of appraisal and counseling materials. 101-4.425 Section 101-4.425 Public Contracts and Property Management... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 101-4.425 Counseling and...

  8. 40 CFR 5.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 5.425 Section 5.425 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 5.425 Counseling and use...

  9. 15 CFR 8a.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials. 8a.425 Section 8a.425 Commerce and Foreign Trade Office of the Secretary of Commerce... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 8a.425 Counseling and use...

  10. Anonymous Client Authentication for Transport Layer Security

    OpenAIRE

    Dietrich, Kurt

    2010-01-01

    Nowadays, anonymity and privacy protecting mechanisms are becoming more and more important. The anonymity of platforms and the privacy of users operating in the Internet are major concerns of current research activities. Although different techniques for protecting anonymity exist, standard protocols like Transport Layer Security are still missing adequate support for these technologies. In this paper, we analyze how Trusted Computing technologies and anonymous credential systems can be used ...

  11. [Name Withheld]: Anonymity and Its Implications

    OpenAIRE

    Weicher, Maureen

    2006-01-01

    Anonymity allows the individual to have a voice without having a name. Since the word “anonymous” entered the English language with the advent of the printing press, the implications of being anonymous - and its lexical offspring “anonymity” - have shifted with time, place, and circumstance. What are the perceived effects of being anonymous/anonymity on the individual and on society? In this paper, I will explore some of the shifting meanings and implications of this concept, first as i...

  12. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  13. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  14. HIV Risk Perception, Sexual Behavior, and HIV Prevalence among Men-Who-Have-Sex-with-Men at a Community-Based Voluntary Counseling and Testing Center in Kuala Lumpur, Malaysia

    OpenAIRE

    Kwee Choy Koh; Lit Sin Yong

    2014-01-01

    We describe the HIV risk perception, sexual behavior, and HIV prevalence among 423 men-who-have-sex-with-men (MSM) clients who received voluntary counseling and testing (VCT) services at a community-based center in Kuala Lumpur, Malaysia. The mean age was 29 years old. One hundred one (23.9%) clients rated themselves as low risk, 118 (27.9%) as medium risk, 36 (8.5%) as high risk, and 168 (39.7%) were unsure of their risk. Twenty-four (9.4%) clients tested HIV positive (4 (4%) low risk, 9 (7....

  15. The cost-effectiveness in the use of HIV counselling and testing-mobile outreaches in reaching men who have sex with men (MSM in northern Nigeria

    Directory of Open Access Journals (Sweden)

    Chiedu Ifekandu

    2014-11-01

    Full Text Available Introduction: Men who have sex with men (MSM are at increased risk of HIV and other STI infections in Nigeria. This is because MSM are afraid to seek medical help because the healthcare workers in various facilities are afraid of the consequences if they provide services for MSM citing the law as a reason not to intervene. MSM in northern states of Nigeria are facing double-jeopardy because the few international partners working in MSM in Nigeria are pulling out of these volatile areas because of the fear of attacks by the Boko Haram and the Nigerian law enforcement agencies. Objectives: The intervention was conducted to promote affordable and sustainable HIV care and treatment for MSM in Nigeria. Methods: This intervention was conducted in the Boko Haram ravaged cities of Kano and Maiduguri (North-East Nigeria. Twenty MSM-key influencers from the two cities were identified and trained on HIV counselling and testing, caregivers, case managers and on initiation process for ARV treatment for new HIV+MSM as well as ethical considerations. Results: The mean age of the key influencers was 24 years +/−SD. Each of the trained 20 key influencers reached 20 MSM-peer with condom promotion, HCT, referral to identified MSM-community health centers and follow-up/caregiving within the space of one month. The project was able to reach 400 MSM in the two cities. 89% of the peers consented to HCT. HIV prevalence among the participants was at 18%. The project recorded ARV-successful referral to healthcare facilities for the respondents that tested positive. The key influencers have been following up for ARV-adherence. Conclusions: Use of community members should be promoted for sustainability and ownership. It also helps in eradicating socio-cultural barrier to HIV intervention for MSM. Moreover, this proves to be one of the safest and affordable methods of reaching MSM in Nigeria in this ugly time of legalization of homophobia in the country's constitution.

  16. HIV Risk Perception, Sexual Behavior, and HIV Prevalence among Men-Who-Have-Sex-with-Men at a Community-Based Voluntary Counseling and Testing Center in Kuala Lumpur, Malaysia

    Directory of Open Access Journals (Sweden)

    Kwee Choy Koh

    2014-01-01

    Full Text Available We describe the HIV risk perception, sexual behavior, and HIV prevalence among 423 men-who-have-sex-with-men (MSM clients who received voluntary counseling and testing (VCT services at a community-based center in Kuala Lumpur, Malaysia. The mean age was 29 years old. One hundred one (23.9% clients rated themselves as low risk, 118 (27.9% as medium risk, 36 (8.5% as high risk, and 168 (39.7% were unsure of their risk. Twenty-four (9.4% clients tested HIV positive (4 (4% low risk, 9 (7.6% medium risk, 11 (30.6% high risk, and 13 (7.7% unsure risk. We found a positive correlation between risk perception and HIV infection in this study. Clients with high HIV risk perception have 17x the odds of testing HIV positive compared to low risk clients. High HIV risk perception was significantly associated with multiple sex partners, multiple types of sex partners, alcohol use before intercourse, unprotected sex beyond 6 months, and inconsistent condom use during anal sex compared to low risk clients. There were no statistically significant differences between medium risk and unsure risk clients compared to low risk clients. Strategies should be targeted towards change in sexual practices among those who are perceived to be at high risk.

  17. HIV Risk Perception, Sexual Behavior, and HIV Prevalence among Men-Who-Have-Sex-with-Men at a Community-Based Voluntary Counseling and Testing Center in Kuala Lumpur, Malaysia.

    Science.gov (United States)

    Koh, Kwee Choy; Yong, Lit Sin

    2014-01-01

    We describe the HIV risk perception, sexual behavior, and HIV prevalence among 423 men-who-have-sex-with-men (MSM) clients who received voluntary counseling and testing (VCT) services at a community-based center in Kuala Lumpur, Malaysia. The mean age was 29 years old. One hundred one (23.9%) clients rated themselves as low risk, 118 (27.9%) as medium risk, 36 (8.5%) as high risk, and 168 (39.7%) were unsure of their risk. Twenty-four (9.4%) clients tested HIV positive (4 (4%) low risk, 9 (7.6%) medium risk, 11 (30.6%) high risk, and 13 (7.7%) unsure risk). We found a positive correlation between risk perception and HIV infection in this study. Clients with high HIV risk perception have 17x the odds of testing HIV positive compared to low risk clients. High HIV risk perception was significantly associated with multiple sex partners, multiple types of sex partners, alcohol use before intercourse, unprotected sex beyond 6 months, and inconsistent condom use during anal sex compared to low risk clients. There were no statistically significant differences between medium risk and unsure risk clients compared to low risk clients. Strategies should be targeted towards change in sexual practices among those who are perceived to be at high risk. PMID:25053941

  18. Different ways of providing anonymity

    OpenAIRE

    Glavač, Vesna

    2012-01-01

    The aim of this thesis is to show the importance of security and anonymity on the internet by demonstrating the use of a SOCKS proxy. In theoretical part, properties of various security mechanisms are explored with focus on SOCKS protocol as one of the most widely used systems. Presented are the inner workings and different versions as well as advantages and drawbacks of the protocol. The paper tries to identify the simplest way of encrypting data traffic by using SOCKS protocol with SSH tunn...

  19. An Anonymous Credit Card System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  20. Security Analysis of Accountable Anonymity in Dissent

    OpenAIRE

    Syta, Ewa; Johnson, Aaron; Corrigan-Gibbs, Henry; Weng, Shu-Chun; Wolinsky, David; Ford, Bryan

    2014-01-01

    Users often wish to communicate anonymously on the Internet, for example in group discussion or instant messaging forums. Existing solutions are vulnerable to misbehaving users, however, who may abuse their anonymity to disrupt communication. Dining Cryptographers Networks (DC-nets) leave groups vulnerable to denial-of-service and Sybil attacks, mix networks are difficult to protect against traffic analysis, and accountable voting schemes are unsuited to general anonymous messaging. DISSENT ...

  1. Internet and the right of anonymity

    OpenAIRE

    Voorhoof, Dirk

    2011-01-01

    This articles explores the ratio and characteristics of the right of anonymity on the Internet. A right of anonymity is considered as a shield against oppression, harassment, retaliation, censorship or discrimination and therefore it is considered as a vital component of freedom of speech or freedom of expression. Reference is made to several existing types of rights of anonymity in relation to freedom of expression, such as the right to protect (confidential) journalistic sources, free elec...

  2. Privacy-Preserving Updates to Anonymous Databases

    OpenAIRE

    Sivasubramanian, R.; K.P. KALIYAMURTHIE

    2013-01-01

    Suppose a medical facility connected with a research institution and the researchers can use themedical details of a patient without knowing the personal details. Thus the research data base used by theresearchers must be anonymized (Sanitized). We can consider another problem in the area of census.Individuals give the private information to a trusted party (Census Bureau) and the census bureau mustpublish anonymized or sanitized version of data. So anonymization is done for privacy. Our work...

  3. Comparison of the Personality Profiles of Inmate Anonymous and Non-Anonymous Male Addicts

    Directory of Open Access Journals (Sweden)

    Nasrolah Erfani

    2013-05-01

    Full Text Available Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size was determined by Cochran formula.The short-form NEO Five Factor personality questionnaire administered among selected sample. Data analyzed by descriptive statistic as frequency and percentage, also, inferential statistic as multivariate analysis of variance was run. Results: The results showed that personality profiles of anonymous and non-anonymous addicts were significantly different. That is, mean score of neuroticism in anonymous addicts was less than non anonymous. Also, mean score of extraversion was higher in anonymous addicts. Conclusion: It can be concluded that the anonymous male addicts are differ with non-anonymous male addicts in personality traits.

  4. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  5. Anonymous Web Browsing and Hosting

    Directory of Open Access Journals (Sweden)

    MANOJ KUMAR

    2013-02-01

    Full Text Available In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that how we can choose safe web hosting solutions and what the main functions are which provides more security over server data. With the browser security network security is also important which can be implemented using cryptography solutions, VPN and by implementing firewalls on the network. Hackers always try to steal our identity and data, they track our activities using the network application software’s and do harmful activities. So in this paper we described that how we can monitor them from security purposes.

  6. Evaluation of Anonymized ONS Queries

    CERN Document Server

    Garcia-Alfaro, Joaquin; Kranakis, Evangelos

    2009-01-01

    Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications). This infrastructure relies on the use of the (1) Radio Frequency Identification (RFID) technology to tag objects in motion and (2) distributed services providing information about objects via the Internet. A lookup service, called the Object Name Service (ONS) and based on the use of the Domain Name System (DNS), can be publicly accessed by EPC applications looking for information associated with tagged objects. Privacy issues may affect corporate infrastructures based on EPC technologies if their lookup service is not properly protected. A possible solution to mitigate these issues is the use of online anonymity. We present an evaluation experiment that compares the of use of Tor (The second generation Onion Router) on a global ONS/DNS setup, with respect to benefits, limitations, and latency.

  7. Distributed anonymous discrete function computation

    CERN Document Server

    Hendrickx, Julien M; Tsitsiklis, John N

    2010-01-01

    We propose a model for deterministic distributed function computation by a network of identical and anonymous nodes. In this model, each node has bounded computation and storage capabilities that do not grow with the network size. Furthermore, each node only knows its neighbors, not the entire graph. Our goal is to characterize the class of functions that can be computed within this model. In our main result, we provide a necessary condition for computability which we show to be nearly sufficient, in the sense that every function that violates this condition can at least be approximated. The problem of computing suitably rounded averages in a distributed manner plays a central role in our development; we provide an algorithm that solves it in time that grows quadratically with the size of the network.

  8. [Encryption technique for linkable anonymizing].

    Science.gov (United States)

    Okamoto, Etsuji

    2004-06-01

    Linkage of different records such as health insurance claims or medical records for the purpose of cohort studies or cancer registration usually requires matching with personal names and other personally identifiable data. The present study was conducted to examine the possibility of performing such privacy-sensitive procedures in a "linkable anonymizing" manner using encryption. While bidirectional communication entails encryption and deciphering, necessitating both senders and receivers sharing a common secret "key", record linkage entails only encryption and not deciphering because researchers do not need to know the identity of the linked person. This unidirectional nature relieves researchers from the historical problem of "key sharing" and enables data holders such as municipal governments and insurers to encrypt personal names in a relatively easy manner. The author demonstrates an encryption technique using readily available spread-sheet software, Microsoft Excel in a step-by-step fashion. Encoding Chinese characters into the numeric JIS codes and replacing the codes with a randomly assigned case-sensitive alphabet, all names of Japanese nationals will be encrypted into gibberish strings of alphabet, which can not be deciphered without the secret key. Data holders are able to release personal data without sacrificing privacy, even when accidental leakage occurs and researchers are still able to link records of the same name because encrypted texts, although gibberish, are unique to each name. Such a technical assurance of privacy protection is expected to satisfy the Privacy Protection Act or the Ethical Guidelines for Epidemiological Research and enhance public health research. Traditional encryption techniques, however, cannot be applied to cancer or stroke registration, because the registrar receives reports from numerous unspecified senders. The new public key encryption technique will enable disease registry in a linkable anonymizing manner. However

  9. Legal Issues in Anonymity and Pseudonymity.

    Science.gov (United States)

    Froomkin, A. Michael

    1999-01-01

    Regulation of anonymous and pseudonymous communications is an important and contentious Internetrelated issues of the 21st century. Resolution of this controversy will effect freedom of speech, nature of electronic commerce, and capabilities of law enforcement. The legal constraints on anonymous communication, and the constitutional constraints on…

  10. Anonymity in Classroom Voting and Debating

    Science.gov (United States)

    Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie

    2011-01-01

    The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…

  11. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterio

  12. Cross-cultural inter-personal space in assumed counselling relationships with same and opposite sex pairs, and counsellors' perspectives on proxemics

    OpenAIRE

    Rudd, B.

    2000-01-01

    Regardingt he main title of this project,t he term "inter-personal" refers to the inter-active relationship between people, as in: a psychotherapeutic counselling encounter. Deliberations with relatives, friends and colleagues who disclosed that they had been through similar situations as my own concerning inter-personal experiences with regard to proxemics, fired my aspiration to bring into relief the thread of proximity when relating inter-personally. It also fuelled my wondering about whic...

  13. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    Science.gov (United States)

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  14. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    Directory of Open Access Journals (Sweden)

    Sills Eric

    2010-08-01

    Full Text Available Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF and embryo transfer (ET where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  15. Gender and Generosity: Does Degree of Anonymity or Group Gender Composition Matter?

    OpenAIRE

    C. Bram Cadsby; Maroš Servátka; Fei Song

    2009-01-01

    Employing a two-by-two factorial design that manipulates whether dictator groups are single or mixed-sex and whether procedures are single or double-blind, we examine gender effects in a standard dictator game. No gender effects were found in any of the experimental treatments. Moreover, neither single- versus mixed-sex groups nor level of anonymity had any impact on either male or female behavior.

  16. A Pilot Trial of Integrated Behavioral Activation and Sexual Risk Reduction Counseling for HIV-Uninfected Men Who Have Sex with Men Abusing Crystal Methamphetamine

    OpenAIRE

    Mimiaga, Matthew J.; Reisner, Sari L.; Pantalone, David W.; O'Cleirigh, Conall; Mayer, Kenneth H.; Safren, Steven A.

    2012-01-01

    Crystal methamphetamine use is a major driver behind high-risk sexual behavior among men who have sex with men (MSM). Prior work suggests a cycle of continued crystal methamphetamine use and high-risk sex due to loss of the ability to enjoy other activities, which appears to be a side effect of this drug. Behavioral activation (BA) is a treatment for depression that involves learning to reengage in life's activities. We evaluated a novel intervention for crystal methamphetamine abuse and high...

  17. A flexible approach to distributed data anonymization.

    Science.gov (United States)

    Kohlmayer, Florian; Prasser, Fabian; Eckert, Claudia; Kuhn, Klaus A

    2014-08-01

    Sensitive biomedical data is often collected from distributed sources, involving different information systems and different organizational units. Local autonomy and legal reasons lead to the need of privacy preserving integration concepts. In this article, we focus on anonymization, which plays an important role for the re-use of clinical data and for the sharing of research data. We present a flexible solution for anonymizing distributed data in the semi-honest model. Prior to the anonymization procedure, an encrypted global view of the dataset is constructed by means of a secure multi-party computing (SMC) protocol. This global representation can then be anonymized. Our approach is not limited to specific anonymization algorithms but provides pre- and postprocessing for a broad spectrum of algorithms and many privacy criteria. We present an extensive analytical and experimental evaluation and discuss which types of methods and criteria are supported. Our prototype demonstrates the approach by implementing k-anonymity, ℓ-diversity, t-closeness and δ-presence with a globally optimal de-identification method in horizontally and vertically distributed setups. The experiments show that our method provides highly competitive performance and offers a practical and flexible solution for anonymizing distributed biomedical datasets. PMID:24333850

  18. Preserving Communities in Anonymized Social Networks

    Directory of Open Access Journals (Sweden)

    Alina Campan

    2015-04-01

    Full Text Available Social media and social networks are embedded in our society to a point that could not have been imagined only ten years ago. Facebook, LinkedIn, and Twitter are already well known social networks that have a large audience in all age groups. The amount of data that those social sites gather from their users is continually increasing and this data is very valuable for marketing, research, and various other purposes. At the same time, this data usually contain a significant amount of sensitive information which should be protected against unauthorized disclosure. To protect the privacy of individuals, this data must be anonymized such that the risk of re-identification of specific individuals is very low. In this paper we study if anonymized social networks preserve existing communities from the original social networks. To perform this study, we introduce two approaches to measure the community preservation between the initial network and its anonymized version. In the first approach we simply count how many nodes from the original communities remained in the same community after the processes of anonymization and de-anonymization. In the second approach we consider the community preservation for each node individually. Specifically, for each node, we compare the original and final communities to which the node belongs. To anonymize social networks we use two models, namely, k-anonymity for social networks and k-degree anonymity. To determine communities in social networks we use an existing community detection algorithm based on modularity quality function. Our experiments on publically available datasets show that anonymized social networks satisfactorily preserve the community structure of their original networks.

  19. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  20. Providing Group Anonymity Using Wavelet Transform

    CERN Document Server

    Chertov, Oleg

    2010-01-01

    Providing public access to unprotected digital data can pose a threat of unwanted disclosing the restricted information. The problem of protecting such information can be divided into two main subclasses, namely, individual and group data anonymity. By group anonymity we define protecting important data patterns, distributions, and collective features which cannot be determined through analyzing individual records only. An effective and comparatively simple way of solving group anonymity problem is doubtlessly applying wavelet transform. It's easy-to-implement, powerful enough, and might produce acceptable results if used properly. In the paper, we present a novel method of using wavelet transform for providing group anonymity; it is gained through redistributing wavelet approximation values, along with simultaneous fixing data mean value and leaving wavelet details unchanged (or proportionally altering them). Moreover, we provide a comprehensive example to illustrate the method.

  1. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina;

    2013-01-01

    A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as does multi-casting one message to a receiver population containing the intended receiver...... resource (e.g. a confidential anonymous channel) from given real resources (e.g. a broadcast channel). We define appropriate anonymous communication resources and show that a very natural resource can be constructed by using a PKE scheme which fulfills three properties that appear in cryptographic...... applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate for the...

  2. Genetic Counseling

    Science.gov (United States)

    ... go for genetic counseling, such as: A family history of a genetic condition To learn about genetic screening for diseases that are more common in certain ethnic groups (e.g., sickle cell disease in African Americans and Tay-Sachs disease in Ashkenazi Jews) To discuss abnormal results ...

  3. Anonymity And Accountability In Web Based Transactions

    OpenAIRE

    H.Jayasree; .Damodaram

    2012-01-01

    Decreased privacy is an unavoidable consequence in the drive to make the world a more secure, safer place, according to some analysts. In the on-line world, the conflict between privacy and security manifests itself in a debate between anonymity and accountability. Balance between Anonymity and Accountability is a major concern in web based transactions. The protection of users’ privacy when performing web-based transactions is an important factor in the acceptance and use of Internet and we...

  4. Seeking Anonymity in an Internet Panopticon

    OpenAIRE

    Feigenbaum, Joan; Ford, Bryan

    2013-01-01

    Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the Internet. Unfortunately, OR is known to be vulnerable at least in principle to several classes of attacks for which no solution is known or believed to be forthcoming soon. Current approaches to anonymity also appear unable to offer accurate, princi...

  5. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis

    2015-01-01

    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  6. Security and Anonymity of Bitcoin Payments

    OpenAIRE

    Korošec, Peter

    2016-01-01

    This thesis presents the digital payment system Bitcoin. It describes the cryptography on which the system is based. Presented are the short history of the system and the principles of how it works. Highlighted are the state of anonymity that the system provides while making payments and the safety it guarantees while executing transactions. Within the context of anonymity, the state of masking the users identity within the payment system is described, together with warnings and mechanisms to...

  7. Anon-Pass: Practical Anonymous Subscriptions.

    Science.gov (United States)

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user. PMID:24504081

  8. On-Line Anonymity: A New Privacy Battle in Cyberspace.

    Science.gov (United States)

    Lee, Laurie Thomas

    1996-01-01

    States that lawsuits are being filed that challenge anonymity and freedom of speech in cyberspace--is there a right to online anonymity? Examines the debate and issues associated with anonymous communications in cyberspace. Explores the "right of informational privacy" as it pertains to anonymity. Suggests some regulatory approaches for addressing…

  9. How Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) Work: Cross-Disciplinary Perspectives

    OpenAIRE

    Krentzman, Amy R.; Robinson, Elizabeth A. R.; Moore, Barbara C.; Kelly, John F.; Laudet, Alexandre B.; White, William L.; Zemore, Sarah E.; Kurtz, Ernest; Strobbe, Stephen

    2010-01-01

    Evidence from multiple lines of research supports the effectiveness and practical importance of Alcoholics Anonymous and Narcotics Anonymous. Conference presenters discussed the relationship between 12-Step participation and abstinence among various populations, including adolescents, women, and urban drug users. Insight from the arts and humanities placed empirical findings in a holistic context.

  10. How Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) Work: Cross-Disciplinary Perspectives.

    Science.gov (United States)

    Krentzman, Amy R; Robinson, Elizabeth A R; Moore, Barbara C; Kelly, John F; Laudet, Alexandre B; White, William L; Zemore, Sarah E; Kurtz, Ernest; Strobbe, Stephen

    2010-12-01

    Evidence from multiple lines of research supports the effectiveness and practical importance of Alcoholics Anonymous and Narcotics Anonymous. Conference presenters discussed the relationship between 12-Step participation and abstinence among various populations, including adolescents, women, and urban drug users. Insight from the arts and humanities placed empirical findings in a holistic context. PMID:21785524

  11. A Fast Survey on Methods for Classification Anonymity Requirements

    OpenAIRE

    Kharaji, Morteza Yousefi; Rizi, Fatemeh Salehi

    2015-01-01

    Anonymity has become a significant issue in security field by recent advances in information technology and internet. The main objective of anonymity is hiding and concealing entities privacy inside a system. Many methods and protocols have been proposed with different anonymity services to provide anonymity requirements in various fields until now. Each anonymity method or protocol is developed using particular approach. In this paper, first, accurate and perfect definitions of privacy and a...

  12. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  13. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    OpenAIRE

    Wei Yang; Liusheng Huang; Fang Song

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of...

  14. Anonymous Fingerprinting with Robust QIM Watermarking Techniques

    Directory of Open Access Journals (Sweden)

    R. L. Lagendijk

    2007-12-01

    Full Text Available Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer's identity as a watermark into the content so that the merchant can retrieve the buyer's identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer's identity multiple times, it is essential for the fingerprinting scheme to be anonymous. Kuribayashi and Tanaka, 2005, proposed an anonymous fingerprinting scheme based on a homomorphic additive encryption scheme, which uses basic quantization index modulation (QIM for embedding. In order, for this scheme, to provide sufficient security to the merchant, the buyer must be unable to remove the fingerprint without significantly degrading the purchased digital content. Unfortunately, QIM watermarks can be removed by simple attacks like amplitude scaling. Furthermore, the embedding positions can be retrieved by a single buyer, allowing for a locally targeted attack. In this paper, we use robust watermarking techniques within the anonymous fingerprinting approach proposed by Kuribayashi and Tanaka. We show that the properties of an additive homomorphic cryptosystem allow for creating anonymous fingerprinting schemes based on distortion compensated QIM (DC-QIM and rational dither modulation (RDM, improving the robustness of the embedded fingerprints. We evaluate the performance of the proposed anonymous fingerprinting schemes under additive-noise and amplitude-scaling attacks.

  15. Secure Electronic Cash Scheme with Anonymity Revocation

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2016-01-01

    Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.

  16. Blocking Misbehaving Users in Anonymizing Networks

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2012-01-01

    Internet services can be accessed privately through anonymizing networks like Tor. A set of routers are used to achieve this in order to hide the identity of client from server. The users of such networks often indulge into malicious activities and cause damage to popular web applications. The...... administrators of those web sites do block the IP address from which the request comes. This is not the practical solution as the hackers operate through anonymous networks. Blocking a node based on IP address will cau se misbehaving and genuine users to lost access to the web sites. This is the problem in the...... existing systems and motivation to take up this research work. The proposed system develops a security mechanism that ensures that only the misbehaving users are blackl isted while genuine users and their anonymity are preserved. Even though the misbehaving users are blacklisted, their privacy is still...

  17. Anon-Pass: Practical Anonymous Subscriptions

    OpenAIRE

    Lee, Michael Z.; Dunn, Alan M.; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-01-01

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch. Logins are anonymous in the sen...

  18. Anonymous Fingerprinting Based on Electronic Cash

    Institute of Scientific and Technical Information of China (English)

    CHENXiaofeng; ZHANGFangguo; WANGJilin; WANGYumin

    2003-01-01

    A new anonymous fingerprinting protocol based on the principle of electronic cash is proposed in this paper.Redistributing a data item is equal to doublespending electronic cash.Contrasting with the previous coin-based anonymous fingerprinting protocol,we use the real electronic cash to trace traitors instead of the "coins" which serve only as a cryptographic primitive and have no monetary value,so it is easily understood and the bank does not need key-distribution and registration to prepare the "coina".

  19. Automatic Control of Configuration of Web Anonymization

    Directory of Open Access Journals (Sweden)

    Tomas Sochor

    2013-01-01

    Full Text Available Anonymization of the Internet traffic usually hides details about the request originator from the target server. Such a disguise might be required in some situations, especially in the case of web browsing. Although the web traffic anonymization is not a part of the http specification, it could be achieved using a certain extra tool. Significant deceleration of anonymized traffic compared to normal traffic is inevitable but it can be controlled in some cases as this article suggests. The results presented here focus on measuring the parameters of such deceleration in terms of response time, transmission speed and latency and proposing the way how to control it. This study focuses on TOR primarily because recent studies have concluded that other tools (like I2P and JAP provide worse service. Sets of 14 file locations and 30 web pages have been formed and the latency, response time and transmission speed during the page or file download were measured repeatedly both with TOR active in various configurations and without TOR. The main result presented here comprises several ways how to improve the TOR anonymization efficiency and the proposal for its automatic control. In spite of the fact that efficiency still remains too low compared to normal web traffic for ordinary use, its automatic control could make TOR a useful tool in special cases.

  20. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  1. "Dear Professor: I Hate You"--Anonymous

    Science.gov (United States)

    Bartlett, Thomas

    2009-01-01

    Flip through a stack of anonymous student evaluations of professors and the mild comments, even the compliments, tend to blend together. But often, hidden among them, is a dagger. Then there are the out-and-out insults. Students' comments can be more than simply mean. Sometimes student comments aren't cruel, just weird. In this article, some…

  2. Probabilistic Adaptive Anonymous Authentication in Vehicular Networks

    Institute of Scientific and Technical Information of China (English)

    Yong Xi; Ke-Wei Sha; Wei-Song Shi; Loren Schwiebert; Tao Zhang

    2008-01-01

    Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on designing the media access and physical layer protocols.Privacy issues in vehicular systems have not been well addressed. We argue that privacy is a user-specific concept, and a good privacy protection mechanism should allow users to select the levels of privacy they wish to have. To address this requirement, we propose an adaptive anonymous authentication mechanism that can trade off the anonymity level with computational and communication overheads (resource usage). This mechanism, to our knowledge, is the first effort on adaptive anonymous authentication. The resources used by our protocol are few. A high traffic volume of 2000 vehicles per hour consumes about 60kbps bandwidth, which is less than one percent of the bandwidth of DSRC (Dedicated Short Range Communications). By using adaptive anonymity, the protocol response time can further be improved 2~4 times with lessthan 20% bandwidth overheads.

  3. Anonymity control in electronic check systems

    Institute of Scientific and Technical Information of China (English)

    Ma Chunguang; Yang Yixian; Hu Zhengming

    2005-01-01

    Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single check is used to pay any price that is not more than the face value. The main problem in check systems is to design an efficient refund mechanism that makes refund checks undistinguished from initial checks during payment and deposit. The problem of anonymity control also called fairness is also an important issue in check systems. All check systems yet are unconditional anonymity that opens the door to misuse for crime such as laundering and blackmailing. In this paper, the notion of anonymity revocation is introduced to electronic check system for the first time, and a model of fair electronic check system is proposed. An efficient fair online electronic check system with reusable refund is presented. In the system, a passive trustee is employed to revoke the anonymity of un-honest users. Moreover, the system solves the reusability problem of refunds thanks to the RSA-based partially signature. The system is efficient and meets all basic security requirements.

  4. Counseling Psychology and Professional School Counseling

    Science.gov (United States)

    Pope, Mark

    2004-01-01

    This article provides a historical, political, and organizational analysis regarding counseling psychology's involvement in professional school counseling. Issues discussed include collaboration, curriculum and training, and professional identity, as well as the commonalities that bind counselor education/professional school counseling and…

  5. Factors for Personal Counseling among Counseling Trainees

    Science.gov (United States)

    Byrne, J. Stephen; Shufelt, Brett

    2014-01-01

    The present study explored the use of counseling among counselor trainees and the characteristics of consumers and nonconsumers. Approximately 61% of those surveyed (n = 85) reported that they had received counseling, with the majority being mental health counseling trainees. Nonconsumers (n = 54) indicated that they coped with problems in other…

  6. Research on Anonymization and De-anonymization in the Bitcoin System

    OpenAIRE

    ShenTu, QingChun; Yu, JianPing

    2015-01-01

    The Bitcoin system is an anonymous, decentralized crypto-currency. There are some deanonymizating techniques to cluster Bitcoin addresses and to map them to users' identifications in the two research directions of Analysis of Transaction Chain (ATC) and Analysis of Bitcoin Protocol and Network (ABPN). Nowadays, there are also some anonymization methods such as coin-mixing and transaction remote release (TRR) to cover the relationship between Bitcoin address and the user. This paper studies an...

  7. Anonymous quantum communications using the quantum one-time pad

    International Nuclear Information System (INIS)

    We present the first quantum secure communication protocol for an anonymous receiver without the assistance of anonymous entanglement. In previous works, if a public sender wants to send quantum messages to a chosen receiver while protecting the identity of the receiver from others, all participants should cooperate first to construct the entanglement between the sender and the anonymous receiver. This is the most important process in anonymous quantum communications. With anonymous entanglement, the sender can communicate quantum messages to the anonymous receiver by applying teleportation protocols. In contrast, our protocol is novel and achieves communication of quantum messages directly from the public sender to the anonymous receiver based on the quantum one-time pad and current achievements. Notably, the anonymity of the receiver, as well as the privacy of the quantum messages, is perfectly protected with the exception of an exponentially small probability in our protocol. (paper)

  8. Counseling Torture Victims.

    Science.gov (United States)

    Whittaker, Shaun R.

    1988-01-01

    Addresses the psychological effects of torture (including solitary confinement) and the implications of torture for counseling and the counseling psychology profession. Discusses counseling issues related to diagnosis of torture victims, treatment, special considerations for counselors, use of testimony as counseling technique, and prognosis.…

  9. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    LENUS (Irish Health Repository)

    Sills, Eric Scott

    2010-08-11

    Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p < 0.001). Infertility duration was ≥3 yrs for couples enrolling in dual gamete donation, and each had ≥2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5\\/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  10. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...

  11. An Internet Based Anonymous Electronic Cash System

    Directory of Open Access Journals (Sweden)

    Israt Jahan

    2015-04-01

    Full Text Available There is an increase activity in research to improve the current electronic payment system which is parallel with the progress of internet. Electronic cash system is a cryptographic payment system which offers anonymity during withdrawal and purchase. Electronic cash displays serial numbers which can be recorded to allow further tracing. Contrary to their physical counterparts, e-cash have an inherent limitation; they are easy to copy and reuse (double-spending. An observer is a tamper-resistant device, issued by the Internet bank, which is incorporated with the Internet user’s computer that prevents double-spending physically, i.e., the user has no access to her e-cash and therefore he cannot copy them. In this paper, we shall present an anonymous electronic cash scheme on the internet which incorporates tamper-resistant device with user-module.

  12. Anonymity And Accountability In Web Based Transactions

    Directory of Open Access Journals (Sweden)

    H.Jayasree

    2012-04-01

    Full Text Available Decreased privacy is an unavoidable consequence in the drive to make the world a more secure, safer place, according to some analysts. In the on-line world, the conflict between privacy and security manifests itself in a debate between anonymity and accountability. Balance between Anonymity and Accountability is a major concern in web based transactions. The protection of users’ privacy when performing web-based transactions is an important factor in the acceptance and use of Internet and web services. There is a tremendous improvement in the automation of the way we pay for goods and services by the variety and growth of electronic banking services available to the consumers. Hence there is a need for the ultimate structure of the new electronic transaction system that has a substantial impact on the personal privacy as well as on the nature and extent of criminal use of E- transactions. This paper presents an approach for such structure.

  13. Yahtzee: An Anonymized Group Level Matching Procedure

    CERN Document Server

    Jones, Jason J; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam; Marlow, Cameron; Fowler, James H

    2011-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources in order to conduct their research. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects evermore important. However, strict privacy procedures can make joining diverse sources of data that contain information about specific individual behaviors difficult. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as expected theoretically when we apply it to data from Facebook and public voter records.

  14. Privacy, anonymity and subjectivity in genomic research.

    Science.gov (United States)

    McGonigle, Ian; Shomron, Noam

    2016-01-01

    The use of non-anonymized human genome data is becoming increasingly popular in research. Here we review the proceedings of a special meeting on this topic that took place at European Molecular Biology Organization (EMBO) in December 2014. The main points discussed centered on how to achieve 'anonymity,' 'trust,' and 'protection of data' in relation to new genomic technologies and research. Following our report of this meeting, we also raise three further issues for future consideration: the harmonization of international law in relation to genetic data protection; the complex issues around the 'dividual' nature of genetic data; and the growing commercial value of personal data. In conclusion, we stress the importance of scientists working in the area of genomic research engaging in interdisciplinary collaborations with humanities and social science scholars and addressing these complicated issues. PMID:26763729

  15. SSA-Caterpillar in Group Anonymity

    CERN Document Server

    Tavrov, Dan

    2011-01-01

    Nowadays, it is a common practice to protect various types of statistical data before publishing them for different researches. For instance, when conducting extensive demographic surveys such as national census, the collected data should be at least depersonalized to guarantee proper level of privacy preservation. In practice, even more complicated methods of data protection need to be used. All these methods can be generally divided into two classes. The first ones aim at providing individual data anonymity, whereas the other ones are focused on protecting information about a group of respondents. In this paper, we propose a novel technique of providing group anonymity in statistical data using singular spectrum analysis (SSA).Also, we apply SSA to defining hidden patterns in demographic data distribution.

  16. Graph Based Local Recoding for Data Anonymization

    Directory of Open Access Journals (Sweden)

    K. Venkata Ramana

    2013-08-01

    Full Text Available Releasing person specific data could potentially reveal the sensitive information of an individual. kanonymityis an approach for protecting the individual privacy where the data is formed into set ofequivalence classes in which each class share the same values. Among several methods, local recodingbased generalization is an effective method to accomplish k-anonymization. In this paper, we proposed aminimum spanning tree partitioning based approach to achieve local recoding. We achieve it in twophases. During the first phase, MST is constructed using concept hierarchical and the distances amongdata points are considered as the weights of MST and in the next phase we generate the equivalence classesadhering to the anonymity requirement. Experiments show that our proposed local recoding frameworkproduces better quality in published tables than existing Mondrian global recoding and k-memberclustering approaches.

  17. Sister-sister incest: data from an anonymous computerized survey.

    Science.gov (United States)

    Stroebel, Sandra S; O'Keefe, Stephen L; Griffee, Karen; Kuo, Shih-Ya; Beard, Keith W; Kommor, Martin J

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using a computer-assisted self-interview. Thirty-one participants were victims of sister-sister incest, 40 were victims of brother-sister incest, 19 were victims of father-daughter incest, 8 were victims of sexual abuse by an adult female (including one mother), and 232 were victims of sexual abuse by an adult male other than their father before reaching 18 years of age. The rest (1,203) served as controls. The victims of sister-sister incest had significantly more problematic outcomes than controls on many measures as adults. Victims of sister-sister incest were more depressed and more likely than controls to be distant from the perpetrator-sister and to have traded sex for money, experienced an unplanned pregnancy, engaged in four different types of masturbation, and engaged in 13 different same-sex behaviors. Our findings were consistent with other reports of early eroticization and persistent hypereroticization of incest victims. PMID:23924178

  18. An Internet Based Anonymous Electronic Cash System

    OpenAIRE

    Israt Jahan; Mohammad Zahidur Rahman; K M Akkas Ali; Israt Jerin

    2015-01-01

    There is an increase activity in research to improve the current electronic payment system which is parallel with the progress of internet. Electronic cash system is a cryptographic payment system which offers anonymity during withdrawal and purchase. Electronic cash displays serial numbers which can be recorded to allow further tracing. Contrary to their physical counterparts, e-cash have an inherent limitation; they are easy to copy and reuse (double-spending). An observer is a tamper-resis...

  19. Assurances of past donor anonymity are meaningless

    OpenAIRE

    Blyth, Eric

    2005-01-01

    The New Scientist recently recounted the story of an American teenager conceived through ostensibly anonymous donor insemination who had been able to identify his donor through DNA testing and an internet genetic database service (also see BioNews issue 333, at http://www.bionews.org.uk/new.lasso?storyid=2808). In fact, we have known since Barry Stevens' remarkable documentary, Offspring, released in 2001, that with some genetic background information, access to DNA testing and the intern...

  20. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  1. Anonymity, Efficiency Wages and Technological Progress

    OpenAIRE

    Broadberry, Stephen; Ghosal, Sayantan; Proto, Eugenio

    2015-01-01

    Although the Industrial Revolution is often characterized as the culmination of a process of commercialisation, the precise nature of such a link remains unclear. This paper models and analyzes such link: the role of commercialisation in raising efficiency wages as impersonal and anonymous labour market transactions replace personalized customary relations. In the presence of an aggregate capital externality, we show that the resulting shift in relative factor prices leads to higher capital-i...

  2. Infrared observations of anonymous IRC sources

    Science.gov (United States)

    Strecker, D. W.; Ney, E. P.

    1974-01-01

    Infrared (0.9 to 18 microns) observations of 232 anonymous 2-micron Sky survey (IRC) sources are reported. Most of the objects appear to be late-type stars with little or no long-wave excess. About ten percent exhibit large excesses. Thirty-one of the brightest 11-micron sources have been remeasured to determine variability. These brighter objects appear to fall into two groups; one group resembles NML Tauri, while the other is like NML Cygni.

  3. An Anonymous Secure Routing Using OLSR Protocol

    OpenAIRE

    Osiers Gyamfuah Grace; Dr. John Rajan

    2013-01-01

    Security and privacy concerns are major issues to be considered in Mobile Ad hoc Networking (MANET). Several routing protocols have been proposed to achieve both routing and data packets security. In order to achieve privacy, the anonymous routing concept has been introduced and few protocols have been proposed for use in this area. In this paper, global position system (GPS) device is used to obtain the current location of nodes and with the help of a cryptographic algorithm incorporated int...

  4. Universally composable anonymous Hash certification model

    Institute of Scientific and Technical Information of China (English)

    ZHANG Fan; MA JianFeng; SangJae MOON

    2007-01-01

    Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore,inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives.

  5. The BitTorrent Anonymity Marketplace

    CERN Document Server

    Nielson, Seth James

    2011-01-01

    The very nature of operations in peer-to-peer systems such as BitTorrent exposes information about participants to their peers. Nodes desiring anonymity, therefore, often chose to route their peer-to-peer traffic through anonymity relays, such as Tor. Unfortunately, these relays have little incentive for contribution and struggle to scale with the high loads that P2P traffic foists upon them. We propose a novel modification for BitTorrent that we call the BitTorrent Anonymity Marketplace. Peers in our system trade in k swarms obscuring the actual intent of the participants. But because peers can cross-trade torrents, the k-1 cover traffic can actually serve a useful purpose. This creates a system wherein a neighbor cannot determine if a node actually wants a given torrent, or if it is only using it as leverage to get the one it really wants. In this paper, we present our design, explore its operation in simulation, and analyze its effectiveness. We demonstrate that the upload and download characteristics of c...

  6. Digital anonymity on the internet : new rules for anonymous electronic transactions? an exploration of the private law implications of digital anonymity

    OpenAIRE

    Grijpink, J.H.A.M.; Prins, C.

    2001-01-01

    This article sets out the most important conclusions of the first stage of a study into the dimensions of digital anonymity. It is intended to set out the problem, make people aware of the intricacies of the problem and thus stimulate the debate on useful legal structures for anonymity. The article focuses on Holland’s private law dimensions, addressing situations where consumers want to purchase anonymously on the Internet.

  7. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    Science.gov (United States)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  8. Anonymity: an impediment to performance in healthcare.

    Science.gov (United States)

    Karlsberg, Daniel W; Pierce, Read G

    2014-01-01

    Many teaching hospitals employ a care team structure composed of a broad range of healthcare providers with different skill sets. Each member of this team has a distinct role and a different level of training ranging from attending physician to resident, intern, and medical student. Often times, these different roles lead to greater complexity and confusion for both patients and nursing staff. It has been demonstrated that patients have a great degree of difficulty in identifying members of their care team. This anonymity also exists between nursing staff and other care providers. In order to better understand the magnitude of anonymity within the teaching hospital, a ten-question survey was sent to nurses across three different departments. Results from this survey demonstrated that 71% of nurses are "Always" or "Often" able to identify which care team is responsible for their patients, while 79% of nurses reported that they either "Often" or "Sometimes" page a provider who is not currently caring for a given patient. Furthermore, 33% of nurses felt that they were either "Rarely" or "Never" able to recognize, by face and name, attending level providers. Residents were "Rarely" or "Never" recognized by face and name 37% of the time, and interns 42% of the time. Contacting the wrong provider repeatedly leads to de facto delays in medication, therapy, and diagnosis. Additionally, these unnecessary interruptions slow workflow for both nurses and members of the care team, making hospital care less efficient and safe overall. Technological systems should focus on reducing anonymity within the hospital in order to enhance healthcare delivery. PMID:25114570

  9. Anonymizing Binary Tables is APX-hard

    CERN Document Server

    Bonizzoni, Paola; Dondi, Riccardo

    2007-01-01

    The problem of publishing personal data without giving up privacy is increasingly important. An interesting formalization is the $k$-anonymization, where all rows in a table are clustered in sets of at least $k$ records, and all the entries for which records in the same cluster have different values are suppressed. The problem has been shown to be NP-hard when the records values are over a ternary alphabet and $k=3$. In this paper we show that the problem is not only NP-hard, but also APX-hard, when the records values are over a binary alphabet and $k=3$.

  10. What is Genetic Counseling?

    Science.gov (United States)

    ... 1983) For information on genetic counselors and genetic counseling training programs, please download this helpful brochure from the Association of Genetic Counseling Program Directors: Who are Genetic Counselors? Practicing genetic ...

  11. Professional Counseling versus Specialized Programs for Alcohol and Drug Abuse Treatment.

    Science.gov (United States)

    Polcin, Douglas L.

    2000-01-01

    Reviews major recent studies supporting the effectiveness of professional counseling, Alcoholics Anonymous, and specialty programs for treating alcohol and drug problems. Describes the American Society of Addiction Medicine's guidelines for referral to substance abuse services and examples of integrated treatment approaches. (Contains 35…

  12. Predicting Burnout and Career Choice Satisfaction in Counseling Psychology Graduate Students

    Science.gov (United States)

    Clark, Heddy Kovach; Murdock, Nancy L.; Koetting, Kristin

    2009-01-01

    Counseling psychology doctoral students (N = 284) from 53 training programs throughout the United States anonymously completed online measures of burnout, career choice satisfaction, global stress, role conflict, social support (from family/friends, advisors, other students) and psychological sense of community (SOC) in the doctoral program. Two…

  13. Atmosphere and Counseling Get High Grades (Momentum 30-Year Retrospective).

    Science.gov (United States)

    Sorensen, Terri

    2000-01-01

    Asserts that Catholic schools have fewer problems such as teen pregnancy, sex, drugs, and alcohol, but that there needs to be more information provided to students on sex education. States that a great deal of tutoring and counseling are provided for students in Catholic institutions, and that students are treated with more care. (CW)

  14. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    Science.gov (United States)

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  15. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni;

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user to...

  16. Complete Bipartite Anonymity for Location Privacy

    Institute of Scientific and Technical Information of China (English)

    董恺; 顾涛; 陶先平; 吕建

    2014-01-01

    Users are vulnerable to privacy risks when providing their location information to location-based services (LBS). Existing work sacrifices the quality of LBS by degrading spatial and temporal accuracy for ensuring user privacy. In this paper, we propose a novel approach, Complete Bipartite Anonymity (CBA), aiming to achieve both user privacy and quality of service. The theoretical basis of CBA is that: if the bipartite graph of k nearby users’ paths can be transformed into a complete bipartite graph, then these users achieve k-anonymity since the set of “end points connecting to a specific start point in a graph”is an equivalence class. To achieve CBA, we design a Collaborative Path Confusion (CPC) protocol which enables nearby users to discover and authenticate each other without knowing their real identities or accurate locations, predict the encounter location using users’ moving pattern information, and generate fake traces obfuscating the real ones. We evaluate CBA using a real-world dataset, and compare its privacy performance with existing path confusion approach. The results show that CBA enhances location privacy by increasing the chance for a user confusing his/her path with others by 4 to 16 times in low user density areas. We also demonstrate that CBA is secure under the trace identification attack.

  17. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  18. Nymble: Blocking Misbehaving Users inAnonymizing Networks

    Directory of Open Access Journals (Sweden)

    Dipali V. Yelane

    2013-05-01

    Full Text Available Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’sIP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network. As a result, administrators block a l known exit nodes of anonymizing networks, denying anonymous access to misbehaving and behaving users alike. To address this problem, we present Nymble, a system in which servers can “blacklist” misbehaving users, thereby blocking users without compromising their anonymity.Our system is thus agnostic to different servers’ definitions of misbehavior — servers can blacklist users for whatever reason, and the privacy of blacklisted users is maintained.

  19. Challenges of Anonymous Communication: Bridging Gaps between Theory and Practice

    OpenAIRE

    Westermann, Benedikt

    2012-01-01

    Anonymous communication is an important building block for privacy enhancing technologies and in addition to this, the deployed anonymity networks have become important tools to protect the users’ privacy in the Internet where hundreds of thousands of users rely on them. During the last decades, researchers have investigated the security aspects of anonymous communication networks. One important research methodology is the investigation of attacks which helps to understand the security proper...

  20. Online Piracy, Anonymity and Social Change – Deviance Through Innovation

    OpenAIRE

    Larsson, Stefan; Svensson, Måns; Kaminski, Marcin

    2012-01-01

    This article analyses current trends in the use of anonymity services among younger Swedes (15-25) and focuses on individuals engaging in illegal file sharing in order to better understand the rationale behind both file sharing as well as online anonymity, especially in relation to enforcement of copyright. By comparing the findings of a survey conducted on three different occasions (early 2009, late 2009 and early 2012), we measure the fluctuations in the use of anonymity services among appr...

  1. An Anonymous Secure Routing Using OLSR Protocol

    Directory of Open Access Journals (Sweden)

    Osiers Gyamfuah Grace

    2013-01-01

    Full Text Available Security and privacy concerns are major issues to be considered in Mobile Ad hoc Networking (MANET. Several routing protocols have been proposed to achieve both routing and data packets security. In order to achieve privacy, the anonymous routing concept has been introduced and few protocols have been proposed for use in this area. In this paper, global position system (GPS device is used to obtain the current location of nodes and with the help of a cryptographic algorithm incorporated into the existing Optimized Link State Routing protocol (OLSR, it is expected that security services such as authentication, data integrity, privacy and confidentiality will be provided. This work proposes to protect the network against active attacks such as impersonation and modification.

  2. Classification via Clustering for Anonymization Data

    Directory of Open Access Journals (Sweden)

    Sridhar Mandapati

    2014-02-01

    Full Text Available Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data Mining (PPDM techniques aim at protecting the sensitive data and mining results. In this study, the different Clustering techniques via classification with and without anonymization data using mining tool WEKA is presented. The aim of this study is to investigate the performance of different clustering methods for the diabetic data set and to compare the efficiency of privacy preserving mining. The accuracy of classification via clustering is evaluated using K-means, Expectation-Maximization (EM and Density based clustering methods.

  3. Comments on “Anonymous reviewers” [“Anonymous reviews: Self-serving, counterproductive, and unacceptable”

    Science.gov (United States)

    Robinove, Charles J.

    Mryl Beck's Forum article denouncing anonymous reviews (Eos, 1 July 2003) is right on the money. Perhaps he read my letter in Applied Physics in 1990 also denouncing anonymous reviews.Some years ago, I received an anonymous review of a paper I had submitted for journal publication. The reviewer raised such interesting questions that I wanted to discuss them with him. I phoned the editor of the journal and asked if he would tell me the name of the reviewer. He politely declined, but when I told him I thought I recognized the handwriting of the reviewer and named him, he relented and said I was correct! I called the reviewer and he was generous enough to spend a wonderful hour on the phone with me discussing the paper. The paper was published with great consideration given to his ideas, much to its betterment. Now that's a reviewer whose interest is in improving the paper and helping the author, not just showing how smart he is or slapping down a junior colleague. The AGU motto,“unselfish cooperation in research,” can be well exemplified by those who wish to help rather than to tear down.

  4. Group Aggression: The Effects of Friendship Ties and Anonymity.

    Science.gov (United States)

    Zabrack, Merle; Miller, Norman

    The degree of acquaintance among group members (friends or strangers) and the opportunity for group members to observe each other's actions (anonymous or non-anonymous) were manipulated in a 2 x 2 factorial design, to determine the amount of aversive stimulation that would be administered to a target person. When group members could not observe…

  5. Individualised motivational counselling to enhance adherence to antiretroviral therapy is not superior to didactic counselling in South African patients: Findings of the CAPRISA 058 randomised controlled trial

    OpenAIRE

    van Loggerenberg, Francois; Alison D. Grant; Naidoo, Kogieleum; Murrman, Marita; Gengiah, Santhanalakshmi; Gengiah, Tanuja N; Fielding, Katherine; Karim, Salim S. Abdool

    2015-01-01

    Concerns that standard didactic adherence counselling may be inadequate to maximise antiretroviral therapy (ART) adherence led us to evaluate more intensive individualised motivational adherence counselling. We randomised 297 HIV-positive ART-naïve patients in Durban, South Africa, to receive either didactic counselling, prior to ART initiation (n=150), or an intensive motivational adherence intervention after initiating ART (n=147). Study arms were similar for age (mean 35.8 years), sex (43....

  6. An Anonymous Authenticated Protocol Based on Zero Knowledge Proof

    Directory of Open Access Journals (Sweden)

    Chao Jing

    2012-11-01

    Full Text Available With the rapid development of the Internet, anonymity and privacy protection in many applications of the scene is critical. The anonymous authentication means that the server cant know the users identity when they are communicating with each other. In this paper, based on the Wangs zero knowledge proof scheme of possessing a digital signature, we propose a new anonymous authentication scheme. Compared with the Cui-Caos anonymous authentication protocol based on the ring signature, our scheme has two advantages. First, we dont need to know all users public keys. And then our scheme reduces the communication traffic largely. We also discuss the security attributes of our new scheme which are authentication, anonymity and unlinkablity. And then we introduce a concrete application of our scheme. Finally, we make a conclusion of this paper.

  7. Improving Security Architecture of Anonymous Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2012-01-01

    As users of networks increasingly aware of their privacy needs, the importance of anonymity is gaining popularity. The reason behind it is that anonymity can hide the actual identity of end users while allowing their to access services of network or web site. More over they are allowed to do so...... without being traced. This usage is prevailing in P2P systems and also payment based networks like e-cash. Achieving anonymity and being able to trace misbehaving users are the two conflicting requirements. This paper proposes a security architecture that is aimed at providing complete anonymity to honest...... users while tracing misbehaving users thus resolving the conflict between anonymity and traceability requirements. In addition to these, this paper also focuses on basic security requirements such as nonrepudiation, data integrity, confidentiality, and authentication. The empirical results revealed that...

  8. On the Utility of Anonymized Flow Traces for Anomaly Detection

    CERN Document Server

    Burkhart, Martin; May, Martin

    2008-01-01

    The sharing of network traces is an important prerequisite for the development and evaluation of efficient anomaly detection mechanisms. Unfortunately, privacy concerns and data protection laws prevent network operators from sharing these data. Anonymization is a promising solution in this context; however, it is unclear if the sanitization of data preserves the traffic characteristics or introduces artifacts that may falsify traffic analysis results. In this paper, we examine the utility of anonymized flow traces for anomaly detection. We quantitatively evaluate the impact of IP address anonymization, namely variations of permutation and truncation, on the detectability of large-scale anomalies. Specifically, we analyze three weeks of un-sampled and non-anonymized network traces from a medium-sized backbone network. We find that all anonymization techniques, except prefix-preserving permutation, degrade the utility of data for anomaly detection. We show that the degree of degradation depends to a large exten...

  9. Marketing pastoral counseling.

    Science.gov (United States)

    Lageman, A G

    1984-12-01

    Identifies, suggests understandings, and illustrates applications of marketing principles as they relate to pastoral counseling services. Describes four approaches to marketing pastoral counseling--traditional, educational, marketing, and fund raising--and gives illustrations of each. A director of an established pastoral counseling center responds to the article in terms of "high density" and "low density" principles and suggests that strategies which emulate the medical model may need to be re-examined by contemporary pastoral counselors. PMID:10269463

  10. Perspectives on counselling psychology

    OpenAIRE

    Cross, M. C.

    1999-01-01

    Two hundred and eighty participants (113 Chartered Counselling Psychologists, 167 trainees in Counselling Psychology) took part in the project, conducted over 4 years, which aimed at explicating perspectives on what constitutes the discipline of Counselling Psychology. A range of studies employing diverse methodologies are reported which contribute to the overall aim of the project. Research was conceptualised and executed within the constructivist framework and drew heavily upon the Kellian ...

  11. Effective School Counseling Teams

    OpenAIRE

    Lilley, Stacey Custer

    2007-01-01

    Despite much attention given to effective teams in the workplace, school counseling teams have been neglected in the research. The primary purpose of this mixed methods study was to learn what characteristics secondary counselors perceive contribute to an effective school counseling team. The first research phase conducted six team interviews; themes emerging from the interviews yielded the development of the Effective School Counseling Team Questionnaire (ESCTQ). The following research quest...

  12. Virginia Tech's Cook Counseling Center receives international counseling accreditation

    OpenAIRE

    DeLauder, Rachel

    2010-01-01

    The Virginia Tech Thomas E. Cook Counseling Center has been accredited by the International Association of Counseling Services, Inc., an organization of United States, Canadian, and Australian counseling agencies based in Alexandria, Va.

  13. Non-Invasive Testing, Non-Invasive Counseling.

    Science.gov (United States)

    Rebouché, Rachel

    2015-01-01

    This article describes a new prenatal genetic test that is painless, early, and increasingly available. State legislatures have reacted by prohibiting abortion for reason of fetal sex or of fetal diagnosis and managing genetic counseling. This article explores these legislative responses and considers how physicians and genetic counselors currently communicate post-testing options. The article then examines the challenges ahead for genetic counseling, particularly in light of the troubling grip of abortion politics on conversations about prenatal diagnosis. PMID:26242943

  14. Counseling in Ireland

    Science.gov (United States)

    O'Morain, Padraig; McAuliffe, Garrett J.; Conroy, Kayte; Johnson, Jennifer M.; Michel, Rebecca E.

    2012-01-01

    Counseling in Ireland has experienced rapid growth in the past 30 years. Public attitudes toward counseling have become more positive, especially with the increasing secularization of a once strongly religious Catholic society. Licensure is nonexistent but there are certification bodies that attempt to ensure qualified practice. There is no…

  15. Improvisation in Counseling.

    Science.gov (United States)

    Straehle, Manfred; Soucar, Beth

    This paper explores the supportive and effective uses of improvisation in counseling. Specifically, the intention in this paper is to accomplish three goals: to explore the history of improvisation in psychotherapy, to examine the aspects of improvisation that pertain to the counseling process, and to identify ways in which the use of…

  16. Counseling Bisexual Clients.

    Science.gov (United States)

    Smiley, Elizabeth B.

    1997-01-01

    Provides a brief conceptual statement about bisexuality. Offers a review of existing research studies, and suggests issues to consider when counseling bisexual clients. Defines bisexuality and discusses prevalence studies, identity development, and implications for counseling. Claims that bisexuality challenges traditional rules about sexual…

  17. Malpractice in Counseling Neuropsychology.

    Science.gov (United States)

    Woody, Robert Henley

    1992-01-01

    Responds to earlier four articles on integration of counseling psychology and neuropsychology by noting that neuropsychology occurs in settings with high risk of legal complaints. Contends that aspiration to press counseling psychology toward clinical neuropsychology should be filtered through consideration for legal risk. Explores legal…

  18. Publishing International Counseling Articles

    Science.gov (United States)

    Hohenshil, Thomas H.; Amundson, Norman E.

    2011-01-01

    This article begins with a rationale for including international articles in the "Journal of Counseling & Development." Then, 2 general categories of international articles are described. First are articles that provide a general overview of counseling in a particular country. The 2nd category is more general and might involve international…

  19. Prospective parents' intentions regarding disclosure following the removal of donor anonymity.

    Science.gov (United States)

    Crawshaw, Marilyn

    2008-06-01

    This short survey of UK infertility counsellors was designed to determine whether the removal of donor anonymity resulted in noticeable changes in prospective parents' stated intentions regarding disclosure of their origins to any children conceived through donor conception. Members of the British Infertility Counselling Association working in Human Fertilisation and Embryology Authority (HFEA) -- licensed centres, before and after the legal changes, were sent a short questionnaire that included space for free comments (take-up: 62%). Three-quarters reported changes. Of these, two-thirds said prospective parents were more likely to say they would disclose, while less than a tenth said prospective parents were less likely do so. Where no changes were noted, this was primarily because the majority of prospective parents had stated their intention to be open even prior to the legal changes. Possible influences on intentions included: the culture within the centre, moves towards openness within the wider society, and parents' lack of confidence regarding how to go about disclosure. Follow-up studies are needed to improve understanding of whether influences on decision making carry through to patterns of actual disclosure; whether involvement in counselling affects outcomes; and whether access to professional assistance at the time of planned disclosure is helpful. PMID:18569064

  20. Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity

    Energy Technology Data Exchange (ETDEWEB)

    Shue, Craig A [ORNL; Gupta, Prof. Minaxi [Indiana University

    2010-01-01

    Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While many existing schemes provide strong anonymity, they are inappropriate when high bandwidth and low latency are required. In this work, we explore an anonymity scheme for end hosts whose performance makes it possible to have it always on. The scheme leverages the natural grouping of hosts in the same subnet and the universally available broadcast primitive to provide anonymity at line speeds. Our scheme is strongly resistant against all active or passive adversaries as long as they are outside the subnet. Even within the subnet, our scheme provides reasonable resistance against adversaries, providing anonymity that is suitable for common Internet applications.

  1. Anonymity and verifiability in multi-attribute reverse auction

    CERN Document Server

    Srinath, T R; Pais, Alwyn Roshan; 10.5121/ijitcs.2011.1401

    2011-01-01

    The use of e-Auction services has been increasing in recent years. Security requirements in conducting e-Auctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with asymmetric models in which the commercial entity of an auction issuer or registration manager is assumed in addition to the auctioneer. Multi-attribute reverse auctions promise higher market efficiency and effective information exchange. This work extends and uses the existing schemes. This scheme uses scoring function, winner determination in multi-attribute auctions to implement public verifiability. Anonymity is achieved through bidder side pseudonym generation. By results and analysis we say this is very simple and effective scheme. This scheme ensures public verifiability and anonymity in multi-attribute auctions w...

  2. Theoretical Results on De-Anonymization via Linkage Attacks

    Directory of Open Access Journals (Sweden)

    Martin M. Merener

    2012-08-01

    Full Text Available Consider a database D with records containing history of individuals' transactions, that has been de-identified, i.e., the variables that uniquely associate records with individuals have been removed from the data. An adversary de-anonymizes D via a linkage attack if using some auxiliary information about a certain individual in the database, it can determine which record of D corresponds to such individual. One example of this is given in the article Robust De-anonymization of Large Sparse Datasets, by Narayanan and Shmatikov [19], which shows that an anonymized database containing records with ratings of different movies rented by customers of Netflix, could in fact be de-anonymized using very little auxiliary information, even with errors. Besides the heuristic de-anonymization of the Netflix database, Narayanan and Shmatikov provide interesting theoretical results about database de-anonymization that an adversary can produce under general conditions. In this article we revisit these theoretical results, and work them further. Our first contribution is to exhibit different simple cases in which the algorithm Scoreboard, meant to produce the theoretical de-anonymization in [19], fails to do so. By requiring 1-sim to be a pseudo-metric, and that the algorithm producing the de-anonymization outputs a record with minimum support among the candidates, we obtain and prove deanonymization results similar to those described in [19]. We then consider a new hypothesis, motivated by the fact (observed in heuristic de-anonymizations that when the auxiliary information contains values corresponding to rare attributes, the de-anonymization achieved is stronger. We formalize this using the notion on long tail [4], and give new theorems expressing the level of de-anonymization in terms of the parameters of the tail of the database D. The improvement in the deanonymization is reflected in the fact that when at least one value in the auxiliary information

  3. Identity and anonymity: victims and perpetrators in human rights reports

    OpenAIRE

    De Cock, Barbara; Michaud Maturana, Daniel; 4th Biennial Meeting of the International Association for the Study of Spanish in Society (SIS-EES) / 6th International Conference of Hispanic Linguistics

    2013-01-01

    Identity and anonymity: victims and perpetrators in human rights reports In this paper, we look into the construction of identity and anonymity in human rights reports, more concretely in the report by the Rettig Commission on human rights violations under the Pinochet regime. In the preliminaries to this report, the commission formulates its desire to give an account that is as complete as possible yet also its refraining from attributing individual responsibility (Oteíza 2010). We will anal...

  4. Application of Steganography for Anonymity through the Internet

    OpenAIRE

    Bahi, Jacques; Couchot, Jean-François; Friot, Nicolas; Guyeux, Christophe

    2012-01-01

    In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve this goal, we propose an information hiding scheme being stego-secure, which is the highest level...

  5. Redefining privacy and anonymity through social networking affordances

    OpenAIRE

    Cirucci, Angela M.

    2015-01-01

    Social networking sites allow people to create, broadcast, and interpret the self in new and evolving ways. While early online social media studies praised the Internet for providing an anonymous space in which to experiment with identity, more recent research suggests that social networking sites have become not anonymous, as they compel users to perform identity in new ways. Through a novel application of affordance theory, this paper argues that instead of attempting to apply outdated defi...

  6. Internet anonymity with mobility - key challenges for the future.

    OpenAIRE

    Doswell, Stephen

    2013-01-01

    Privacy, including the privacy of correspondence (communications), is a human right. Privacy Enhancing Technologies (PETs) provide a number of tools with the aim to protect this right. Anonymity networks, such as Tor, contribute to privacy by providing a degree of anonymity for an individual's Internet traffic. An increase in mobile devices connecting to the Internet is predicted to surpass static connections by 2014. The desire for privacy will provide additional challenges in the future, fo...

  7. Scalable Techniques for Security and Anonymity in Distributed Systems

    OpenAIRE

    Akhoondi, Masoud

    2015-01-01

    Security and privacy in distributed systems are long-standing hard problems. On the one hand, solutions for anonymous communications over the Internet are either vulnerable to traffic analysis or offer poor performance. On the other hand, compromises within enterprises remain hard to track down due to complex dependencies between hosts, applications, and their data.In this thesis, I develop two solutions to improve the anonymity vs. performance trade-off for communications over the Internet. ...

  8. Social distance and anonymity modulate fairness consideration: An ERP study

    OpenAIRE

    Rongjun Yu; Pan Hu; Ping Zhang

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we...

  9. An Anonymous Payment Protocol with Mobile Agents in Hostile Environments

    Institute of Scientific and Technical Information of China (English)

    LIU Yi; XIANG Ming-sen; WANG Yu-min

    2005-01-01

    By using Pedersen' s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous payment protocol which have following features:protecting the confidentiality of sensitive payment information from spying by malicious hosts; using a trusted third party in a minimal way; verifying the validity of the share by the merchant; allowing agent to verify that the product which it is about to receive is the one it is paying for; keeping the customer anonymous.

  10. On the Feasibility of (Practical Commercial Anonymous Cloud Storage

    Directory of Open Access Journals (Sweden)

    Tobias Pulls

    2015-08-01

    Full Text Available Current de facto standard payment and billing models for commercial cloud storage services provide a plethora of information to the cloud provider about its clients. This leads to a hostile environment when seen from a privacy perspective. Motivated by recently leaked facts about large scale governmental surveillance efforts as well as the lack of privacy-preserving measures in existing commercial cloud storage services, in this paper, we investigate the feasibility of so called anonymous cloud storage services which require user payment (which we call commercial anonymous cloud storage. Anonymity in this context can be seen as the absence of information to uniquely identify a provider's client that is storing and manipulating data at the provider while at the same time still allowing fair billing, for both, the clients and the cloud provider. Although encrypting data prior to outsourcing helps to protect data privacy and can be achieved without the cloud provider's consent, the issues we are interested in, do not seem to be achievable that easily. However, while various measures for the latter issue, i.e., realizing access privacy, have been studied in the past, the role of privacy in context of billing and payment for cloud storage has, until now, remained unexplored. We therefore introduce an abstract model for commercial cloud storage services to define various types of anonymous cloud storage, study several payment and billing models for cloud storage services and their impact on the anonymity of the service's clients. Moreover, we discuss several solutions to provide anonymity within the different models. Our findings highlight the importance of anonymous payment for the practical deployment of commercial privacy-friendly cloud storage services. Furthermore, we provide directions for future work in some settings, i.e., when anonymous payment is not available, as interesting open challenges.

  11. Mobile Anonymous Trust Based Routing Using Ant Colony Optimization

    OpenAIRE

    R. KALPANA; N. Rengarajan

    2012-01-01

    Problem statement: Ad hoc networks are susceptible to malicious attacks through denial of services, traffic analysis and spoofing. The security of the ad hoc routing protocol depends upon encryption, authentication, anonymity and trust factors. End-to-end security of data is provided by encryption and authentication, topology information of the nodes can be obtained by studying traffic and routing data. This security problem of ad hoc network is addressed by the use of anonymity mechanisms an...

  12. A peaceful pyramid? Hierarchy and anonymity in newspaper comment sections

    OpenAIRE

    Gonçalves, João Fernando Ferreira

    2015-01-01

    Several studies have linked deindividuation to an increase in aggression and incivility. This paper seeks to ascertain the influence of anonymity and hierarchy in online aggression by comparing two different newspaper comment sections: one with a hierarchical system and the other with an equalitarian setting. This study distinguishes itself form previous works by analyzing systems where identification is optional and where identified and anonymous users coexist. The hierarchical solution m...

  13. Anonymization of DICOM Electronic Medical Records for Radiation Therapy

    OpenAIRE

    Newhauser, Wayne; Jones, Timothy; Swerdloff, Stuart; Newhauser, Warren; Cilia, Mark; Carver, Robert (British painter, ca.1730-1791); Halloran, Andy; Zhang, Rui

    2014-01-01

    Electronic medical records (EMR) and treatment plans are used in research on patient outcomes and radiation effects. In many situations researchers must remove protected health information (PHI) from EMRs. The literature contains several studies describing the anonymization of generic Digital Imaging and Communication in Medicine (DICOM) files and DICOM image sets but no publications were found that discuss the anonymization of DICOM radiation therapy plans, a key component of an EMR in a can...

  14. Clients' Willingness to Incorporate Religion or Spirituality in Counseling: A Brief Report

    Science.gov (United States)

    Diallo, Abdoulaye

    2013-01-01

    A total of 84 individuals with addiction issues (e.g., drugs, sex, weight, food, and codependency) were asked about their willingness to incorporate religion or spirituality in their counseling. These respondents expressed willingness to deal with religion or spirituality in counseling if the counselor was knowledgeable about their religion or…

  15. Towards a respondent-preferred ki-anonymity model

    Institute of Scientific and Technical Information of China (English)

    Kok-Seng WONG; Myung Ho KIM

    2015-01-01

    Recently, privacy concerns about data collection have received an increasing amount of attention. In data collection process, a data collector (an agency) assumed that all respondents would be comfortable with submitting their data if the published data was anonymous. We believe that this assumption is not realistic because the increase in privacy concerns causes some re-spondents to refuse participation or to submit inaccurate data to such agencies. If respondents submit inaccurate data, then the usefulness of the results from analysis of the collected data cannot be guaranteed. Furthermore, we note that the level of anonymity (i.e., k-anonymity) guaranteed by an agency cannot be verified by respondents since they generally do not have access to all of the data that is released. Therefore, we introduce the notion of ki-anonymity, where ki is the level of anonymity preferred by each respondent i. Instead of placing full trust in an agency, our solution increases respondent confidence by allowing each to decide the preferred level of protection. As such, our protocol ensures that respondents achieve their preferred ki-anonymity during data collection and guarantees that the collected records are genuine and useful for data analysis.

  16. Sexual behaviours of clients of sex workers reported within phone calls at HIV/AIDS/STIs Italian Helpline

    Directory of Open Access Journals (Sweden)

    Ilaria Mulieri

    2013-06-01

    Full Text Available BACKGROUND: Clients of sex workers represent a relevant target for interventions aimed at the prevention of HIV and sexually transmitted infections (STIs. Within prevention strategies, the AIDS and sexually transmitted infections helpline (Telefono Verde AIDS/ IST, TVA-IST of National Institute of Health in Italy has provided, since 1987, specific information and counselling interventions. AIM: The present study reports data on anagraphical characteristics and behaviours of clients of sex workers, anonymously reported at TVA-IST in the period 1987-2010. DISCUSSION: Among 95 149 phone calls (14% of the total considered 99.5% came from males, over 80% aged under 37 years and prevalently from Northern Italy. Among sexual behaviours, unprotected sexual intercourses were reported in the 26% of the calls. Subjects under 27 years reported a higher frequency of unprotected anal intercourse, while they used protection with oral and vaginal intercourses in a greater extent than older ones. Due to differential behaviours within clients of sex workers, specific informative strategies for this targeted population should adequately consider age-related differences.

  17. International exchange training in genetic counseling: an exploration of the value in exchange experiences.

    Science.gov (United States)

    Alexander, Chelsea K A; Veach, Patricia McCarthy; Lian, Fengqin; LeRoy, Bonnie S

    2013-12-01

    International exchange training in genetic counseling is increasing, but research examining these experiences is lacking. In this study 309 genetic counseling students and genetic counselors completed an anonymous survey investigating six major research questions: (1) How prevalent are international genetic counseling experiences? (2) What types are pursued and why? (3) What supports and barriers exist? 3) What are the demographic characteristics of individuals accruing international experience? (5) Does international experience promote professional development? and (6) Do genetic counseling students and professionals perceive international experiences as beneficial? Most respondents were Caucasian females born in one of 25 countries. The most prevalent experiences involved either clinical observation or clinical training. Common motivations for pursuing international experience were personal growth, exposure to a different healthcare system, and travel opportunities. Outcomes included professionally-relevant experience and personal growth. Barriers included finances, limited availability of opportunities, and for those without international experience, family responsibilities. Additional findings, practice and training implications, and research recommendations are provided. PMID:23423708

  18. Profile of attendee for voluntary counseling and testing in the ICTC, Ahmedabad

    Directory of Open Access Journals (Sweden)

    Sharma Rashmi

    2009-01-01

    Full Text Available Human immunodeficiency virus (HIV testing with pre and postcounseling aiming behavior change communication (BCC for core/bridge population is the main element of holistic model of health care. Voluntary counseling and testing center (VCTC remodeled as integrated counseling and testing center (ICTC-general is the ′gateways to care′. It was hospital-based cross sectional study of 811 clients registered at VCTC of Kesar SAL Hospital from January to December 2007. These patients either came voluntarily or by referral. Anonymous and unlinked information was collected on predesigned schedule and data was analyzed to find out the seropositivity, demographic characteristics (among attendees and HIV positives, and epidemiological vulnerability of different segments of population. Among the attendees, 64% were males, 75% in the age group of 20-49 years, 80% were currently married, and 70% were literate (< 10 th standard. Also, 66% clients were gainfully employed, while one-fourth were housewives; 98% lived with families, 75% were referred by doctors, and only 19% walked in directly. Dominant reason for visiting ICTC was the history/presence of high risk behavior (HRB (34%. 35% indulged in heterosexual route; other HRB (men having sex with men or MSM and injecting drug users or IDU were rare. There were more positive among males, 20-49 years of age group, those living singly, unmarried, divorcee, widow(er and separated. Similarly positives were more amongst illiterates, less educated and those engaged in unskilled and semi skilled jobs. Adolescent students (>14 years accounted for one-fifth of the total positives. Direct walk in clients were more positive compared to those referred by doctors. Those who confessed of history/presence of HRB accounted for all except 3 (85% positives. 51% indulged in heterosexual sex followed by MSM (8%. Overall sero positivity was 4.8%; high in males, 30-49 years age, unmarried and divorcee etc. Sero prevalence decreased

  19. Biorhythm in Couple Counseling

    Science.gov (United States)

    Araoz, Daniel L.

    1977-01-01

    Twelve couples in marital counseling were studied during 12 months on the basis of their biorhythms. For each couple a compatibility percentage was obtained. It was found that difficulties in their interaction correlated highly with dissonance in their biorhythms. (Author)

  20. 38 CFR 21.3100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.3100.... Chapter 35 Counseling § 21.3100 Counseling. (a) Purpose of counseling. The purpose of counseling is to...)) (b) Availability of counseling. Counseling assistance is available for— (1) Identifying and...

  1. Evaluation of a nurse-led haemophilia counselling service.

    LENUS (Irish Health Repository)

    O'Shea, Eadaoln

    2012-01-01

    Genetic counselling and testing for females with a family history of haemophilia has long been advocated. However, there is little research in regard to clients\\' satisfaction with the existing counselling models in haemophilia, and in particular with nurse-led clinics. The purpose of this study was to evaluate whether clients were satisfied with a nurse-led carrier testing clinic and counselling service. A retrospective quantitative study of clients\\' satisfaction and perceived knowledge was undertaken using an anonymous questionnaire. A sample of 42 women who had attended the clinic in the last 12 months was identified. The response rate for the study was 71% (n = 30).Two thirds of the respondents were 35 years of age or younger, 93% had a family history of haemophilia and 56% were diagnosed as carriers. Perceived understanding and knowledge increased significantly between the first and second appointments (p < 0.001). Overall, the study identified a high level of client satisfaction with the nurse-led carrier testing clinic and counselling service.

  2. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  3. Anonymous pastoral care for problems pertaining to sexuality.

    Science.gov (United States)

    van Drie, A; Ganzevoort, R R; Spiering, M

    2014-12-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria on the other. We analyzed helpseeking questions of two protestant Christian organizations in the Netherlands providing anonymous pastoral care: Refoweb and EO-Nazorg. Sexual themes were addressed in 19 and 2.3 % of the submitted questions, respectively. Of the helpseekers, 56 % is female, 15 % male, and 29 % unknown. Questions and problems for which people seek anonymous pastoral care focus primarily on premarital abstinence, gender roles, contraception, sexual orientation and masturbation. The authority of the Bible seems to be important for questioners, especially when dealing with ethical questions. Different relations between the normativity of the church tradition and sexual and spiritual health are discussed. PMID:23784431

  4. Application of Steganography for Anonymity through the Internet

    CERN Document Server

    Bahi, Jacques M; Friot, Nicolas; Guyeux, Christophe

    2012-01-01

    In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve this goal, we propose an information hiding scheme being stego-secure, which is the highest level of security in a well defined and studied category of attacks called "watermark-only attack". This category of attacks is the best context to study steganography-based anonymity through the Internet. The steganalysis of our steganographic process is also studied in order to show it security in a real test framework.

  5. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  6. Anonymous Authorship Control for User-Generated Content

    Directory of Open Access Journals (Sweden)

    Suk-Bong LEE

    2007-12-01

    Full Text Available User-Generated Content (UGC is opening up new large market in content services, and more and more people are visiting web sites to share and enjoy UGCs. These trends make many authors to move into online. Authors want to conserve their authorship and expect to publish their UGC anonymously in cases. To meet the requirements, we propose a new authorship control model based on watermarking and metadata. Authors can embed their authorship into their UGC with identities or with anonym. Even though an author publishes his UGC anonymously, he can prove his authorship without unveiling his identity via 5 methods utilizing the proposed authorship model. The proposed model and methods need no TTP and are robust even based on fragile underlying watermarking scheme.

  7. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  8. On the Definitions of Anonymity for Ring Signatures

    Science.gov (United States)

    Ohkubo, Miyako; Abe, Masayuki

    This paper studies the relations among several definitions of anonymity for ring signature schemes in the same attack environment. It is shown that one intuitive and two technical definitions we consider are asymptotically equivalent, and the indistinguishability-based technical definition is the strongest, i. e., the most secure when achieved, when the exact reduction cost is taken into account. We then extend our result to the threshold case where a subset of members cooperate to create a signature. The threshold setting makes the notion of anonymity more complex and yields a greater variety of definitions. We explore several notions and observe certain relation does not seem hold unlike the simple single-signer case. Nevertheless, we see that an indistinguishability-based definition is the most favorable in the threshold case. We also study the notion of linkability and present a simple scheme that achieves both anonymity and linkability.

  9. A Survey on the Status and Wishes of HIV Voluntary Counseling and Testing and Its Influencing Factors among Community Female Commercial Sex Workers%社区暗娼艾滋病自愿咨询检测现状调查

    Institute of Scientific and Technical Information of China (English)

    席胜军; 何玉芳; 周晓红; 周丹丹; 王晨程

    2011-01-01

    Objective To understand the status of HIV Voluntary Counseling and Testing (VCT) and its influencing factors among female community commercial sex workers in Xiacheng District of Hangzhou, and to provide basic evidence for the expanded HIV - VCT.Methods A questionnaire survey was conducted among commercial sex workers selected by stratified sampling. The status of HIV - VCT was collected and the influencing factors of VCT were analyzed with univariate analysis and multivariate logistic regression. Results The rate of participation in VCT in r, heard of VCT, known places of VCT among 446 Female commercial sex workers were 14.13%, 41.10%and 22. 87%, respectively. Married, having symptoms of sexual transmitted diseases, acceptance of prevention measures, having possibility of a self- sense of infection HIV and known places of VCT were contributing factors for participating in VCT among Female community commercial sex workers. Conclusion The rate of participation in VCT among Female community commercial sex workers is low and the level of understanding towards VCT is insuffieient. Therefore, behavior intervention and hospital VCT promotion should be fully implemented and enhanced.%目的 了解杭州市下城区社区暗娼人群艾滋病自愿咨询检测(VCT)现状及其影响因素,为扩大VCT范围提供科学依据.方法 采用分层抽样的方法,对暗娼人群进行问卷调查,了解参加VCT现状,应用单因素和多因素Logistic回归分析参加VCT的相关影响因素.结果 共调查446名社区暗娼,14.13%最近1年参加VCT,41.70%听说过VCT,22.87%知道提供VCT地方.在婚、有性病症状、接受预防措施服务、自我感觉有感染HIV可能性及知晓VCT地方是暗娼参加VCT的促进因素.结论 该区社区暗娼参加VCT比例低,对VCT了解程度不够,应继续加强行为干预和医院VCT宣传.

  10. Behavioral Risk Profile of Men Who Have Sex with Men in Beijing, China: Results from a Cross-sectional Survey with Randomized Response Techniques

    Institute of Scientific and Technical Information of China (English)

    Guo-Zhu Geng; Ge Gao; Yu-Hua Ruan; Ming-Run Yu; Yun-Hua Zhou

    2016-01-01

    Background:Human immunodeficiency virus (HIV) is spreading rapidly among men who have sex with men (MSM) in China.Anonymous questionnaires or direct interviews have been frequently used to study their behavior.The aim of the study was to describe the behavioral risk profile of the MSM in Beijing using the randomized response techniques (RRTs).Methods:A cross-sectional survey of sexual behavior among a sample of MSM was conducted in two HIV counseling and testing clinics in Beijing.The survey was carried out with an anonymous questionnaire containing sensitive questions on sexual behavior.To obtain the honest responses to the sensitive questions,three distinctive RRTs were used in the questionnaire:(1) Additive randomized response model for quantitative questions,(2) randomized response model for multiple choice questions,and (3) Simmons randomized response model for binomial questions.Formulae for the point estimate,variance,and confidence interval (CI) were provided for each specific model.Results:Using RRTs in a sample of 659 participants,the mean age at first homosexual encounter was estimated to be 21.7 years (95% CI:21.2-22.2),and each had sex with about three (2.9,95% CI:2.4-3.4) male partners on average in the past month.The estimated rate for consistent condom use was 56.4% (95% CI:50.1-62.8%).In addition,condom was estimated to be used among 80.0% (95% CI:74.1-85.9%) of the population during last anal sex with a male partner.Conclusions:Our study employed RRTs in a survey containing questions on sexual behavior among MSM,and the results showed that RRT might be a useful tool to obtain truthful feedback on sensitive information such as sexual behavior from the respondents,especially in traditional Chinese cultural settings.

  11. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  12. Anonymous authentication protocol for multi-services in wireless environments

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved.

  13. "Green" Counseling: Integrating Reused Household Materials into Creative Counseling Interventions

    Science.gov (United States)

    Adamson, Nicole A.; Kress, Victoria E.

    2011-01-01

    The use of reused or recycled materials in counseling interventions provides counselors with an opportunity to use unique counseling mediums while simultaneously being socially and fiscally responsible. In this article, ways that reused or recycled items can be used in counseling are discussed. Practical suggestions for using reused or recycled…

  14. The Ghosts of Counseling Psychology: Is Counseling Research Really Dead?

    Science.gov (United States)

    Murdock, Nancy L.

    2011-01-01

    Scheel et al. offer an interesting analysis on the publication rate of counseling-related research articles in counseling psychology's two major journals. In this reaction to their work, the author considers various aspects of their results and contemplates possible explanations for the decline of counseling-related publications. The author…

  15. When Is Sexual Counseling Helpful?

    Science.gov (United States)

    ... testosterone restore sexual functioning? When is sexual counseling helpful? Any sexual problem caused or worsened by anxiety ... sexual function, speaking with a therapist can be helpful. Most counseling lasts about 2 or 3 sessions. ...

  16. Humor in Counseling: Leader Perspectives

    Science.gov (United States)

    Goldin, Eugene; Bordan, Terry; Araoz, Daniel L.; Gladding, Samuel T.; Kaplan, David; Krumboltz, John; Lazarus, Arnold

    2006-01-01

    This article explores the existence of humor in counseling from the perspectives of several leaders in the field. Specifically, the last 5 authors describe some of their thoughts and experiences regarding the emergence of humor in counseling.

  17. Beyond Spaces of Counselling

    DEFF Research Database (Denmark)

    Bank, Mads; Nissen, Morten

    2015-01-01

    The article articulates experiments with spatial constructions in two Danish social work agencies, basing on a) a sketchy genealogical reconstruction of conceptualisations and uses of space in social work and counselling; b) a search for theoretical resources to articulate new spaces, and c) data...... from a long-standing collaboration with the social workers. Beside the classical disciplinary and pastoral spaces, we find spaces of attunement, spaces of production, and public spaces as forms of spatialisations which might be taken as prototypical in attempts to develop social work and counselling....

  18. 38 CFR 21.5100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.5100.... Chapter 32 Counseling § 21.5100 Counseling. (a) Purpose. The purpose of counseling is: (1) To assist in... of counseling. Counseling assistance in available for— (1) Identifying and removing reasons...

  19. Abraham Maslow's Legacy for Counseling.

    Science.gov (United States)

    Hoffman, Edward

    1990-01-01

    Reviews the life of Abraham Maslow, a key founder of the humanistic approach to counseling, and his contributions to the counseling field. Maintains that Maslow's innovative work was often misinterpreted by both his admirers and his critics, yet remains highly relevant to current concerns in counseling. (Author/PVV)

  20. Group Counselling for Problem Gambling.

    Science.gov (United States)

    Coman, Gregory J.; Evans, Barry J.; Burrows, Graham D.

    2002-01-01

    Group counseling has been used to assist individuals to overcome difficulties associated with problem gambling behavior; however, there are few reports of this application in the clinical and research literature. This paper provides a brief review of group counseling, and describes the application of group counseling to assist individuals with…

  1. Do Counseling and Marketing Mix?

    Science.gov (United States)

    Fong-Beyette, Margaret L.

    1988-01-01

    Responds to Wittman's previous article on counseling and marketing by discussing concerns about two of Wittman's purposes for use of marketing: improved services in consumers and economic survival of counseling profession. Agrees that counseling profession needs to understand basic marketing principles used by business and health care industry;…

  2. Anonymously Productive and Socially Engaged While Learning at Work

    Science.gov (United States)

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  3. Knowledge Sharing Systems: Advantages of Public Anonymity and Private Accountability

    Science.gov (United States)

    Davis, Sarah

    2003-01-01

    This paper explores the benefits of the design elements of public anonymity and private accountability in classroom Knowledge Sharing Systems (KSS). The major findings of this study indicate that classroom KSS have the potential to allow for greater equity of input, reduce academic anxiety, increase teachers knowledge of student understanding …

  4. Who Goes There? Staying Anonymous on the Internet

    Science.gov (United States)

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  5. Provider Aware Anonymization Algorithm for Preserving M - Privacy

    Directory of Open Access Journals (Sweden)

    A. Usha Rani

    2014-07-01

    Full Text Available In this paper, we consider the collaborative data publishing problem for anonymizing horizontally partitioned data at multiple data providers. We consider a new type of “insider attack” by colluding data providers who may use their own data records (a subset of the overall data in addition to the external background knowledge to infer the data records contributed by other data providers. The paper addresses this new threat and makes several contributions. First, we introduce the notion of m-privacy, which guarantees that the anonymized data satisfies a given privacy constraint against any group of up to m colluding data providers. Second, we present heuristic algorithms exploiting the equivalence group monotonicity of privacy constraints and adaptive ordering techniques for efficiently checking m-privacy given a set of records. Finally, we present a data provider-aware anonymization algorithm with adaptive m- privacy checking strategies to ensure high utility and m-privacy of anonymized data with efficiency. Experiments on real-life datasets suggest that our approach achieves better or comparable utility and efficiency than existing and baseline algorithms while providing m-privacy guarantee.

  6. The Impact of Anonymization for Automated Essay Scoring

    Science.gov (United States)

    Shermis, Mark D.; Lottridge, Sue; Mayfield, Elijah

    2015-01-01

    This study investigated the impact of anonymizing text on predicted scores made by two kinds of automated scoring engines: one that incorporates elements of natural language processing (NLP) and one that does not. Eight data sets (N = 22,029) were used to form both training and test sets in which the scoring engines had access to both text and…

  7. Father-Daughter Incest: Data from an Anonymous Computerized Survey

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel V. S.; Kommor, Martin J.

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were…

  8. Online Role-Play: Anonymity, Engagement and Risk.

    Science.gov (United States)

    Bell, Maureen

    2001-01-01

    Discussion of role-play focuses on a case study of an asynchronous, anonymous online role-play at an Australian university within a WebCT bulletin board that was designed as an alternative to an existing face-to-face workshop to offer more flexible access for participants. Suggests further research needs. (Author/LRW)

  9. Role Engagement and Anonymity in Synchronous Online Role Play

    Directory of Open Access Journals (Sweden)

    Sarah Cornelius

    2011-06-01

    Full Text Available Role play activities provide opportunities for learners to adopt unfamiliar roles, engage in interactions with others, and get involved in realistic tasks. They are often recommended to foster the development of soft skills and a wider perspective of the world. Such activities are widely used as an online teaching approach, with examples ranging from the simple use of email to the employment of virtual worlds and Web 2.0 technologies.This paper provides a case study of a role play activity which employs real-time anonymous discussion forums and aims to improve our understanding of effective role play and the impact of anonymity. This role play has been effective in educating learners about different perspectives on the issue of Quality in Further Education. The context and implementation of the role play are outlined, and the learners’ interactions and experiences are explored using an investigative analysis of discussion transcripts and semi-structured interviews with participants. The findings suggest that role engagement and anonymity are important components for success in synchronous online role play. Evidence is presented that provides an insight into the factors which encourage role engagement, including prior experiences and contributions from peers. The impact of anonymity is also explored since many participants did not regard the study environment as real and attempted to identify their peers.

  10. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    A. van Drie; R.R. Ganzevoort; M. Spiering

    2013-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria o

  11. Attitudes toward Spirituality and the Core Principles of Alcoholics Anonymous

    Science.gov (United States)

    Davis, S. J.; Benshoff, John J.; Koch, D. Shane

    2006-01-01

    One-hundred and fifty-one students enrolled in substance abuse counselor training classes were surveyed on their attitudes about spirituality in substance abuse treatment and their beliefs about the principles of Alcoholics Anonymous (AA). Significant correlations were found between the subjects' spirituality and their attitudes toward…

  12. Anonymity versus Perceived Patron Identity in Virtual Reference Transcripts

    Science.gov (United States)

    Roper, Kristin Grabarek; Sobel, Karen

    2012-01-01

    Librarians who provide virtual reference services often perceive that their patrons self-identify to some degree, even when transactions are anonymous. They also develop a sense of patrons' greatest research-related needs over time. In this article, two librarians analyze two years' worth of virtual reference transcripts to determine what patrons…

  13. "Un-Googling” publications: The ethics and problems of anonymization

    DEFF Research Database (Denmark)

    Shklovski, Irina; Vertesi, Janet

    2013-01-01

    to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...

  14. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  15. A Generic Framework for Anonymous Authentication in Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Jing Xu; Wen-Tao Zhu

    2013-01-01

    Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication,processing and storage capabilities.In this paper,we present a generic construction that converts any existing secure password authentication scheme based on a smart card into an anonymous authentication scheme for roaming services.The security proof of our construction can be derived from the underlying password authentication scheme employing the same assumptions.Compared with the original password authentication scheme,the transformed scheme does not sacrifice the authentication efficiency,and additionally,an agreed session key can be securely established between an anonymous mobile user and the foreign agent in charge of the network being visited.Furthermore,we present an instantiation of the proposed generic construction.The performance analysis shows that compared with other related anonymous authentication schemes,our instantiation is more efficient.

  16. Policy-Aware Sender Anonymity in Location-Based Services

    Science.gov (United States)

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  17. ANONYMOUS OFF-LINE ELECTRONIC PAYMENT SYSTEM WITH MULTIPLE BANKS

    Institute of Scientific and Technical Information of China (English)

    Liang Jian; Ao Qingyun; Chen Ying

    2001-01-01

    This letter presents an anonymous off-line electronic payment model with multiple issuing-banks and gives an implementation scheme based on the discrete logarithm problem and the random oracle model. Comparing with previous works, the proposed scheme benefits from no involvement of customer group authority and its security depends on the known difficulty of resolving general discrete logarithm problem.

  18. Improving Content Availability in the I2P Anonymous File-Sharing Environment

    OpenAIRE

    Timpanaro, Juan Pablo; Chrisment, Isabelle; Festor, Olivier

    2012-01-01

    Anonymous communication has gained more and more interest from Internet users as privacy and anonymity problems have emerged. Dedicated anonymous networks such as Freenet and I2P allow anonymous file-sharing among users. However, one major problem with anonymous file-sharing networks is that the available content is highly reduced, mostly with outdated files, and non-anonymous networks, such as the BitTorrent network, are still the major source of content: we show that in a 30-days period, 21...

  19. Counseling: New Directions

    Science.gov (United States)

    Dahm, John W.

    1974-01-01

    To achieve full professional maturity, counselors must begin the process of self-study and assess the direction and leadership that is developing within the profession. The acceptance and success of counseling in educational settings may depend on the degree to which counselors are change-oriented, team-oriented, and outcome-oriented. (Author)

  20. Buddhism and Counselling.

    Science.gov (United States)

    de Silva, Padmal

    1993-01-01

    Discusses the relevance of the principles and practices of Buddhism to the field of counseling. As Buddhism espouses the notion of a productive and healthy life, it offers ways of dealing with problems and difficulties, and of improving psychological well-being. Cites examples of relevant Buddhist techniques and their application. (JPS)

  1. First Cycle Counselling.

    Science.gov (United States)

    Darska, Anna

    1981-01-01

    Investigations are described that were carried out by the Centre d'Information de Documentation et d'Orientation of the Rene Descartes University to find an answer to the counseling problems arising from student admission, through coursework, and upon leaving the university to start a career. (Author/MLW)

  2. The Counseling & Guidance Curriculum.

    Science.gov (United States)

    Ediger, Marlow

    Counseling and guidance services are vital in any school curriculum. Counselors may themselves be dealing with students of diverse abilities and handicaps. Counselors may have to work with students affected by drug addiction, fetal alcohol syndrome, homelessness, poverty, Acquired Immune Deficiency Syndrome (AIDS) and divorce. Students may present…

  3. Evaluation Software in Counseling.

    Science.gov (United States)

    Sabella, Russell A.

    Counselors today are presented with a number of differing applications software. This article intends to advance the counselor's knowledge and considerations of the various aspects of application software. Included is a discussion of the software applications typically of help to counselors in (a) managing their work (computer managed counseling);…

  4. Multimodel Counseling: An Update.

    Science.gov (United States)

    Keat, Donald B., II, Ed.

    1982-01-01

    Contains six articles focusing on current developments in multimodal counseling. Topics addressed include multimodal methods of interviewing children, helping children with anger, and enhancing self-concept. Describes utilizing helping books with children, and the multimodal effect of physical exercise. (RC)

  5. Safe sex

    Science.gov (United States)

    Safe sex means taking steps before and during sex that can prevent you from getting an infection, or from ... the skin around the genital area. Before having sex: Get to know your partner and discuss your ...

  6. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace. PMID:24724731

  7. "I'd Be So Much More Comfortable Posting Anonymously": Identified versus Anonymous Participation in Student Discussion Boards

    Science.gov (United States)

    Roberts, Lynne D.; Rajah-Kanagasabai, Camilla J.

    2013-01-01

    Academic staff members encourage university students to use online student discussion boards within learning management systems to ask and answer questions, share information and engage in discussion. We explore the impact of anonymity on student posting behaviour. An online survey was completed by 131 second year undergraduate psychology students…

  8. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    OpenAIRE

    Youngsook Lee; Juryon Paik

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreig...

  9. Effects of data anonymization by cell suppression on descriptive statistics and predictive modeling performance.

    OpenAIRE

    Ohno-Machado, Lucila; Vinterbo, Staal; Dreiseitl, Stephan

    2001-01-01

    Protecting individual data in disclosed databases is essential. Data anonymization strategies can produce table ambiguation by suppression of selected cells. Using table ambiguation, different degrees of anonymization can be achieved, depending on the number of individuals that a particular case must become indistinguishable from. This number defines the level of anonymization. Anonymization by cell suppression does not necessarily prevent inferences from being made from the disclosed data. P...

  10. Counselling Psychology of Infertility

    OpenAIRE

    J.M. Perkins

    2006-01-01

    The central theme of this thesis is infertility. It links different areas of my work as a chartered counselling psychologist working with clients experiencing difficulties conceiving. I currently work in private practice specialising in this area. Previously I worked as an NF counsellor at the Assisted Conception Unit of the Lister Hospital in London. Although the term `infertility' is commonly used, being `infertile' means a total absence of reproductive function and this condition is rare (...

  11. Faculty mentoring programme--ways of reducing anonymity.

    Science.gov (United States)

    Woessner, R; Honold, M; Stehle, I; Stehr, S; Steudel, W I

    1998-07-01

    Increasing anonymity and the lack of personal contact between professor and student due to high enrolment is one of the major problems at German universities. Therefore, the Faculty of Medicine of the University of the Saarland started a pilot project in 1995. The intention was to reduce anonymity within the faculty by introducing a faculty mentoring programme (Studientutorium). A group of up to 12 students from different years is allocated a faculty member on a personal basis. The member responds to questions and problems concerning such areas as the curriculum, career planning or doctoral thesis as well as to personal problems. After 2 years participants were interviewed about the programme for the first time and the acceptance turned out to be high. PMID:9743811

  12. Anonymous Card Shuffling and its Applications to Parallel Mixnets

    CERN Document Server

    Goodrich, Michael T

    2012-01-01

    We study the question of how to shuffle $n$ cards when faced with an opponent who knows the initial position of all the cards {\\em and} can track every card when permuted, {\\em except} when one takes $K< n$ cards at a time and shuffles them in a private buffer "behind your back," which we call {\\em buffer shuffling}. The problem arises naturally in the context of parallel mixnet servers as well as other security applications. Our analysis is based on related analyses of load-balancing processes. We include extensions to variations that involve corrupted servers and adversarially injected messages, which correspond to an opponent who can peek at some shuffles in the buffer and who can mark some number of the cards. In addition, our analysis makes novel use of a sum-of-squares metric for anonymity, which leads to improved performance bounds for parallel mixnets and can also be used to bound well-known existing anonymity measures.

  13. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    Science.gov (United States)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-06-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  14. Secure Web Transaction with Anonymous Mobile Agent over Internet

    Institute of Scientific and Technical Information of China (English)

    WANG ChangJie(王常杰); ZHANG FangGuo(张方国); WANG YuMin(王育民)

    2003-01-01

    A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, a new secure anonymous mobile agent scheme is proposed for the prevention of agent tempering without compromising the mobility or autonomy of the agent. In the scheme, a mobile agent can produce valid signature on website's bid (it means to transact a contact with the web site) on behalf of its customer, without revealing the customer's real private key. In addition, the anonymity of the customer is also achieved when its agent transacts with the websites. Furthermore, the customer who issues a malicious agent or denies the transaction can be identified and detected by Agent Management Center (AMC). Therefore, the scheme is practical in the future electronic commerce over Internet.

  15. Anonymous voting for multi-dimensional CV quantum system

    Science.gov (United States)

    Rong-Hua, Shi; Yi, Xiao; Jin-Jing, Shi; Ying, Guo; Moon-Ho, Lee

    2016-06-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. Project supported by the National Natural Science Foundation of China (Grant Nos. 61272495, 61379153, and 61401519), the Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130162110012), and the MEST-NRF of Korea (Grant No. 2012-002521).

  16. Compromising Tor Anonymity Exploiting P2P Information Leakage

    CERN Document Server

    Manils, Pere; Blond, Stevens Le; Kaafar, Mohamed Ali; Castelluccia, Claude; Legout, Arnaud; Dabbous, Walid

    2010-01-01

    Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak information that may compromise the identity of its users. In this paper, we first present three attacks targeting BitTorrent users on top of Tor that reveal their real IP addresses. In a second step, we analyze the Tor usage by BitTorrent users and compare it to its usage outside of Tor. Finally, we depict the risks induced by this de-anonymization and show that users' privacy violation goes beyond BitTorrent traffic and contaminates other protocols such as HTTP.

  17. Rett syndrome molecular diagnosis and implications in genetic counseling

    Directory of Open Access Journals (Sweden)

    Noruzinia M

    2007-01-01

    Full Text Available Rett syndrome is a rare genetic X-linked dominant disorder. This syndrome is the most frequent cause of mental retardation in girls. In the classical form of the disease, the presenting signs and the course of development are characteristic. However clinical diagnosis can be very difficult when the expression is not in the classical form. Mutations in MeCP2 are responsible for 80% of cases. When MeCP2 mutation is found in an index case, genetic counseling is similar to that in other X-linked dominant genetic diseases. However, mutations in this gene can cause a spectrum of atypical forms. On the other hand, other genetic conditions like translocations, sex chromosome numerical anomalies, and mutations in other genes can complicate genetic counseling in this syndrome. We present the first case of molecular diagnosis of Rett syndrome in Iran and discuss the recent developments in its genetic counseling.

  18. Dovetail: Stronger Anonymity in Next-Generation Internet Routing

    OpenAIRE

    Sankey, Jody; Wright, Matthew,

    2014-01-01

    Current low-latency anonymity systems use complex overlay networks to conceal a user's IP address, introducing significant latency and network efficiency penalties compared to normal Internet usage. Rather than obfuscating network identity through higher level protocols, we propose a more direct solution: a routing protocol that allows communication without exposing network identity, providing a strong foundation for Internet privacy, while allowing identity to be defined in those higher leve...

  19. Structure and Anonymity of the Bitcoin Transaction Graph

    OpenAIRE

    Kay Hamacher; Micha Ober; Stefan Katzenbeisser

    2013-01-01

    The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network struc...

  20. Secure Logging of Retained Data for an Anonymity Service

    OpenAIRE

    KÖPSELL, Stefan; Švenda, Petr

    2010-01-01

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We have analyzed the newly arising risks associated with the process of accessing and storage of the retained data and propose a secure logging system, which utilizes cryptographic smart cards, trusted timestamping servers and distributed storage. These key components will allow for controlled access...

  1. Accountable Anonymous Service Usage in Mobile Communication Systems

    OpenAIRE

    Buttyan, Levente; Hubaux, Jean-Pierre

    1999-01-01

    We introduce a model that allows of anonymous yet accountable service usage in mobile communication systems. This model is based on the introduction of a new business role, called the customer care agency, and a ticket based mechanism for service access. We motivate the introduction of customer care agencies by analyzing their role and emphasizing their advantages. We introduce the general idea of ticket based service access, present a categorization of ticket types and ticket acquisi...

  2. Mobile Anonymous Trust Based Routing Using Ant Colony Optimization

    Directory of Open Access Journals (Sweden)

    R. Kalpana

    2012-01-01

    Full Text Available Problem statement: Ad hoc networks are susceptible to malicious attacks through denial of services, traffic analysis and spoofing. The security of the ad hoc routing protocol depends upon encryption, authentication, anonymity and trust factors. End-to-end security of data is provided by encryption and authentication, topology information of the nodes can be obtained by studying traffic and routing data. This security problem of ad hoc network is addressed by the use of anonymity mechanisms and trust levels. Identification information like traffic flow, network topology, paths from malicious attackers is hidden in anonymous networks. Similarly, trust plays a very important role in the intermediate node selection in ad hoc networks. Trust is essential as selfish and malicious nodes not only pose a security issue but also decreases the Quality of Service. Approach: In this study, a routing to address anonymous routing with a trust which improves the overall security of the ad hoc network was proposed. A new approach for an on demand ad-hoc routing algorithm, which was based on swarm intelligence. Ant colony algorithms were a subset of swarm intelligence and considered the ability of simple ants to solve complex problems by cooperation. The interesting point was, that the ants do not need any direct communication for the solution process, instead they communicate by stigmergy. The notion of stigmergy means the indirect communication of individuals through modifying their environment. Several algorithms which were based on ant colony problems were introduced in recent years to solve different problems, e.g., optimization problems. Results and Conclusion: It is observed that the overall security in the network improves when the trust factor is considered. It is seen that non performing nodes are not considered due to the proposed ACO technique.

  3. Anonymity in a Limit-Order Market: An Experimental Analysis

    OpenAIRE

    Majois, Christophe

    2008-01-01

    In this paper, we adopt an experimental approach to evaluate the impact of pre-trade anonymity in order-driven markets. More specifically, we build an experimental design of an electronic limit-order market, and compare two settings: one in which traders observe the identities of agents placing orders in the order book, and the other one where this information is not available on market screens. We find that ID code disclosure does not alter liquidity, efficiency or traders’ pr...

  4. Guaranteeing anonymity when sharing medical data, the Datafly System.

    OpenAIRE

    Sweeney, L.

    1997-01-01

    We present a computer program named Datafly that maintains anonymity in medical data by automatically generalizing, substituting, and removing information as appropriate without losing many of the details found within the data. Decisions are made at the field and record level at the time of database access, so the approach can be used on the fly in role-based security within an institution, and in batch mode for exporting data from an institution. Often organizations release and receive medic...

  5. On the Feasibility of (Practical) Commercial Anonymous Cloud Storage

    OpenAIRE

    Tobias Pulls; Daniel Slamanig

    2015-01-01

    Current de facto standard payment and billing models for commercial cloud storage services provide a plethora of information to the cloud provider about its clients. This leads to a hostile environment when seen from a privacy perspective. Motivated by recently leaked facts about large scale governmental surveillance efforts as well as the lack of privacy-preserving measures in existing commercial cloud storage services, in this paper, we investigate the feasibility of so called anonymous clo...

  6. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    Nováková, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  7. Discrimination and nepotism: the efficiency of the anonymity rule.

    OpenAIRE

    Fershtman, C.; Gneezy, U.; Verboven, Frank

    2002-01-01

    The Paper considers two categories of discrimination: ‘discrimination against’ and ‘discrimination in favour’, which Becker coins ‘nepotism’. The Paper develops an experimental test to distinguish between these two types of discrimination. The experiment compares the behaviour towards individuals of different groups with the behaviour towards anonymous individuals (those having no clear group affiliation). We illustrate the two attitudes by considering two segmented societies: Belgian society...

  8. Enhancing Censorship Resistance in the Tor Anonymity Network

    OpenAIRE

    Winter, Philipp

    2014-01-01

    Baksidestext The Tor network was originally designed as low-latency anonymity network.However, as the years progressed, Tor earned a reputation as also being a useful tool to circumvent Internet censorship. At times, the network counted 30,000 users only from China. Censors reacted by tightening their grip on the national communication infrastructure. In particular, they developed techniques to prevent people from being able to access the Tor network. This arms race now counts several iterati...

  9. An Analysis of Anonymity in the Bitcoin System

    CERN Document Server

    Reid, Fergal

    2011-01-01

    Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the oneto- many mapping between users and public-keys and associate information external to the system with the users. Bitcoin frustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approx...

  10. [E-research: problems with anonymity and consent].

    Science.gov (United States)

    Woolderink, Marla; van Asselt, Antoinette D I; van Schayck, Constant P; van Wijmen, Frans C B

    2013-01-01

    The Medical Research Involving Human Subjects Act (WMO) requires that participants in medical-scientific studies provide written consent. This requirement makes e-research (online research) unnecessarily difficult and sometimes impossible. Much of e-research involves online interventions that focus on sensitive issues such as sexual dysfunction, addiction and child abuse, for which anonymity is an important condition. WMO procedures, however, strictly interpret the word "written" as "on paper", and participants are not permitted to give consent by email, for example. A second requirement, which mainly makes studies among minors between the ages of 12 and 18 more difficult, is that both parents or the guardian must provide written consent. This undermines anonymity to such an extent that virtually no subjects remain. Participants in medical-scientific studies must always be identifiable to the investigator. But, apart from this, he/she should be possible to guarantee anonymity within the regulatory framework. There is good reason to adapt legal regulations to today's needs. PMID:24345359

  11. Anonymous and Non-Repudiation E-Payment Protocol

    Directory of Open Access Journals (Sweden)

    Sattar J. Aboud

    2007-01-01

    Full Text Available There are many proposals offer anonymous and non-repudiation e-payment protocols. But they have the drawbacks that the anonymity can be misused by fraudulent to perform a perfect crimes. Currently, the hot research concentrates on the accepting of e-payment protocols where the anonymity of the coins is cancelable via a trusted authority in the case of criminal entities. In the article we suggest an efficient protocol for e-payment scheme that offers a good level of security with appreciate to its efficiency. The proposed protocol prevents the blind office and the bank from impersonate an entity, so that the entity could not repudiate it when the entity misused a coin. Another benefit is that it is constructed from efficient cryptography schemes so that its security can simply be analyzed. The strength of this scheme is in its easiness. So, we claim that the suggested protocol is more efficient than the existing schemes, since it allows to both a blind office and a bank to impersonate an entity to find and to spend a coin without to be noticed. It might cause a repudiation difficulty where the entity can repudiate his bad activities by proposing that both the bank and the blind office acted inaccurately. Other relevant issues related to the new protocol will be discussed in the section of the security of the scheme.

  12. Reversible Anonymization of DICOM Images using Cryptography and Digital Watermarking

    Directory of Open Access Journals (Sweden)

    Lhoussain ELFADIL

    2012-04-01

    Full Text Available Digital Imaging and Communications in Medicine (DICOM is a standard for handling, storing, printing, and transmitting information in medical images. The DICOM file contains the image data and a number of attributes such as identified patient data (name, age, insurance ID card,…, and non-identified patient data (doctor’s interpretation, image type,…. Medical images serve not only for examination, but can also be used for research and education purposes. For research they are used to prevent illegal use of information; before authorizing researchers to use these images, the medical staff deletes all the data which would reveal the patient identity to prevent patient privacy. This manipulation is called anonymization. In this paper, we propose a reversible anonymization of DICOM images. Identifying patient data with image digest, computed by the well-known SHA-256 hash function, are encrypted using the proposed probabilistic public key crypto-system. After compressing the Least Significant Bit (LSB bitplan of the image using Hofmann coding algorithm, the encrypted data is inserted into a liberated zone of the LSB bitplan of the image. The proposed method allows researchers to use anonymous DICOM images and keep to authorized staff -if necessary- the possibility to return to the original image with all related patient data.

  13. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%. PMID:27091755

  14. 38 CFR 21.3102 - Required counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Required counseling. 21.... Chapter 35 Counseling § 21.3102 Required counseling. (a) Child. The VA counseling psychologist will provide counseling and assist in preparing the educational plan only if the eligible child or his or...

  15. 38 CFR 21.7100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.7100... Bill-Active Duty) Counseling § 21.7100 Counseling. A veteran or servicemember may receive counseling from VA before beginning training and during training. (a) Purpose. The purpose of counseling is (1)...

  16. The role of quasi-identifiers in k-anonymity revisited

    OpenAIRE

    Bettini, C.; Wang, X S; S. Jajodia

    2006-01-01

    The concept of k-anonymity, used in the recent literature to formally evaluate the privacy preservation of published tables, was introduced based on the notion of quasi-identifiers (or QI for short). The process of obtaining k-anonymity for a given private table is first to recognize the QIs in the table, and then to anonymize the QI values, the latter being called k-anonymization. While k-anonymization is usually rigorously validated by the authors, the definition of QI remains mostly inform...

  17. Reidentification and k-anonymity: a model for disclosure risk in graphs

    OpenAIRE

    Stokes, Klara; Torra, Vicenç

    2011-01-01

    In this article we provide a formal framework for reidentification in general. We define n-confusion as a concept for modelling the anonymity of a database table and we prove that n-confusion is a generalization of k- anonymity. After a short survey on the different available definitions of k- anonymity for graphs we provide a new definition for k-anonymous graph, which we consider to be the correct definition. We provide a description of the k-anonymous graphs, both for the regular and the n...

  18. HCV counselling in haemophilia care.

    Science.gov (United States)

    Miller, R; Telfer, P

    1996-01-01

    The many areas of uncertainty about HCV make counselling patients with haemophilia and HCV a challenge. In this review a brief summary is made of the current understanding of the natural history of hepatitis C infection, the modes of transmission, diagnostic techniques, and treatment options available. This forms a necessary background to counselling patients and their contacts. Some difficulties are highlighted and counselling guidelines about the disease with patients are suggested. PMID:27213897

  19. Using Bibliotheraphy in Adult Counseling

    OpenAIRE

    BULUT, Sefa

    2010-01-01

    In recent years bibliotherapy has become a popular approach and it has been commonly utilized in psychological counseling as a supplemental method to the traditional counseling techniques. Therefore, the purpose of this literature review was to introduce the bibliotherapy methods to the reader working in adults counseling settings. Bibliotherapy is aimed at changing the client’s faulty assumptions and cognitions and encouraging them by giving a task as reading articles, brochures or books. In...

  20. Counseling in Turkey: An Evolving Field

    Science.gov (United States)

    Stockton, Rex; Guneri, Oya Yerin

    2011-01-01

    This article provides a brief history of counseling and addresses the current issues and future trends of counseling in Turkey. Special emphasis is placed on the factors that impede the development of school counseling as a discipline.

  1. Addiction Counseling Accreditation: CACREP's Role in Solidifying the Counseling Profession

    Science.gov (United States)

    Hagedorn, W. Bryce; Culbreth, Jack R.; Cashwell, Craig S.

    2012-01-01

    In this article, the authors discuss the Council for Accreditation of Counseling and Related Educational Programs' (CACREP) role in furthering the specialty of addiction counseling. After sharing a brief history and the role of counselor certification and licensure, the authors share the process whereby CACREP developed the first set of…

  2. Understanding of Counseling Process: Cases of Malaysian Counseling Practitioners

    Directory of Open Access Journals (Sweden)

    Zakaria Mohamad

    2012-03-01

    Full Text Available Counselling should undergo a certain process to ensure that a counselling session would achieve its targeted goal. This article intends to analyze the understanding of Malaysian counsellors in light of the counselling process that they choose to conduct. To achieve this objective, six practising counsellors were chosen as participants for this research. Data collected through the methods of structured interviews using interview protocol which is thematically analysed by the NVivo 2 software. Results of the analysis showed that these counsellors understood the counselling process based on the theories that they were using. Besides, they followed several stages and levels in the counselling process with the awareness on the vital elements need to be considered in each process.

  3. A Counseling Plan for Randall.

    Science.gov (United States)

    Levinson, Edward M.

    1993-01-01

    Responds to case of head-injured former engineering college student who presented for career counseling following automobile accident, three months in coma, and four years of rehabilitation therapy. Discusses issues underlying provision of career counseling to individuals with brain injuries. Cites information needed for planning, explores major…

  4. Values in Counseling and Psychotherapy.

    Science.gov (United States)

    Patterson, C. H.

    1989-01-01

    Considers various ways that values enter into counseling or psychotherapy, with particular attention to goals of the process and methods or procedures by which counselor or therapist implements process. Suggests approach to counseling and psychotherapy that recognizes and incorporates values basic to democratic philosophy and the goal of…

  5. Defense Mechanisms in Group Counseling.

    Science.gov (United States)

    Clark, Arthur J.

    1992-01-01

    Presents considerations and strategies for conceptualizing, recognizing, and modifying defense mechanisms through the group counseling process. Provides awareness of defense mechanisms in planning for and implementation of group counseling, describes interaction patterns for identifying defenses among group participants, and clarifies modification…

  6. Ethical Considerations for Internet Counseling.

    Science.gov (United States)

    Attridge, William C.

    With the advent of new technologies, the possibility for providing quality, Internet-based, therapeutic counseling services becomes more attainable and realistic every year. Since the National Board for Certified Counselors announced the adoption of voluntary standards for the practice of Internet-based counseling, a new dimension has been added…

  7. Group Counseling for Navy Children.

    Science.gov (United States)

    Mitchum, Nancy Taylor

    1991-01-01

    Conducted six-session group counseling program for Navy children (n=22) enrolled in public schools whose fathers were on deployment. Pretest and posttest scores on the Coopersmith Self-Esteem Inventory suggest that participation in the group counseling unit positively affected self-esteem of Navy children whose fathers were on deployment. Found…

  8. Physical Attractiveness and Counseling Skills.

    Science.gov (United States)

    Vargas, Alice M.; Borkowski, John G.

    1982-01-01

    Searched for interaction between quality of counseling skills (presence or absence of empathy, genuineness, and positive regard) and physical attractiveness as determinants of counseling effectiveness. Attractiveness influenced perceived effectiveness of counselor's skill. Analyses of expectancy data revealed that only with good skills did…

  9. School Counseling in China Today

    Science.gov (United States)

    Thomason, Timothy C.; Qiong, Xiao

    2008-01-01

    This article provides a brief overview of the development of psychological thinking in China and social influences on the practice of school counseling today. Common problems of students are described, including anxiety due to pressure to perform well on exams, loneliness and social discomfort, and video game addiction. Counseling approaches used…

  10. Does Counseling Need the Mind?

    Science.gov (United States)

    Kernes, Jerry L.

    2008-01-01

    In this article, the author argues that the language used in counseling practice is largely a common sense language using mentalistic words. Basic mentalistic assumptions and challenges to those assumptions are outlined. The practical consequences of retaining or discarding mentalism in counseling are discussed. The author concludes that…

  11. Qualitative Research in Rehabilitation Counseling

    Science.gov (United States)

    Hanley-Maxwell, Cheryl; Al Hano, Ibrahim; Skivington, Michael

    2007-01-01

    Qualitative research approaches offer rehabilitation scholars and practitioners avenues into understanding the lives and experiences of people with disabilities and those people and systems with whom they interact. The methods used often parallel those used in counseling and appear to be well matched with the field of rehabilitation counseling.…

  12. Breastfeeding counsel against cancers

    Directory of Open Access Journals (Sweden)

    Prameela Kannan Kutty

    2016-05-01

    Full Text Available The anticancer potential by breastfeeding is not fully tapped in the light of the present knowledge of the subject. Literature indicates that breastmilk has anticancer action but may underestimate its full capacity. The protective spectrum within breastmilk hints on the need for a more comprehensive understanding of it as an anticancer tool. Exclusive breastfeeding could confer protection from carcinogenesis with a greater impact than realised. A literature review was conducted using four electronic databases. Selected areas were extracted after thorough perusal of the articles. The uninitiated would take exclusive breastfeeding seriously if actively counselled as an anticancer tool. Advice on details of the breastfeeding process and holistic information on breastfeeding may endow a greater impact among the skeptics. Counselling the breastfeeding mother on information sometimes not imparted, such as on maternal nutrition, details of the process of breastfeeding, benefits of direct breastfeeding versus milk expression and her psychosocial well being may make a difference in optimising anticancer action that exists in breastmilk. Additionally, its anticancer potential provides a platform to universally improve physical and psychosocial well being of women who breastfeed. Statistics of protection by breastfeeding in some maternal and childhood cancers are evident. “Bio-geno-immuno-nutrition” of breastmilk may shield the mother and infant from carcinogenesis in more ways than appreciated. The molecular basis of mother-to-infant signals and their “energies” need to be researched. Breastfeeding as a modifiable behaviour provides cost effective nutrition with potential for both cancer immunoprophylaxis and immunotherapy.

  13. Breastfeeding counsel against cancers

    Institute of Scientific and Technical Information of China (English)

    Prameela Kannan Kutty

    2016-01-01

    The anticancer potential by breastfeeding is not fully tapped in the light of the present knowledge of the subject. Literature indicates that breastmilk has anticancer action but may underestimate its full capacity. The protective spectrum within breastmilk hints on the need for a more comprehensive understanding of it as an anticancer tool. Exclusive breastfeeding could confer protection from carcinogenesis with a greater impact than realised. A literature review was conducted using four electronic databases. Selected areas were extracted after thorough perusal of the articles. The uninitiated would take exclusive breastfeeding seriously if actively counselled as an anticancer tool. Advice on details of the breastfeeding process and holistic information on breastfeeding may endow a greater impact among the skeptics. Counselling the breastfeeding mother on information sometimes not imparted, such as on maternal nutrition, details of the process of breast-feeding, benefits of direct breastfeeding versus milk expression and her psychosocial well being may make a difference in optimising anticancer action that exists in breastmilk. Additionally, its anticancer potential provides a platform to universally improve physical and psychosocial well being of women who breastfeed. Statistics of protection by breastfeeding in some maternal and childhood cancers are evident. “Bio-geno-immuno-nutrition” of breastmilk may shield the mother and infant from carcinogenesis in more ways than appreciated. The molecular basis of mother-to-infant signals and their “en-ergies” need to be researched. Breastfeeding as a modifiable behaviour provides cost effective nutrition with potential for both cancer immunoprophylaxis and immunotherapy.

  14. A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION

    Directory of Open Access Journals (Sweden)

    Manabu Okamoto

    2011-10-01

    Full Text Available Electronic voting is an important application for security protocols. Most existing voting schemes aredesigned for elections in which each voter has only one ballot. However, some elections permit voters tocast multiple ballots. In this paper, we present a new voting scheme in which each voter can havemultiple ballots, and can vote for multiple candidates. The proposed scheme allows the voter to simplypick their candidates and post a single encrypted message. Anonymous distribution of secret informationis used so that no one knows which information is being passed to whom.

  15. Distributed anonymous function computation in information fusion and multiagent systems

    CERN Document Server

    Hendrickx, Julien M; Tsitsiklis, John N

    2009-01-01

    We propose a model for deterministic distributed function computation by a network of identical and anonymous nodes, with bounded computation and storage capabilities that do not scale with the network size. Our goal is to characterize the class of functions that can be computed within this model. In our main result, we exhibit a class of non-computable functions, and prove that every function outside this class can at least be approximated. The problem of computing averages in a distributed manner plays a central role in our development.

  16. Virtues and Perils of Anonymity: Should Intermediaries Bear the Burden?

    OpenAIRE

    Zingales, Nicolo

    2014-01-01

    On October 10, 2013, the Chamber of the European Court of Human Rights (ECtHR) handed down a judgment (Delfi v. Estonia) condoning Estonia for a law which, as interpreted, held a news portal liable for the defamatory comments of its users. Amongst the considerations that led the Court to find no violation of freedom of expression in this particular case were, above all, the inadequacy of the automatic screening system adopted by the website and the users’ option to post their comments anonym...

  17. Business Information Exchange System with Security, Privacy, and Anonymity

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-01-01

    Full Text Available Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

  18. Deindividuation, anonymity, and violence: findings from Northern Ireland.

    Science.gov (United States)

    Silke, Andrew

    2003-08-01

    The author examined the relation between anonymity and aggression in violent interpersonal assaults that occurred in Northern Ireland. Of the 500 violent attacks that the author studied, 206 were carried out by offenders who wore disguises to mask their identities. The findings revealed that significant positive relationships existed between the use of disguises and several measures of aggression. Disguised offenders inflicted more serious physical injuries, attacked more people at the scene, engaged in more acts of vandalism, and were more likely to threaten victims after the attacks. The author discussed these results within the framework of deindividuation theory. PMID:12934837

  19. Quantum anonymous ranking based on the Chinese remainder theorem

    Science.gov (United States)

    Lin, Song; Guo, Gong-De; Huang, Feng; Liu, Xiao-Fen

    2016-01-01

    In this paper, an efficient quantum anonymous ranking protocol with single particles is proposed. A semitrusted server is introduced to help multiple users achieve this secure task. At the end of the protocol, each user can obtain the rankings of his private data, and keep these data secret. The Chinese remainder theorem is utilized to reduce the level of signal particles and to improve the efficiency of the presented protocol. Meanwhile, a secret transmission order of the signal particles is used to keep the traveling particles secure. Finally, we discuss the security of this protocol and prove it to be secure against certain common attacks under ideal conditions.

  20. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  1. HIV infection and syphilis prevalence among men who have sex with men receiving voluntary counseling and testing appointed through a web-based registering system and related factors%互联网预约检测的男男性行为者HIV、梅毒感染状况及相关因素分析

    Institute of Scientific and Technical Information of China (English)

    吴琼苗; 程伟彬; 钟斐; 徐慧芳; 刘奇; 林鹏

    2015-01-01

    目的 了解通过互联网预约检测MSM的HIV、梅毒感染状况,分析其相关影响因素.方法 对广州市2011-2012年通过互联网预约自愿前来进行HIV和梅毒抗体检测的MSM进行问卷调查和血清学检测,内容包括研究对象的社会人口学、行为学资料及HIV/梅毒抗体检测结果,采用logistic回归方法分析HIV/梅毒感染的相关影响因素.结果 共调查4 904名MSM,平均年龄(28.77±7.24)岁,大专及以上学历占70.3%;未婚占72.7%;HIV和梅毒抗体阳性检出率分别为8.7%(429/4904)和4.4%(214/4 904),HIV合并梅毒感染率为1.2%(59/4904).约1/3调查对象最近一次与男性发生性行为时未使用安全套,43.5%最近3个月与男性发生性行为不能坚持每次使用安全套.多因素logistic回归分析结果显示:文化程度低、职业(工人或农民)、最近3个月与男性发生性行为不能坚持使用安全套、既往是否做过HIV检测以及感染梅毒与HIV感染相关联;年龄(≥40岁)、文化程度低、最近3个月的男性性伴数(≥10个)及感染HIV与梅毒感染相关联.结论 基于互联网预约检测的MSM,危险性行为发生率和HIV感染率较高,既往HIV检测率较低.应加大应用互联网检测动员,开发针对低文化、高年龄MSM的干预措施.%Objective To understand the human immunodeficiency virus (HIV) infection status and syphilis prevalence among men who have sex with men (MSM) receiving voluntary counseling and testing appointed through a web-based registering system and related factors.Methods The MSM receiving web appointed HIV counseling and testing from 2011 to 2012 in Guangzhou were recruited and a questionnaire survey was conduct among them to obtain the information about their demographic characteristics and sexual behavior.Binary and multivariate logistic regression model were used to identify the factors associated with HIV infection or syphilis prevalence.Results A total of 4 904 MSM were enrolled

  2. Sex Stereotype

    Institute of Scientific and Technical Information of China (English)

    倪媛

    2014-01-01

    This paper analyzes the social phenomenon—sex stereotype.The paper illustrates the characteristics of stereotype and discusses about the factors which influence sex stereotypes and the reasons of its existence.And it also found the positive role that sex stereotype plays in the communication.

  3. Characteristics of US Health Care Providers Who Counsel Adolescents on Sports and Energy Drink Consumption

    Directory of Open Access Journals (Sweden)

    Nan Xiang

    2014-01-01

    Full Text Available Objective. To examine the proportion of health care providers who counsel adolescent patients on sports and energy drink (SED consumption and the association with provider characteristics. Methods. This is a cross-sectional analysis of a survey of providers who see patients ≤17 years old. The proportion providing regular counseling on sports drinks (SDs, energy drinks (EDs, or both was assessed. Chi-square analyses examined differences in counseling based on provider characteristics. Multivariate logistic regression calculated adjusted odds ratios (aOR for characteristics independently associated with SED counseling. Results. Overall, 34% of health care providers regularly counseled on both SEDs, with 41% regularly counseling on SDs and 55% regularly counseling on EDs. On adjusted modeling regular SED counseling was associated with the female sex (aOR: 1.44 [95% CI: 1.07–1.93], high fruit/vegetable intake (aOR: 2.05 [95% CI: 1.54–2.73], family/general practitioners (aOR: 0.58 [95% CI: 0.41–0.82] and internists (aOR: 0.37 [95% CI: 0.20–0.70] versus pediatricians, and group versus individual practices (aOR: 0.59 [95% CI: 0.42–0.84]. Modeling for SD- and ED-specific counseling found similar associations with provider characteristics. Conclusion. The prevalence of regular SED counseling is low overall and varies. Provider education on the significance of SED counseling and consumption is important.

  4. Novel associations in disorders of sex development: findings from the I-DSD registry

    OpenAIRE

    Cox, Kathryn; Bryce, Jillian; Jiang, Jipu; Rodie, Martina; Sinnott, Richard; Alkhawari, Mona; Arlt, Wiebke; Audi, Laura; Balsamo, Antonio; Bertelloni, Silvano; Cools, Martine; Darendeliler, Feyza; Drop, Stenvert; Ellaithi, Mona; Guran, Tulay

    2014-01-01

    Context: The focus of care in disorders of sex development (DSD) is often directed to issues related to sex and gender development. In addition, the molecular etiology remains unclear in the majority of cases. Objective: To report the range of associated conditions identified in the international DSD (I-DSD) Registry. Design, Setting, and Patients: Anonymized data were extracted from the I-DSD Registry for diagnosis, karyotype, sex of rearing, genetic investigations, and associ...

  5. The end of donor anonymity: how genetic testing is likely to drive anonymous gamete donation out of business.

    Science.gov (United States)

    Harper, Joyce C; Kennett, Debbie; Reisel, Dan

    2016-06-01

    Thousands of people worldwide have been conceived using donor gametes, but not all parents tell their children of their origin. Several countries now allow donor-conceived offspring to potentially know their genetic parent if they are informed of their donor-conceived status. At the same time, personal genetic testing is a rapidly expanding field. Over 3 million people have already used direct-to-consumer genetic testing to find information about their ancestry, and many are participating in international genetic genealogy databases that will match them with relatives. The increased prevalence of these technologies poses numerous challenges to the current practice of gamete donation. (i) Whether they are donating in a country that practices anonymous donation or not, donors should be informed that their anonymity is not guaranteed, as they may be traced if their DNA, or that of a relative, is added to a database. (ii) Donor-conceived adults who have not been informed of their status may find out that they are donor-conceived. (iii) Parents using donor conception need to be fully informed that their children's DNA will identify that they are not the biological parents and they should be encouraged to disclose the use of donor gametes to their children. Together, these concerns make urgent a wide-ranging societal conversation about how to best safeguard and promote the interests of donor-conceived offspring and protect the rights of donors. Specifically, there is a need to ensure that new genetic information is communicated in a way that promotes both the safety and the privacy rights of offspring and donors alike. All parties concerned must be aware that, in 2016, donor anonymity does not exist. PMID:27073260

  6. Quantum anonymous voting with unweighted continuous-variable graph states

    Science.gov (United States)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-08-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  7. Private anonymous fingerprinting for color images in the wavelet domain

    Science.gov (United States)

    Abdul, W.; Gaborit, P.; Carré, P.

    2010-01-01

    An online buyer of multimedia content does not want to reveal his identity or his choice of multimedia content whereas the seller or owner of the content does not want the buyer to further distribute the content illegally. To address these issues we present a new private anonymous fingerprinting protocol. It is based on superposed sending for communication security, group signature for anonymity and traceability and single database private information retrieval (PIR) to allow the user to get an element of the database without giving any information about the acquired element. In the presence of a semi-honest model, the protocol is implemented using a blind, wavelet based color image watermarking scheme. The main advantage of the proposed protocol is that both the user identity and the acquired database element are unknown to any third party and in the case of piracy, the pirate can be identified using the group signature scheme. The robustness of the watermarking scheme against Additive White Gaussian Noise is also shown.

  8. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought. PMID:22908618

  9. Quantum anonymous voting with unweighted continuous-variable graph states

    Science.gov (United States)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-05-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  10. IdentiDroid: Android can finally Wear its Anonymous Suit

    Directory of Open Access Journals (Sweden)

    Bilal Shebaro

    2014-04-01

    from applications when the smartphone is used under the anonymous modality. They are re-instated back when the smartphone returns to work in the normal modality. In addition, both solutions offer protection from applications that identify their users through traces left in the application's data storage or through exchanging identifying data messages. We developed IdentiDroid, a customized Android operating system, to deploy these solutions and built IdentiDroid Profile Manager, a profile-based configuration tool that allows one to set different configurations for each installed Android application. With this tool, applications running within the same device are configured to be given different identifications and privileges to limit the uniqueness of device and user information. We analyzed 250 Android applications to determine what information, services, and permissions can identify users and devices. Our experiments show that when IdentiDroid is deployed and properly configured on Android devices, users' anonymity is better guaranteed by either of the proposed solutions with no significant impact on most device applications.

  11. Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments

    OpenAIRE

    Youngseok Chung; Seokjin Choi; Dongho Won

    2015-01-01

    Authentication and privacy protection are important security mechanisms for keeping things safe in the Internet of Things environments. In particular, an anonymous authentication scheme is a privacy preserving authentication technique which provides both authentication and privacy preservation. An authentication scheme with anonymity in mobility networks was proposed recently. However, it was proven that it failed to provide anonymity against passive adversaries and malicious users and securi...

  12. AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems

    OpenAIRE

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first p...

  13. A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards

    Institute of Scientific and Technical Information of China (English)

    LU Rong-xing; CAO Zhen-fu; SU Ren-wang

    2006-01-01

    Remote user authentication is essential in distributed network environment to protect unauthorized access of a networked system. However, most of those existing remote user authentication schemes have not provided the user identity anonymity, while user anonymity is particularly important in some practical applications.Therefore, based on self-encryption mechanism, a new remote user authentication scheme was proposed. The scheme not only has no need of maintaining a password table at the remote server, but also can protect the user's anonymity.

  14. Cross-Cultural Counseling: A Multivariate Analysis

    Science.gov (United States)

    Ridley, Charles R.

    1978-01-01

    The complexity of the cross-cultural counseling and psychotherapy encounter is examined, with particular reference to four prominent variables: (1) views of mental health; (2) goals of counseling; (3) roles of counseling participants; and (4) counseling strategies. (Author/MJB)

  15. 38 CFR 21.8100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.8100... Vietnam Veterans-Spina Bifida and Covered Birth Defects Counseling § 21.8100 Counseling. An eligible child requesting or receiving services and assistance under this subpart will receive professional counseling by...

  16. 38 CFR 21.100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.100... Counseling § 21.100 Counseling. (a) General. A veteran requesting or being furnished assistance under Chapter 31 shall be provided professional counseling services by Vocational Rehabilitation and Employment...

  17. 34 CFR 685.304 - Counseling borrowers.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Counseling borrowers. 685.304 Section 685.304 Education... Direct Loan Program Schools § 685.304 Counseling borrowers. (a) Entrance counseling. (1) Except as provided in paragraph (a)(8) of this section, a school must ensure that entrance counseling is...

  18. 38 CFR 21.7600 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.7600...) VOCATIONAL REHABILITATION AND EDUCATION Educational Assistance for Members of the Selected Reserve Counseling § 21.7600 Counseling. A reservist may receive counseling from VA before beginning training and...

  19. 38 CFR 21.9580 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.9580...) VOCATIONAL REHABILITATION AND EDUCATION Post-9/11 GI Bill Counseling § 21.9580 Counseling. An individual may receive counseling from VA before beginning training and during training. VA will apply the provisions...

  20. 28 CFR 550.43 - Drug counseling.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Drug counseling. 550.43 Section 550.43... Drug Services (Urine Surveillance and Counseling for Sentenced Inmates in Contract CTCs) § 550.43 Drug counseling. (a) Drug counseling shall be provided to sentenced inmates in contract community...

  1. 24 CFR 214.300 - Counseling services.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Counseling services. 214.300... HOUSING COUNSELING PROGRAM Program Administration § 214.300 Counseling services. (a) Basic requirements. (1) Agencies must provide counseling to current and potential homeowners and tenants to assist...

  2. 38 CFR 21.6100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.6100... Recipients Counseling § 21.6100 Counseling. General. A veteran requesting or being furnished assistance under this temporary program shall be provided professional counseling services by the...

  3. Online Counseling: New Entity, New Challenges

    Science.gov (United States)

    Barnett, Jeffrey E.

    2005-01-01

    Mallen, Vogel, and colleagues explore the developing field of online counseling from the unique perspective of counseling psychology. They examine the body of available research and relevant clinical, ethical, legal, and practical issues and make recommendations for counseling psychologists who desire to participate in online counseling. This…

  4. 13 CFR 113.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials. 113.425 Section 113.425 Business Credit and Assistance SMALL BUSINESS... Activities Prohibited § 113.425 Counseling and use of appraisal and counseling materials. (a) Counseling....

  5. 38 CFR 23.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 23.425 Section 23.425 Pensions, Bonuses, and Veterans' Relief DEPARTMENT... Activities Prohibited § 23.425 Counseling and use of appraisal and counseling materials. (a) Counseling....

  6. 24 CFR 3.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling materials. 3.425 Section 3.425 Housing and Urban Development Office of the Secretary, Department... Activities Prohibited § 3.425 Counseling and use of appraisal and counseling materials. (a) Counseling....

  7. 14 CFR 1253.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials. 1253.425 Section 1253.425 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE... § 1253.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient...

  8. 31 CFR 28.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 28.425 Section 28.425 Money and Finance: Treasury Office of the Secretary of the....425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall...

  9. 29 CFR 36.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Counseling and use of appraisal and counseling materials. 36... in Education Programs or Activities Prohibited § 36.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis...

  10. 18 CFR 1317.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling materials. 1317.425 Section 1317.425 Conservation of Power and Water Resources... Activities Prohibited § 1317.425 Counseling and use of appraisal and counseling materials. (a) Counseling....

  11. School counselling in Canada and Japan

    OpenAIRE

    Niizeki, Sae

    2005-01-01

    This paper compares the Japanese and Canadian education systems and their school guidance and counselling programs. The author first provides a Canadian example of a comprehensive school counselling program. Contextual and historical issues from the Japanese counselling and educational system are then examined. Finally, implications for both the Canadian and Japanese counselling systems are examined. How cultural differences are addressed and what is most needed in the Japanese school counsel...

  12. Medical Specialty Counseling: A Survey

    Science.gov (United States)

    Zimny, George H.; Senturia, Audrey G.

    1973-01-01

    The survey asked the following questions: describe what you do to assist students in resolving their problem of selecting a medical specialty, and what is your reaction to the proposed medical counseling service. (Author)

  13. HUD Approved Housing Counseling Agencies

    Data.gov (United States)

    Department of Housing and Urban Development — HUD sponsors housing counseling agencies throughout the country that can provide advice on buying a home, renting, defaults, foreclosures, and credit issues. This...

  14. Change in Child Multimodal Counseling.

    Science.gov (United States)

    Keat, Donald B., II

    1990-01-01

    Examines some of the effective ingredients of change in multimodal counseling with children: personal relationships; emotions; guidance of actions, behaviors, and consequences; imagery; health; learning; and need to know. (ABL)

  15. Anonymity in the Wild: Mixes on unstructured networks

    CERN Document Server

    Nagaraja, Shishir

    2007-01-01

    As decentralized computing scenarios get ever more popular, unstructured topologies are natural candidates to consider running mix networks upon. We consider mix network topologies where mixes are placed on the nodes of an unstructured network, such as social networks and scale-free random networks. We explore the efficiency and traffic analysis resistance properties of mix networks based on unstructured topologies as opposed to theoretically optimal structured topologies, under high latency conditions. We consider a mix of directed and undirected network models, as well as one real world case study -- the LiveJournal friendship network topology. Our analysis indicates that mix-networks based on scale-free and small-world topologies have, firstly, mix-route lengths that are roughly comparable to those in expander graphs; second, that compromise of the most central nodes has little effect on anonymization properties, and third, batch sizes required for warding off intersection attacks need to be an order of ma...

  16. ANDaNA: Anonymous Named Data Networking Application

    CERN Document Server

    DiBenedetto, Steven; Tsudik, Gene; Uzun, Ersin

    2011-01-01

    Content-centric networking -- also known as information-centric networking (ICN) -- shifts emphasis from hosts and interfaces (as in today's Internet) to data. Named data becomes addressable and routable, while locations that currently store that data become irrelevant to applications. Named Data Networking (NDN) is a large collaborative research effort that exemplifies the content-centric approach to networking. NDN has some innate privacy-friendly features, such as lack of source and destination addresses on packets. However, as discussed in this paper, NDN architecture prompts some privacy concerns mainly stemming from the semantic richness of names. We examine privacy-relevant characteristics of NDN and present an initial attempt to achieve communication privacy. Specifically, we design an NDN add-on tool, called ANDaNA, that borrows a number of features from Tor. As we demonstrate via experiments, it provides comparable anonymity with lower relative overhead.

  17. Protecting whistle-blowers: Anonymity on the internet

    International Nuclear Information System (INIS)

    Even though strict legislation exists in many countries, it appears that the next few years should be a golden opportunity for groups to successfully monitor and publish the activity of the nuclear states, and human right violations through use of the Internet. The reasons for this are: 1. The Internet is becoming widespread even in repressive regimes; 2. Software is available to either hide messages from others or hide the mailers account; 3. Information from sites in other countries can be easily obtained to be read inside repressive regimes from the Internet. In this regard It is suggested the Pugwash or a similar organization should set up either an anonymous account to receive information or maybe use a more heavily protected cyperpunk remailer. Such an ability would hopefully prompt more people to notify treaty violations

  18. Anonymization of Electronic Medical Records to Support Clinical Analysis

    CERN Document Server

    Gkoulalas-Divanis, Aris

    2013-01-01

    Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for su...

  19. Adlerian Encouragement In Counseling Relationship

    OpenAIRE

    Ergün-Başak, Bircan; Ceyhan, Esra

    2011-01-01

    Encouragement in therapeutic relationship is a process for clients to construct hope and expectations related to realizing their goals. The main purpose of this literature review was to present Adlerian encouragement model and reveal the use of Adlerian encouragement, which can be used as a source in counseling applications. The literature was searched by using keywords such as “encouragement”, “counseling”, “positive psychology”, “social interest”, “counseling relationship” and “Adlerian app...

  20. Counseling Adult Sex Offenders: Unique Challenges and Treatment Paradigms.

    Science.gov (United States)

    Priest, Ronnie; Smith, Annalee

    1992-01-01

    Reviews current definitions and research literature related to characteristics of adults who sexually victimize children. Presents discussion of pedophilia as a sexual deviation. Examines treatment issues that may confront counselors engaged in treating adults who sexually victimize children and discusses implications for practitioners. (Author/NB)

  1. Confronting Sex in the Media: Implications and Counseling Recommendations

    Science.gov (United States)

    Ballam, Stacy M.; Granello, Paul F.

    2011-01-01

    The media greatly influences the sexual development of our youth and impacts society on a macro level. The messages that the media sends to our youth are contradictory to what families and professionals, such as educators and counselors, attempt to instill in our youth. This article addresses the urgent need for parents, educators, and counselors…

  2. Field-based video pre-test counseling, oral testing and telephonic post-test counseling: Implementation of an HIV field testing package among high-risk Indian men

    OpenAIRE

    Snyder, Hannah; Yeldandi, Vijay V.; Kumar, G. Prem; Liao, Chuanhong; Lakshmi, Vemu; Gandham, Sabitha R.; Muppudi, Uma; Oruganti, Ganesh; Schneider, John A

    2012-01-01

    In India, men who have sex with men (MSM) and truck drivers are high-risk groups that often do not access HIV testing due to stigma and high mobility. This study evaluated a field testing package (FTP) that identified HIV positive participants through video pre-test counseling, OraQuick oral fluid HIV testing, and telephonic post-test counseling and then connected them to government facilities. 598 MSM and truck drivers participated in the FTP and completed surveys covering sociodemographics,...

  3. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    Science.gov (United States)

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback. PMID:26879526

  4. Toward Analysis of the Relations Among the Youth Counterculture, Telephone Hotlines, and Anonymity

    Science.gov (United States)

    Baizerman, Michael

    1974-01-01

    During the 1960's, there emerged innovative human service programs for youth. Among the actual differences in these programs compared to their older, established human service agencies was (is) the prominent position of the social value of client anonymity. This anonymity is examined in an attempt to understand its role. (RC)

  5. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

    DEFF Research Database (Denmark)

    Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia

    computationally consistent, and provide a new scheme that is statistically consistent. We also provide a transform of an anonymous IBE scheme to a secure PEKS scheme that, unlike the previous one, guarantees consistency. Finally we suggest three extensions of the basic notions considered here, namely anonymous...

  6. The Risk of a Halo Bias as a Reason to Keep Students Anonymous during Grading

    Science.gov (United States)

    Malouff, John M.; Emmerton, Ashley J.; Schutte, Nicola S.

    2013-01-01

    Experts have advocated anonymous grading as a means of eliminating actual or perceived evaluator bias in subjective student assessment. The utility of anonymity in assessment rests on whether information derived from student identity can unduly influence evaluation. The halo effect provides a conceptual background for why a bias might occur. In…

  7. Preference for Anonymous Classroom Participation: Linking Student Characteristics and Reactions to Electronic Response Systems

    Science.gov (United States)

    Latham, Alyson; Hill, N. Sharon

    2014-01-01

    Electronic response systems (ERS) are a means to foster class participation by students who are reluctant to participate in class. In this study, we identify individual characteristics that relate to students' preference for anonymous classroom participation, and we also examine the extent to which preference for anonymity is related to their…

  8. Genetic Counseling Supervisors' Self-Efficacy for Select Clinical Supervision Competencies.

    Science.gov (United States)

    Finley, Sabra Ledare; Veach, Pat McCarthy; MacFarlane, Ian M; LeRoy, Bonnie S; Callanan, Nancy

    2016-04-01

    Supervision is a primary instructional vehicle for genetic counseling student clinical training. Approximately two-thirds of genetic counselors report teaching and education roles, which include supervisory roles. Recently, Eubanks Higgins and colleagues published the first comprehensive list of empirically-derived genetic counseling supervisor competencies. Studies have yet to evaluate whether supervisors possess these competencies and whether their competencies differ as a function of experience. This study investigated three research questions: (1) What are genetic counselor supervisors' perceptions of their capabilities (self-efficacy) for a select group of supervisor competencies?, (2) Are there differences in self-efficacy as a function of their supervision experience or their genetic counseling experience, and 3) What training methods do they use and prefer to develop supervision skills? One-hundred thirty-one genetic counselor supervisors completed an anonymous online survey assessing demographics, self-efficacy (self-perceived capability) for 12 goal setting and 16 feedback competencies (Scale: 0-100), competencies that are personally challenging, and supervision training experiences and preferences (open-ended). A MANOVA revealed significant positive effects of supervision experience but not genetic counseling experience on participants' self-efficacy. Although mean self-efficacy ratings were high (>83.7), participant comments revealed several challenging competencies (e.g., incorporating student's report of feedback from previous supervisors into goal setting, and providing feedback about student behavior rather than personal traits). Commonly preferred supervision training methods included consultation with colleagues, peer discussion, and workshops/seminars. PMID:26242467

  9. Challenging More Updates: Towards Anonymous Re-publication of Fully Dynamic Datasets

    CERN Document Server

    Li, Feng

    2008-01-01

    Most existing anonymization work has been done on static datasets, which have no update and need only one-time publication. Recent studies consider anonymizing dynamic datasets with external updates: the datasets are updated with record insertions and/or deletions. This paper addresses a new problem: anonymous re-publication of datasets with internal updates, where the attribute values of each record are dynamically updated. This is an important and challenging problem for attribute values of records are updating frequently in practice and existing methods are unable to deal with such a situation. We initiate a formal study of anonymous re-publication of dynamic datasets with internal updates, and show the invalidation of existing methods. We introduce theoretical definition and analysis of dynamic datasets, and present a general privacy disclosure framework that is applicable to all anonymous re-publication problems. We propose a new counterfeited generalization principle alled m-Distinct to effectively anon...

  10. Culture or anonymity? Differences in proposer behaviour in Korea and Germany.

    Science.gov (United States)

    Horak, Sven

    2015-10-01

    This study explores the proposer behaviour in an ultimatum game (UG) frame under anonymous and non-anonymous conditions among a Korean and German subject pool (n = 590) in comparison. Whereas the anonymous condition is represented by the standard UG, the non-anonymous condition integrates an aggregate of the Korean cultural context variables university affiliation, regional origin and seniority. The latter, a classic Confucian context variable, is measured by age differentials. The former two are impactful components of so-called Yongo networks, a unique Korean informal institution identical to Chinese Guanxi ties. Yongo networks, yet underrepresented in research, are said to be a central context variable to explain Korean social ties and decision-making behaviour. We observe significant differences between the offer behaviours of Korean and German subjects when exposing selected cultural variables. We argue that the behavioural differences observed are in fact due to culture not anonymity. PMID:25612150

  11. Anonimos: An LP based Approach for Anonymizing Weighted Social Network Graphs

    CERN Document Server

    Das, Sudipto; Abbadi, Amr El

    2010-01-01

    The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Anonymization of these social graphs is important to facilitate publishing these data sets for analysis by external entities. Prior work has concentrated mostly on node identity anonymization and structural anonymization. But with the growing interest in analyzing social networks as a weighted network, edge weight anonymization is also gaining importance. We present An\\'onimos, a Linear Programming based technique for anonymization of edge weights that preserves linear properties of graphs. Such properties form the foundation of many important graph-theoretic algorithms such as shortest paths problem, k-nearest neighbors, minimum cost spanning tree, and maximizing information spread. As a proof of concept, we apply An\\'onimos to the shortest paths problem and its extensions, prove the correctness, analyze complexity, and experimentally evaluate it using real social network data sets. O...

  12. Effects of a short individually tailored counselling session for HIV prevention in gay and bisexual men receiving Hepatitis B vaccination

    OpenAIRE

    Wolfers, Mireille; de Wit, John; Hospers, Harm Jan; Richardus, Jan Hendrik; De Zwart, Onno

    2009-01-01

    textabstractBackground. There is currently a trend towards unsafe unprotected anal intercourse (UAI) among men who have sex with men. We evaluated a short individual counselling session on reducing UAI among gay and bisexual men. Methods. A quasi-experimental design was used to evaluate the counselling session. This session was conducted during consulting hours at four municipal health clinics during a Hepatitis B vaccination campaign. These clinics offered free vaccination to high-risk group...

  13. Effects of a short individually tailored counselling session for HIV prevention in gay and bisexual men receiving Hepatitis B vaccination

    OpenAIRE

    Hospers Harm J; de Wit John BF; Wolfers Mireille EG; Richardus Jan H; de Zwart Onno

    2009-01-01

    Abstract Background There is currently a trend towards unsafe unprotected anal intercourse (UAI) among men who have sex with men. We evaluated a short individual counselling session on reducing UAI among gay and bisexual men. Methods A quasi-experimental design was used to evaluate the counselling session. This session was conducted during consulting hours at four municipal health clinics during a Hepatitis B vaccination campaign. These clinics offered free vaccination to high-risk groups, su...

  14. [Does really sex addiction exist?].

    Science.gov (United States)

    Echeburúa, Enrique

    2012-01-01

    Hypersexual Disorder has been proposed as a new psychiatric disorder for DSM-V, characterized by an increased frequency and intensity of sexually motivated fantasies, arousal, urges, and enacted behavior in association with an impulsivity component. Excessive appetitive and consummatory behaviors, including hypersexuality, can become a non-chemical addiction. Sexual addiction afflicts people having paraphilic or nonparaphilic behaviors associated with progressive risk-taking sexual behaviors, escalation or progression of sexual behaviors (tolerance), loss of control and significant adverse psychosocial consequences, such as unplanned pregnancy, pair-bond dysfunction, marital separation, financial problems and sexually transmitted diseases including HIV. The most common behaviors involved in sexual addiction are fantasy sex, compulsive masturbation, pornography, cybersex, voyeuristic sex, anonymous sex and multiple sexual partners. These behaviors are intended to reduce anxiety and other dysphoric affects (e.g., shame and depression). Axis I psychiatric diagnosis, especially mood disorders, psychoactive substance abuse disorders and attention deficit hyperactivity disorders, are common comorbid disorders with sexual addiction. There are significant gaps in the current scientific knowledge base regarding the clinical course, development risk factors and family history and data on women with sexual addiction are lacking. PMID:23241714

  15. Behavior online : Does anonymous computer communication reduce gender inequality?

    NARCIS (Netherlands)

    Postmes, T; Spears, R

    2002-01-01

    Two studies examined dominance and self-stereotyping in mixed-sex groups who had online discussions. Gender differences in dominance varied as a function of several contextual variables: individuation, the accessibility of gender stereotypes, and the fit between group task and stereotype. Results of

  16. Social network variables in alcoholics anonymous: a literature review.

    Science.gov (United States)

    Groh, D R; Jason, L A; Keys, C B

    2008-03-01

    Alcoholics Anonymous (AA) is the most commonly used program for substance abuse recovery and one of the few models to demonstrate positive abstinence outcomes. Although little is known regarding the underlying mechanisms that make this program effective, one frequently cited aspect is social support. In order to gain insight into the processes at work in AA, this paper reviewed 24 papers examining the relationship between AA and social network variables. Various types of social support were included in the review such as structural support, functional support, general support, alcohol-specific support, and recovery helping. Overall, this review found that AA involvement is related to a variety of positive qualitative and quantitative changes in social support networks. Although AA had the greatest impact on friend networks, it had less influence on networks consisting of family members or others. In addition, support from others in AA was found to be of great value to recovery, and individuals with harmful social networks supportive of drinking actually benefited the most from AA involvement. Furthermore, social support variables consistently mediated AA's impact on abstinence, suggesting that social support is a mechanism in the effectiveness of AA in promoting a sober lifestyle. Recommendations are made for future research and clinical practice. PMID:17719158

  17. Parameterized Complexity of the k-anonymity Problem

    CERN Document Server

    Bonizzoni, Paola; Dondi, Riccardo; Pirola, Yuri

    2009-01-01

    The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization that has been recently proposed is the $k$-anonymity. This approach requires that the rows of a table are partitioned in clusters of size at least $k$ and that all the rows in a cluster become the same tuple, after the suppression of some entries. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is known to be APX-hard even when the records values are over a binary alphabet and $k=3$, and when the records have length at most 8 and $k=4$ . In this paper we study how the complexity of the problem is influenced by different parameters. In this paper we follow this direction of research, first showing that the problem is W[1]-hard when parameterized by the size of the solution (and the value $k$). Then we exhibit a fixed parameter algorithm, when the problem is parameterized by the size of the alphabet and the number of columns. Finally...

  18. Delineating social network data anonymization via random edge perturbation

    KAUST Repository

    Xue, Mingqiang

    2012-01-01

    Social network data analysis raises concerns about the privacy of related entities or individuals. To address this issue, organizations can publish data after simply replacing the identities of individuals with pseudonyms, leaving the overall structure of the social network unchanged. However, it has been shown that attacks based on structural identification (e.g., a walk-based attack) enable an adversary to re-identify selected individuals in an anonymized network. In this paper we explore the capacity of techniques based on random edge perturbation to thwart such attacks. We theoretically establish that any kind of structural identification attack can effectively be prevented using random edge perturbation and show that, surprisingly, important properties of the whole network, as well as of subgraphs thereof, can be accurately calculated and hence data analysis tasks performed on the perturbed data, given that the legitimate data recipient knows the perturbation probability as well. Yet we also examine ways to enhance the walk-based attack, proposing a variant we call probabilistic attack. Nevertheless, we demonstrate that such probabilistic attacks can also be prevented under sufficient perturbation. Eventually, we conduct a thorough theoretical study of the probability of success of any}structural attack as a function of the perturbation probability. Our analysis provides a powerful tool for delineating the identification risk of perturbed social network data; our extensive experiments with synthetic and real datasets confirm our expectations. © 2012 ACM.

  19. Summarized data to achieve population-wide anonymized wellness measures.

    Science.gov (United States)

    Clarke, Andrew; Steele, Robert

    2012-01-01

    The growth in smartphone market share has seen the increasing emergence of individuals collecting quantitative wellness data. Beyond the potential health benefits for the individual in regards to managing their own health, the data is highly related to preventative and risk factors for a number of lifestyle related diseases. This data has often been a component of public health data collection and epidemiological studies due to its large impact on the health system with chronic and lifestyle diseases increasingly being a major burden for the health service. However, collection of this kind of information from large segments of the community in a usable fashion has not been specifically explored in previous work. In this paper we discuss some of the technologies that increase the ease and capability of gathering quantitative wellness data via smartphones, how specific and detailed this data needs to be for public health use and the challenges of such anonymized data collection for public health. Additionally, we propose a conceptual architecture that includes the necessary components to support this approach to data collection. PMID:23366349

  20. Why Sex?

    DEFF Research Database (Denmark)

    Nielsen, Rasmus

    2006-01-01

    It is assumed that most organisms have sex because the resulting genetic recombination allows Darwinian selection to work better. It is now shown that in water fleas, recombination does lead to fewer deleterious mutations.......It is assumed that most organisms have sex because the resulting genetic recombination allows Darwinian selection to work better. It is now shown that in water fleas, recombination does lead to fewer deleterious mutations....

  1. Sex therapy for the penile prosthesis recipient.

    Science.gov (United States)

    Schover, L R

    1989-02-01

    In conclusion, the evidence for technical success of the penile prosthesis is clear, but more detailed follow-up studies suggest that a large minority of patients and partners fail to achieve sexual satisfaction. If the goal of surgery is to restore sexual frequency, variety, and pleasure to optimal levels, an integrated treatment program that incorporates sex therapy may be more successful than implantation alone. The type of sex therapy required depends on the risk factors present for postsurgery sexual dissatisfaction. A majority of patients can benefit from several sessions of brief sexual counseling preoperatively, with routine follow-up at 3 and 6 months after surgery to identify problems in resuming sex successfully. I also would point out that an integrated treatment approach is just as applicable to home intracavernosal injection programs. Including sex therapy in the package might reduce the large drop-out rates currently being seen and might decrease the risk of misuse of these medications. PMID:2916282

  2. Psychosocial counselling of identifiable sperm donors

    NARCIS (Netherlands)

    M. Visser; M.H. Mochtar; A.A. de Melker; F. van der Veen; S. Repping; T. Gerrits

    2016-01-01

    STUDY QUESTION: What do identifiable sperm donors feel about psychosocial counselling? SUMMARY ANSWER: Identifiable sperm donors found it important that psychosocial counselling focused on emotional consequences and on rules and regulations and they expected to have access to psychosocial counsellin

  3. Frequently Asked Questions about Genetic Counseling

    Science.gov (United States)

    ... on this page Frequently Asked Questions About Genetic Counseling What are genetic professionals and what do they ... genetics nurses. Top of page What is genetic counseling and evaluation? Genetic professionals work as members of ...

  4. Genetic Counseling for Congenital Heart Defects

    Science.gov (United States)

    ... High Blood Pressure Tools & Resources Stroke More Genetic Counseling for Congenital Heart Defects Updated:Oct 26,2015 ... with congenital heart disease considers having children. Genetic counseling can help answer these questions and address your ...

  5. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    Directory of Open Access Journals (Sweden)

    Changji Wang

    Full Text Available The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  6. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    Science.gov (United States)

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879

  7. Anonymous birth law saves babies-optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5 % chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure. PMID:26267063

  8. Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing

    Directory of Open Access Journals (Sweden)

    Xiaoxun Sun

    2008-08-01

    Full Text Available Publishing data for analysis from a micro data table containing sensitive attributes, while maintaining individual privacy, is a problem of increasing significance today. The k-anonymity model was proposed for privacy preserving data publication. While focusing on identity disclosure, k-anonymity model fails to protect attribute disclosure to some extent. Many efforts are made to enhance the k-anonymity model recently. In this paper, we propose two new privacy protection models called (p, a-sensitive k-anonymity and (p^{+}, a-sensitive k-anonymity, respectively. Different from previous the p-sensitive k-anonymity model, these new introduced models allow us to release a lot more information without compromising privacy. Moreover, we prove that the (p, a-sensitive and (p^{+}, a-sensitive k-anonymity problems are NP-hard. We also include testing and heuristic generating algorithms to generate desired micro data table. Experimental results show that our introduced model could significantly reduce the privacy breach.

  9. Standards for Online-Counselling

    Directory of Open Access Journals (Sweden)

    FESAT

    2009-10-01

    Full Text Available Between Dec 2002 and May 2003, transnational meetings between ChEck iT!, Austria, Partypark, Drogenhilfe from Köln and kids-hotline, Berlin, Germany were held to discuss Standards for Online Counselling. Participants were experts from the field of drug prevention and rehab as well as from youth work with a focus on online counselling. Partypack and ChEck iT! both offer online information and consultation on psychoactive substances, especially on 'recreational drugs’. Kids-hotline, an institution of Jugendhilfe, targets children and youth and places emphasis on topics such as friendship, relationships, sexuality, puberty, school and violence.

  10. Declining Counseling Research in Counseling Psychology Journals: Is the Sky Falling?

    Science.gov (United States)

    Lichtenberg, James W.

    2011-01-01

    Scheel et al. note a rather precipitous decline over the past 30 years in the number and proportion of counseling-related research articles appearing in "Journal of Counseling Psychology" ("JCP") and "The Counseling Psychologist" ("TCP"). Certainly, counseling psychology as a field has changed over its 65-year history, and a great deal of that…

  11. Counseling as an Art: The Creative Arts in Counseling.

    Science.gov (United States)

    Gladding, Samuel T.

    In this book counseling approaches with a variety of populations are examined using these creative arts: music; dance/movement; imagery; visual arts; literature; drama; and play and humor. It is noted that all of these arts are process-oriented, emotionally sensitive, socially directed, and awareness-focused. Chapter 1 discusses the history,…

  12. Guidance and Counseling Component, Group Counseling Course. Career Development Project.

    Science.gov (United States)

    Reinhardt, Judy; Hanselman, Charlotte

    The 14 activities in the group counseling course, designed for the seventh grade level, concentrate on the individual goal of heightened self-awareness in order to make life career decisions. Group objectives emphasize: personal interest and values evaluation; better understanding of influences on personal values, of individual differences, of…

  13. Employee Anonymous Online Dissent: Dynamics and Ethical Challenges for Employees, Targeted Organisations, Online Outlets and Audiences

    DEFF Research Database (Denmark)

    Ravazzani, Silvia; Mazzei, Alessandra

    2015-01-01

    remaining accountable for them and avoiding emotion-focused and defensive disclosure. Targeted organisations need to prevent external disclosure while ensuring freedom of speech and employee privacy, and to respond effectively when overt criticism is found online. Other tensions concern online outlet......This paper aims to enhance understanding of dissent expressive acts that employees voice via anonymous online public contexts. Based on literature on organisational dissent, anonymity and online disclosure, we first point out key dynamics of employee anonymous online dissent, and then present...

  14. Behavioral Counseling to Prevent Skin Cancer

    Science.gov (United States)

    ... Force found that counseling did result in healthier behaviors in children, teens, and young adults. The Task Force found few studies about counseling adults older than age 24. Therefore, the Task Force could not determine whether counseling changed behaviors enough in adults to reduce their risk of ...

  15. Globalization and Counseling: Professional Issues for Counselors

    Science.gov (United States)

    Lorelle, Sonya; Byrd, Rebekah; Crockett, Stephanie

    2012-01-01

    Scholars have examined globalization for many years in terms of its impact on individuals, but it remains a concept not often discussed in the counseling literature. As counseling transforms from a Western-based practice to a global phenomenon, it is important to understand professional counseling within an international and multicultural context.…

  16. 75 FR 32496 - Housing Counseling Outcomes Study

    Science.gov (United States)

    2010-06-08

    ... URBAN DEVELOPMENT Housing Counseling Outcomes Study AGENCY: Office of the Chief Information Officer, HUD... the study. In granting their informed consent to participate in the study, these counseling clients... lists the following information: Title of Proposal: Housing Counseling Outcomes Study. OMB...

  17. Counselling Roots: A Brief Look Ahead.

    Science.gov (United States)

    Conklin, R. C.

    1985-01-01

    Discusses the history of counseling in general, with particular attention to its rapid growth in Canada in the last 20 years. Suggests the need for unification of counseling organizations in Canada if counseling is ever to be established as a bona fide profession. (BH)

  18. Providing Career Counseling to Lesbian Women.

    Science.gov (United States)

    McVannel, Martha Erwin

    The literature on career counseling and lesbian women was reviewed resulting in the identification of 10 maxims regarding providing career counseling to lesbian women. The maxims are as follows: (1) sexual orientation is essential information when providing career counseling; (2) it is important that the workplace be lesbian-affirming; (3) lesbian…

  19. Brief Counseling with Hispanic American College Students.

    Science.gov (United States)

    Littrell, John M.; Cruz, Jeannette

    1998-01-01

    Hispanic-American college students (N=16) met with a Puerto-Rican counselor for two brief counseling sessions. Brief counseling was a viable and effective approach in helping the students reach their goals. Examined types of student concerns about, and student perceptions of, brief counseling. (Author)

  20. Fetal Alcohol Syndrome: Implications and Counseling Considerations.

    Science.gov (United States)

    Elliott, David J.; Johnson, Norbert

    1983-01-01

    Presents special considerations in counseling fetal alcohol syndrome children and their mothers. Preventive counseling must begin before conception. Adequate education, counseling, testing, treatment, and followup of patients and their families is essential to reduce or eliminate problems associated with maternal alcohol abuse. (JAC)

  1. Counseling in Switzerland: Past, Present, and Future

    Science.gov (United States)

    Thomas, Roslyn; Henning, Stacy

    2012-01-01

    The authors review counseling in Switzerland and compare it with counseling in the United States. They evaluate the role of professional associations and programs and argue that the evolution of counseling is situated within the history and economic, social, and political systems of Switzerland. Findings suggest that Swiss counselors are ready to…

  2. Identifying Role Diffusion in School Counseling

    Science.gov (United States)

    Astramovich, Randall L.; Hoskins, Wendy J.; Gutierrez, Antonio P.; Bartlett, Kerry A.

    2013-01-01

    Role ambiguity in professional school counseling is an ongoing concern despite recent advances with comprehensive school counseling models. The study outlined in this article examined role diffusion as a possible factor contributing to ongoing role ambiguity in school counseling. Participants included 109 graduate students enrolled in a…

  3. 20 CFR 638.517 - Counseling.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Counseling. 638.517 Section 638.517 Employees... THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.517 Counseling. The center operator shall establish and conduct an ongoing structured counseling program in accordance with procedures issued by...

  4. 24 CFR 206.41 - Counseling.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Counseling. 206.41 Section 206.41... CONVERSION MORTGAGE INSURANCE Eligibility; Endorsement Eligible Mortgagors § 206.41 Counseling. (a) List... receive counseling. (b) Information to be provided. A counselor must discuss with the mortgagor: (1)...

  5. Professional Counseling in Taiwan: Past to Future

    Science.gov (United States)

    Guo, Yuh-Jen; Wang, Shu-Ching; Combs, Don C.; Lin, Yi-Chun; Johnson, Veronica

    2013-01-01

    Because of the recent introduction of a licensure law, professional counseling has grown rapidly in Taiwan after decades of slow development. The authors provide a historical review of the development of professional counseling in Taiwan and discuss the current status and future trajectory of professional counseling in Taiwan.

  6. 28 CFR 551.113 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Counseling. 551.113 Section 551.113... Pretrial Inmates § 551.113 Counseling. (a) When consistent with institution security and good order, pretrial inmates may be allowed the opportunity to receive counseling services with convicted inmates....

  7. Values and Social Justice in Counseling

    Science.gov (United States)

    Crethar, Hugh C.; Winterowd, Carrie L.

    2012-01-01

    The construct of social justice in counseling is defined and operationalized in this article. This is followed by a discussion about the intersection between social justice in counseling and philosophy, ethics, and spirituality. A call to action for counseling professionals is offered. (Contains 1 figure.)

  8. Effect of didactic lectures on obesity documentation and counseling among internal medicine residents

    Science.gov (United States)

    Ren, Vicky; Ellison, Kathleen; Miller, Jonathan; Busireddy, Kiran; Vickery, Erin; Panda, Mukta; Qayyum, Rehan

    2016-01-01

    Background Screening adult patients for obesity and offering appropriate counseling and treatment for weight loss is recommended. However, many healthcare providers feel ill-equipped to address this topic. Objective We examined whether didactic presentations lead to increased obesity documentation and counseling among internal medicine (IM) residents. Methods We reviewed medical records of patients seen at the IM Resident Continuity Clinic during April 2015. Residents were provided feedback at two didactic presentations during May 2015. To examine the effect of this intervention, we repeated medical record review during June 2015. For both reviews, we abstracted patient-specific (i.e., age, body mass index [BMI], race, sex, and number of comorbid diagnoses) and resident-specific (i.e., sex and training level) data as well as evidence of obesity documentation and counseling. We used logistic regression models to examine the effect of intervention on obesity documentation and counseling, adjusting for patient- and resident-specific variables. Results Of the 278 patients with BMI≥30 kg/m2, 139 were seen before and 139 after the intervention. Intervention had no effect on obesity documentation or counseling with or without adjustment for confounding variables (both P>0.05). In adjusted post-hoc analyses, each additional comorbidity increased the odds of obesity documentation by 8% (OR=1.08; 95% CI=1.05–1.11; Ppostgraduate year (PGY) 1 residents, PGY-3 residents were 56% (OR=0.44; 95% CI=0.21–0.95; P=0.03) less likely to counsel obese patients. Conclusions Obesity is inadequately addressed in primary care settings, and didactic presentations were unable to increase obesity documentation or weight loss counseling. Future research to identify effective interventions is needed. PMID:27124168

  9. Sex Education and Intellectual Disability: Practices and Insight from Pediatric Genetic Counselors.

    Science.gov (United States)

    Murphy, Carly; Lincoln, Sharyn; Meredith, Stephanie; Cross, Elizabeth M; Rintell, David

    2016-06-01

    Intellectual disability (ID) with or without other anomalies is a common referral for genetic counseling. Sessions may include discussions of reproductive implications and other issues related to sex education. Patients with ID regularly meet barriers when trying to obtain sex education due to the misperceptions of others as being either asexual or that such education would promote inappropriate sexual behavior. In this pilot study, we surveyed genetic counselors to explore their experiences with being asked to provide sex education counseling and their comfort in doing so for patients with ID ages 9-17. Results were analyzed from 38 respondents. Caregivers and patients most frequently requested information on puberty, sex abuse prevention, and reproductive health. Genetic counselors were most comfortable when they could provide sex education counseling within the context of a particular condition or constellation of features. They were least comfortable when they lacked familiarity with the patient, caregiver, or the family's culture. The most frequently cited barriers that prevented genetic counselors from providing sex education counseling were lack of time, lack of training, the patient's ID being too profound, and a belief that genetic counselors should not be responsible for providing sex education counseling. While many respondents reported that providing sex education counseling is not considered within the scope of a genetic counselor's practice, they also noted that patients' families initiate discussions for which counselors should be prepared. Respondents indicated that resource guides specifically designed for use by genetic counselors would be beneficial to their practice. Genetic counselors have the opportunity to embrace the role of advocate and broach the issue of sexual health with caregivers and patients by directing them toward educational resources, if not providing sex education directly to effectively serve the needs of patients and

  10. Board Certification in Counseling Psychology

    Science.gov (United States)

    Crowley, Susan L.; Lichtenberg, James W.; Pollard, Jeffrey W.

    2012-01-01

    Although specialty board certification by the American Board of Professional Psychology (ABPP) has been a valued standard for decades, the vast majority of counseling psychologists do not pursue board certification in the specialty. The present article provides a brief history of board certification in general and some historical information about…

  11. College Student Depression: Counseling Billy

    Science.gov (United States)

    Mobley, A. Keith

    2008-01-01

    A substantial portion of the college student population experiences affective disorders. This case study presents the conceptualization, course of treatment, and outcomes for a male college student presenting for counseling with depression. A review of Adlerian, cognitive-behavioral, and Gestalt techniques is provided. (Contains 1 figure.)

  12. High-Tech College Counseling

    Science.gov (United States)

    Hoover, Eric

    2012-01-01

    In this digital age, teaching has transcended the classroom. So why should school walls confine college counseling? The question is driving innovation that could change the way students prepare for college and careers. Just as learning is now a hybrid of face-to-face and virtual interactions, the transmission of college know-how is fast becoming a…

  13. Contextualising eating problems in individual diet counseling

    DEFF Research Database (Denmark)

    Kristensen, Søren Tange; Køster, Allan

    2014-01-01

    than is usually the case in diet counselling, motivational interviewing and health coaching. We suggest the use of narrative practice as a critical and context-sensitive counselling approach to eating problems. Principles of externalisation and co-researching are combined within a counselling framework...... counselling sessions, exploration of the complex structures of food and eating with the client can provide agency by helping them navigate within the context of the problem. We also exemplify why a reflexive and critical approach to the way health is perceived by clients should be an integrated part of diet...... counselling....

  14. Contextualising eating problems in individual diet counselling

    DEFF Research Database (Denmark)

    Kristensen, Søren Tange; Køster, Allan

    2014-01-01

    than is usually the case in diet counselling, motivational interviewing and health coaching. We suggest the use of narrative practice as a critical and context-sensitive counselling approach to eating problems. Principles of externalisation and co-researching are combined within a counselling framework...... counselling sessions, exploration of the complex structures of food and eating with the client can provide agency by helping them navigate within the context of the problem. We also exemplify why a reflexive and critical approach to the way health is perceived by clients should be an integrated part of diet...... counselling...

  15. The practice of OTC counseling by community pharmacists in Parana, Brazil

    Directory of Open Access Journals (Sweden)

    Halila GC

    2015-12-01

    Full Text Available Background: In order to provide appropriate advice to the patient at the time of dispensing and over-the-counter (OTC medication counseling, community pharmacists need access to current and reliable information about medicines. Brazilian pharmacists have assumed new functions such as prescribing medication, in a dependent model, based in protocols. Objective: To examine the practice of community pharmacists in a Brazilian State, focusing on OTC recommendation. Method: A cross-sectional survey of community pharmacists in a state of Brazil was conducted from October 2013 to January 2014, with data collection through a pre-piloted self-administered anonymous survey via Survey Monkey® platform. Following ethical approval, the online instrument was sent to 8,885 pharmacists registered in Parana State, Brazil, focusing on professionals working in community pharmacies. The questionnaire assessed the community pharmacy setting, the search for information, the knowledge of the evidence-based practice, the important factors to consider when recommending an OTC medicine, and the pharmacist prescribing. Responses were imported into SPSS® (version 22.0 for analysis. Nonparametric tests were used to assess the association between responses and demographic information with a significance level less than 5% (p<0.05. Results: Of the pharmacists, 97.4% dispensed medications and counseled patients for a median of six hours per day. Product's efficacy (97% and adverse effects (62.3% were the most important factors taken into account when counseling a nonprescription medicine. Few pharmacists knew the meaning of terms related to evidence-based health. Most respondents agreed that pharmacists have the necessary training to prescribe. Conclusion: Over-the-counter medication counseling is a daily practice among Brazilian pharmacists. Learning needs exist for community pharmacists in relation to evidence-based practice. Thus, sources of information with good evidence

  16. Atomic and anonymous e-Cash transaction protocol with off-line TTP

    Institute of Scientific and Technical Information of China (English)

    王茜; 李朝阳; 杨德礼

    2004-01-01

    Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants' interests. But there are conflicts between these two properties. In this paper, an atomic and anonymous e-Cash transaction protocol with off-line TTP (Trust Third Party) based on the extended CEMBS is presented. The novel protocol is analyzed for its atomicity and anonymity. The results of the analysis show that it not only provides atomicity and anonymity under unreliable communication and dishonest partici-pants, but also features high efficiency and practicability. The new protocol also avoids transaction from a am-biguous state. Furthermore, it will be referenced often for the application of the atomic e-Cash transaction proto-col.

  17. The Role of the Anonymous Voice in Post-Publication Peer Review Versus Traditional Peer Review

    Directory of Open Access Journals (Sweden)

    Jaime A. Teixeira da Silva

    2015-12-01

    Full Text Available Traditional peer review (TPR has several limitations and weaknesses. Post-publication peer review is one practical way to repair the ills of TPR and reinforce it. A literature that is marked by errors is unhealthy and should, if given the opportunity, be corrected or further improved. The anonymous voice is one source of critique and differs from the blind peer review in TPR in which the reviewer remains anonymous to the authors and/or vice versa, but the identity is known to the editor. If unregulated, the anonymous voice can pose a threat to established editorial norms in TPR, to one of the most important criteria of science publishing, i.e., transparency, and to worthwhile discussion. Yet, if the anonymous voice is not heard, then a vast and potentially valuable pool of untapped opinions may be lost, opinions that may provide valuable solutions to improving TPR.

  18. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  19. Security analysis and improvement of an anonymous authentication scheme for roaming services.

    Science.gov (United States)

    Lee, Youngsook; Paik, Juryon

    2014-01-01

    An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330

  20. Multidisciplinary approach to sex education of spinal cord-injured patients.

    Science.gov (United States)

    Evans, R L; Halar, E M; DeFreece, A B; Larsen, G L

    1976-05-01

    The need for sex education of spinal cord-injured patients is often unmet by current rehabilitation programs. In the programs which do exist, therapeutic objectives vary widely, indicating a need for clarity and communication among professionals. An interdisciplinary approach to evaluating and treating sexual dysfunction is described which provides information to patients and families about sexual disorders related to spinal injury and offers counseling services to patients experiencing problems in their altered sex relations. Physiological, psychological, and social aspects of human sexuality as they are integrated into a multidisciplinary sex education program are discussed with specific recommendations for content which should be included in the information-giving counseling process. PMID:1265117

  1. Revisiting the Four Horsemen of the Infopocalypse: Representations of anonymity and the Internet in Canadian newspapers

    OpenAIRE

    Carey, Robert F.; Burkell, Jacquelyn

    2007-01-01

    The concept of anonymity is central to much discussion about the Internet. In this paper, we wish to identify the term's work in the context of more expansive claims about the function, value and consequences of networked information technology in society. We argue that themes and topics in a sample of Canadian print news stories are exemplary of a discourse about the Internet in which anonymity is portrayed as an element that facilitates positive or negative social outcomes of the technology.

  2. Public Forum Help Seeking: the Impact of Providing Anonymity on Student Help Seeking Behavior

    OpenAIRE

    Barnes, David J.

    1999-01-01

    Public Forum Help Seeking: The Impact of Providing Anonymity on Student Help Seeking Behaviour David J. Barnes Published in Computer Based Learning in Science '99, Editor Graham M. Chapman, ISBN 80-7042-144-4. Conference Proceedings of CBLIS '99, Twente University, Enschede, the Netherlands, 2nd July - 6th July 1999. Abstract We investigate the impact of providing anonymity to a group of undergraduate Computing students, in order to encourage them to seek help for course related questions. We...

  3. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    OpenAIRE

    Younsung Choi; Junghyun Nam; Donghoon Lee; Jiye Kim; Jaewook Jung; Dongho Won

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register man...

  4. The Impact of anonymity in elicitation of brand associations : theoretical and empirical developments

    OpenAIRE

    Supphellen, Magne

    1998-01-01

    Effective brand management requires a thorough understanding of the consumer. In particular, managers need to know which associations consumers have for their brands. In this study, we address the role of anonymity in interviews designed to elicit brand associations from consumers' memories. First, the concept of anonymity is examined in order to arrive at a useful definition. Based on a review ofpotential psychological motives for response distortion and a review of the nature...

  5. 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community

    OpenAIRE

    Bernstein, Michael; Monroy-Hernández, Andrés; Harry, Drew; André, Paul; Panovich, Katrina; Vargas, Greg

    2011-01-01

    We present two studies of online ephemerality and anonymity based on the popular discussion board /b/ at 4chan.org: a website with over 7 million users that plays an influential role in Internet culture. Although researchers and practitioners often assume that user identity and data permanence are central tools in the design of online communities, we explore how /b/ succeeds despite being almost entirely anonymous and extremely ephemeral. We begin by describing /b/ and performing a content an...

  6. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    OpenAIRE

    Bodó, B.

    2015-01-01

    This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of online political activism. Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders. Through the...

  7. PHENOMENAL EXPLORATION INTO IMPACT OF ANONYMITY ON LAW AND ORDER IN CYBERSPACE

    OpenAIRE

    Li, Xingan

    2015-01-01

    While information systems provide modern society with great convenience, it also poses new problems in maintaining social order. One of its negative influences is the anonymity of cyberspace, which makes identity tracing a noteworthy predicament which poses obstacles in detection and investigations. It has been found that cyber anonymity has critical impacts on criminal motivation, and the phenomena of victimization, and should be tackled on different layers including technology and law enfor...

  8. A secure and effective anonymous authentication scheme for roaming service in global mobility networks

    OpenAIRE

    Dawei ZHAO; Peng, Haipeng; Li, Lixiang; Yang, Yixian

    2013-01-01

    Recently, Mun et al. analyzed Wu et al.'s authentication scheme and proposed a enhanced anonymous authentication scheme for roaming service in global mobility networks. However, through careful analysis, we find that Mun et al.'s scheme is vulnerable to impersonation attacks, off-line password guessing attacks and insider attacks, and cannot provide user friendliness, user's anonymity, proper mutual authentication and local verification. To remedy these weaknesses, in this paper we propose a ...

  9. Mesh Technique for Nymble Architecture Sustaining - Secrecy and Security in Anonymizing Networks

    OpenAIRE

    J.Praveen Kumar; B Shyam Kumar

    2013-01-01

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks, however, hasbeen limited by users employing this secrecy for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing ne...

  10. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    Directory of Open Access Journals (Sweden)

    Tomas A. Lipinski

    2002-01-01

    Full Text Available This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has altered the traditional legal paradigm of responsibility and as a result creates potential problems for the future of anonymous speech on the Internet.  As a result plaintiffs are no longer pursuing litigation against service providers but taking their dispute directly to the anonymous speaker. Second, several cases have arisen in the United States where plaintiffs have requested that the identity of an anonymous Internet speaker be revealed.  These cases are surveyed.  Third, the cases are analyzed in order to determine the factors that courts require to be present before the identity of an anonymous speaker will be revealed.  The release is typically accomplished by the enforcement of a discovery subpoena instigated by the party seeking the identity of the anonymous speaker. The factors courts have used are as follows: jurisdiction, good faith (both internal and external, necessity (basic and sometimes absolute, and at times proprietary interest. Finally, these factors are applied in three scenarios--e-commerce, education, and employment--to guide institutions when adopting policies that regulate when the identity of an anonymous speaker--a customer, a student or an employee--would be released as part of an internal initiative, but would nonetheless be consistent with developing legal standards.

  11. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    OpenAIRE

    Xiong Li; Jianwei Niu; Muhammad Khurram Khan; Zhibo Wang

    2013-01-01

    We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP), Diffie-Hellman p...

  12. The Efficacy of Overeaters Anonymous in Fostering Abstinence in Binge-Eating Disorder and Bulimia Nervosa

    OpenAIRE

    Kriz, Kerri-Lynn Murphy

    2002-01-01

    The purpose of this dissertation is to identify the variables associated with abstinence from binge-eating disorder and Bulimia Nervosa in the twelve-step recovery program of Overeaters Anonymous. The data were gathered through the completion of a survey by 231 active members of Overeaters Anonymous in the Washington metropolitan area. In addition to assessing the demographic composition of the aforementioned population, the variables that were assessed comprise the â toolsâ of Overeaters ...

  13. Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge

    CERN Document Server

    Narayanan, Arvind; Rubinstein, Benjamin I P

    2011-01-01

    This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on real-world link prediction, and the dataset was a graph obtained by crawling the popular Flickr social photo sharing website, with user identities scrubbed. By de-anonymizing much of the competition test set using our own Flickr crawl, we were able to effectively game the competition. Our attack represents a new application of de-anonymization to gaming machine learning contests, suggesting changes in how future competitions should be run. We introduce a new simulated annealing-based weighted graph matching algorithm for the seeding step of de-anonymization. We also show how to combine de-anonymization with link prediction---the latter is required to achieve good performance on the portion of the test set not de-anonymized---for example by training the predictor on the de-anonymized portion of the test set, and combining probabilistic predictions from de-anony...

  14. Serbs in the poetry of Theodore Prodromos and anonymous Manganeios

    Directory of Open Access Journals (Sweden)

    Stanković Vlada

    2006-01-01

    Full Text Available Numerous rhetorical writings of the Comnenian period constitute a fruitful field of research, both with respect to historical data, i.e. hard historical facts hidden, though still recognizable, behind the peculiar and somewhat abstract mode of expression of the authors of the twelfth century, and with regard to the poetics of the literary works themselves, i.e. the internal elements characteristic not only for the genre chosen, but also for each particular author. A comparative, historical and literary approach to these works renders their sense clearer and their complex allusions more readily understood. This is a matter of some importance, since allusions constitute one of the basic elements of historical rhetoric, which reached its peak at the time of Emperor Manuel Komnenos (1143-1180, especially during the first half of his reign, i.e. till the end of the fifties of the twelfth century. The poetry of Theodore Prodromes and of the somewhat younger Anonymous ('Prodromos' Manganeios is an excellent example of this intertwining of historical and literary elements, i.e. of the presentation of historical data through rhetorical patterns. One has to concentrate on individual works attempting to determine, as far as possible, the date of composition, the circumstances of writing and the purpose of a particular poem, the occasion for which it was written and the character of the expected audience, in order to better understand both the poetry written by these two rhetoricians and the individual features of the authors, as well as their respective positions in the circle around Emperor Manuel Komnenos. The poems dealt with in the present paper stand out for calling the Serbs by their real name. This naming practice was invariably employed by both rhetoricians in cases when new achievements of the basileus were to be announced and proclaimed immediately after the event, on the occasions of first reports, first celebrations of the new victories and

  15. The Knowledge, Attitude and Behavior of HIV/AIDS Patients’ Family toward Their Patients before and after Counseling

    Directory of Open Access Journals (Sweden)

    Behnam Honarvar

    2010-12-01

    Full Text Available Background: Acquired immunodeficiency may impose considerableconsequences on patients’ family behaviors towardthem. The objective of the present study was to investigatewhether a counseling program at Behavioral Counseling Centerin the city of Shiraz, Iran could change the attitude, knowledgeand behavior of patients' family members.Methods: 125 HIV/AIDS patients’ family members were interviewed,using a valid and reliable questionnaire before andafter performing counseling sessions at Behavioral CounselingCenter. The findings were analyzed using nonparametric tests.Results: The age of the participants was 40±13 years. Sixty fivepercent were female, 63% married and 79% educated. Forty fourpercent of participants had spousal relationships with their patients.Their knowledge about the main routes of HIV transmissionwere 9.76 ± 2.59 and10.64±0.88 before and after counseling,respectively (P=0.028. Supportive behaviors of families towardtheir patients reached to 79% after counseling compared with 44% before that (P=0.004. Belief to isolate the patients and thepractice of this approach at home dropped from 71% to 15% andfrom 29% to 7% after counseling, respectively (P0.05.Conclusion: Ongoing counseling for HIV/AIDS patients’ familiesat Behavioral Counseling Center of Shiraz did advance theirknowledge about AIDS and improved their attitude and behaviortoward their patients However, the counseling program didnot show remarkable success in some aspects such as the removalof fear about HIV spread in the family or the change ofthe patients’ wives attitude to have protected sex with their HIVinfected husbands.Iran J Med Sci 2010; 35(4: 287-292.

  16. Guidelines for counselling in infertility: outline version.

    Science.gov (United States)

    Boivin, J; Appleton, T C; Baetens, P; Baron, J; Bitzer, J; Corrigan, E; Daniels, K R; Darwish, J; Guerra-Diaz, D; Hammar, M; McWhinnie, A; Strauss, B; Thorn, P; Wischmann, T; Kentenich, H

    2001-06-01

    The Guidelines for Counselling in Infertility describe the purpose, objectives, typical issues and communication skills involved in providing psychosocial care to individuals using fertility services. The Guidelines are presented in six sections. The first section describes how infertility consultations differ from other medical consultations in obstetrics and gynaecology, whereas the second section addresses fundamental issues in counselling, such as what is counselling in infertility, who should counsel and who is likely to need counselling. Section 3 focuses on how to integrate patient-centred care and counselling into routine medical treatment and section 4 highlights some of the special situations which can provoke the need for counselling (e.g. facing the end of treatment, sexual problems). Section 5 deals exclusively with third party reproduction and the psychosocial implications of gamete donation, surrogacy and adoption for heterosexual and gay couples and single women without partners. The final section of the Guidelines is concerned with psychosocial services that can be used to supplement counselling services in fertility clinics: written psychosocial information, telephone counselling, self-help groups and professionally facilitated group work. This paper summarizes the different sections of the Guidelines and describes how to obtain the complete text of the Guidelines for Counselling in Infertility. PMID:11387309

  17. Counseling Students’ Attitudes toward Statistics

    OpenAIRE

    José Antonio García-Martínez; Manuel Arturo Fallas-Vargas; Adriana Romero-Hernández

    2015-01-01

    This paper presents the findings of a study aimed at analyzing the attitudes toward Statistics of a sample of 223 Counseling students, as well as identifying possible attitude differences by socio-demographic characteristics and prior training in Statistics.  Based on a cross-sectional design, data was collected using SATS (Survey of Attitudes toward Statistics), which includes four components (affective, cognitive competence, value and difficulty), as well as several questions on the partici...

  18. Counseling tips, techniques, and caveats.

    OpenAIRE

    Christie-Seely, J

    1995-01-01

    Many medical visits are generated by psychosocial problems or their symptoms. Every family physician, therefore, should have counseling skills despite constraints of time and training. This article discusses issues such as the characteristics of effective therapists, the limitations of the medical model, the core role of self-esteem in anxiety and depression, and the importance of purpose and meaning to physical and mental health.

  19. Is Counselling a Feminist Practice?

    OpenAIRE

    Bondi, Liz

    2005-01-01

    Women’s efforts to influence policies have complex effects, which are often difficult to evaluate. This paper identifies four themes in feminist politics through which to analyse whether a particular intervention involving substantial numbers of women – that of counselling in the UK – can be understood as a feminist practice. These themes are concerned with gender equality, women’s autonomy, recognition of diversity among women and the deconstruction of gender norms. In its ear...

  20. Effect of screening and lifestyle counselling on incidence of ischaemic heart disease in general population

    DEFF Research Database (Denmark)

    Jørgensen, Torben; Jacobsen, Rikke Kart; Toft, Ulla;

    2014-01-01

    OBJECTIVE: To investigate the effect of systematic screening for risk factors for ischaemic heart disease followed by repeated lifestyle counselling on the 10 year development of ischaemic heart disease at a population level. DESIGN: Randomised controlled community based trial. SETTING: Suburbs of...... Copenhagen, Denmark PARTICIPANTS: 59 616 people aged 30-60 years randomised with different age and sex randomisation ratios to an intervention group (n=11 629) and a control group (n=47 987). INTERVENTION: The intervention group was invited for screening, risk assessment, and lifestyle counselling up to four...... times over a five year period. All participants with an unhealthy lifestyle had individually tailored lifestyle counselling at all visits (at baseline and after one and three years); those at high risk of ischaemic heart disease, according to predefined criteria, were furthermore offered six sessions of...

  1. Field-Based Video Pre-Test Counseling, Oral Testing, and Telephonic Post-Test Counseling: Implementation of an HIV Field Testing Package among High-Risk Indian Men

    Science.gov (United States)

    Snyder, Hannah; Yeldandi, Vijay V.; Kumar, G. Prem; Liao, Chuanhong; Lakshmi, Vemu; Gandham, Sabitha R.; Muppudi, Uma; Oruganti, Ganesh; Schneider, John A.

    2012-01-01

    In India, men who have sex with men (MSM) and truck drivers are high-risk groups that often do not access HIV testing due to stigma and high mobility. This study evaluated a field testing package (FTP) that identified HIV positive participants through video pre-test counseling, OraQuick oral fluid HIV testing, and telephonic post-test counseling…

  2. [Online Counselling: The prospect of a therapeutic connection].

    Science.gov (United States)

    Giotakos, O; Papadomarkaki, E

    2016-01-01

    Over the last few years, Internet has become an integral part of daily life. An abundant source of information and a principal gateway of communication between individuals, Internet has been continuously gaining considerable ground as a tool of awareness and intervention in the area of public health. With regard to the field of mental health, Internet exhibits a credible potential in facilitating dialogue not only between experts and their beneficiaries but also between stakeholders. Moreover and with regard to various aspects of public concern, it can serve as a circulation portal of educational material between students and teachers. The advent of remote support services dates back in the decade of 1970-1980. In the present time, they consist of informative guides and self-help groups or online counselling. The latter is defined as the process in which both parties, namely the therapist and the client, are involved in an oral or written conciliation through means of an internet connection, videoconferencing, live chat or e-mail exchange. The benefits of this practice - accessibility, relocation, convenience, anonymity, facilitation of face-to-face psychotherapy and low cost - could make online counseling, in specific cases, the treatment of choice. While the usage of the World Wide Web seems promising for the rectification of mental health disorders, there is some debate among experts regarding the ethical aspect of practicing psychotherapy in an interactive digital environment. Issues such as technical expertise and the tackling of related problems, difficulties in the diagnostic process, interchange of verbal and nonverbal cues, crisis management, safeguarding the therapeutic alliance, protection of personal data, age restriction, keeping boundaries in relation to the setting, the time and the dynamics of the therapeutic relationship and, finally, training and supervisory process of online therapist, are some subjects of disagreement. Relevant research reveals

  3. When Sex Is Painful

    Science.gov (United States)

    ... AQ FREQUENTLY ASKED QUESTIONS GYNECOLOGIC PROBLEMS FAQ020 When Sex Is Painful • How common is painful sex? • What causes pain during sex? • Where is pain during sex felt? • When should ...

  4. Sex during Pregnancy

    Science.gov (United States)

    ... Story" 5 Things to Know About Zika & Pregnancy Sex During Pregnancy KidsHealth > For Parents > Sex During Pregnancy ... satisfying and safe sexual relationship during pregnancy. Is Sex During Pregnancy Safe? Sex is considered safe during ...

  5. Re-identification of home addresses from spatial locations anonymized by Gaussian skew

    Directory of Open Access Journals (Sweden)

    Cassa Christopher A

    2008-08-01

    Full Text Available Abstract Background Knowledge of the geographical locations of individuals is fundamental to the practice of spatial epidemiology. One approach to preserving the privacy of individual-level addresses in a data set is to de-identify the data using a non-deterministic blurring algorithm that shifts the geocoded values. We investigate a vulnerability in this approach which enables an adversary to re-identify individuals using multiple anonymized versions of the original data set. If several such versions are available, each can be used to incrementally refine estimates of the original geocoded location. Results We produce multiple anonymized data sets using a single set of addresses and then progressively average the anonymized results related to each address, characterizing the steep decline in distance from the re-identified point to the original location, (and the reduction in privacy. With ten anonymized copies of an original data set, we find a substantial decrease in average distance from 0.7 km to 0.2 km between the estimated, re-identified address and the original address. With fifty anonymized copies of an original data set, we find a decrease in average distance from 0.7 km to 0.1 km. Conclusion We demonstrate that multiple versions of the same data, each anonymized by non-deterministic Gaussian skew, can be used to ascertain original geographic locations. We explore solutions to this problem that include infrastructure to support the safe disclosure of anonymized medical data to prevent inference or re-identification of original address data, and the use of a Markov-process based algorithm to mitigate this risk.

  6. A Study of Counseling Center Hiring Practices: What Does It Take for a Woman to be Hired?

    Science.gov (United States)

    Kitchener, Karen Strohm; And Others

    1975-01-01

    This study examined the effect of raters' level of self-acceptance on the ratings of three candidate types: a "traditional" woman, a "feminist", and a candidate with sex unspecified. Subjects were 81 male counseling center directors. Results reveal that subjects with higher self-acceptance were more likely to evaluate all candidates as more…

  7. Over a Half-Century Encapsulated: A Multicultural Content Analysis of the "Journal of Counseling Psychology," 1954-2009

    Science.gov (United States)

    Lee, Debbiesiu L.; Rosen, Adam D.; Burns, Victoria

    2013-01-01

    Articles including multicultural content published in the "Journal of Counseling Psychology" ("JCP"), from 1954 to 2009, were examined for themes. Multicultural content in this study was broadly defined to include the following identities: race/ethnicity, gender/sex, religion/spirituality, sexual orientation, social status, disability, age, and…

  8. Nurturing the Relationships of All Couples: Integrating Lesbian, Gay, and Bisexual Concerns into Premarital Education and Counseling Programs

    Science.gov (United States)

    Casquarelli, Elaine J.; Fallon, Kathleen M.

    2011-01-01

    Research shows that premarital counseling programs help engaged couples develop interpersonal and problem-solving skills that enhance their marital relationships. Yet, there are limited services for same-sex couples. This article assumes an integrated humanistic and social justice advocacy stance to explore the needs of lesbian, gay, and bisexual…

  9. Counseling toward Clarification and Skill Building: The Case of Jessie.

    Science.gov (United States)

    Ursprung, Susan Lee

    1988-01-01

    Addresses the case of Jessie, rehabilitation counseling client described in a previous article. Sets counseling goals and offers suggestions for counseling techniques. Discusses interventions which focus on information gathering, supportive counseling, ongoing supportive group counseling, assertiveness training, family services, and work…

  10. Current Institutional Trends in Research Productivity in Counseling Psychology Journals

    Science.gov (United States)

    Diegelman, Nathan M.; Uffelman, Rachel A.; Wagner, Kimberly S.; Diegelman, Sally A.

    2005-01-01

    This study investigated institutional publication activity in counseling psychology journals for the 10-year period from 1993 to 2002. Four journals reported by counseling psychology training directors as prime publication outlets for the field of counseling psychology were used: "Journal of Counseling Psychology," "The Counseling Psychologist,"…

  11. Withdrawal from Genetic Counselling for Cancer

    Directory of Open Access Journals (Sweden)

    Bleiker Eveline

    2005-02-01

    Full Text Available Abstract Background A substantial minority of individuals who initially apply for genetic counselling for breast/ovarian cancer withdraw at an early stage from the counselling process. This study investigated the self-reported reasons for early withdrawal and the factors associated significantly with such withdrawal. Methods Self-report questionnaires were mailed to 83 women who had applied for genetic counselling for breast/ovarian cancer but who subsequently withdrew from the counselling process (the "withdrawers". A comparison group of 105 women who had completed the genetic counselling (the "attendees" received a similar questionnaire. The questionnaire assessed sociodemographic characteristics, reasons for applying for genetic counselling, general distress (MHI-5, cancer-specific distress (IES, and cancer worries. For those women who discontinued the counselling, reasons for withdrawal were also assessed. Results The primary reasons given for withdrawing from counselling were difficulties in anticipating the consequences of genetic counselling (28%, and worries about being unable to adequately cope with an unfavourable test result (20%. Compared to the attendees, the withdrawers were significantly younger, more frequently asymptomatic, more often the first and only member of the family to apply for counselling, and less worried about cancer. Current levels of cancer-specific distress and general distress were comparable between the two groups. Conclusion Younger women, those without a history of cancer, and those who are first in their family to apply are more likely to withdraw prematurely from genetic counselling for breast/ovarian cancer. These withdrawers have no elevated levels of distress. However, a substantial percentage of individuals discontinue counselling due to concerns about their (inability to cope with a possible unfavourable test outcome. This suggests that greater attention should be paid to ways of coping with test

  12. Risk Behavior Disclosure During HIV Test Counseling

    OpenAIRE

    Torrone, Elizabeth Ann; Thomas, James C.; Maman, Suzanne; Pettifor, Audrey E; Kaufman, Jay S.; Sena, Arlene C.; Hightow-Weidman, Lisa B.

    2010-01-01

    Individualized risk assessments during HIV testing are an integral component of prevention counseling, a currently recommended behavioral intervention for patients in high-risk settings. Additionally, aggregate risk assessment data are the source of aggregate behavioral statistics that inform prevention programs and allocation of resources. Consequently, inaccurate or incomplete risk behavior disclosure during test counseling may impact the efficacy of the counseling intervention, as well as ...

  13. Abortion counseling and the school counselor.

    Science.gov (United States)

    Duncan, J A; Moffett, C F

    1974-01-01

    The Supreme Court decision of January 22, 1973, legalizing abortion now requires school counselors to examine both their personal and professional positions on abortion information and abortion counseling. To date a review of school counseling literature reveals a failure to deal with abortion as a counseling issue. Also, schools have failed to develop official policies regarding abortion counseling and the distribution of abortion information. The counselors who have provided abortion information to date have done so at the request of a student or parent rather than by making the information generally available. A study in 1973 in Virginia, however, revealed that Virginia counselor educators believed that there was a need for counselors in training to be exposed to abortion information as part of their formal training experience. Generally, today's present exposure to abortion information makes it impossible for counselors to continue to ignore a growing demand for both abortion information and counseling. School counselors must deal with the following questions: 1) What course of action should school counselors take when a pregnant young seeks counseling on alternatives to pregnancy continuation? 2) What is the counselor's professional role in abortion counseling with respect to his or her personal feelings and beliefs? 3) What kind of training if any should school counselors receive regarding abortion counseling? 4) Is there a need for in-service training on abortion counseling for school counselors? 5) Should various professional organizations develop materials that would assist their members in providing abortion counseling? 6) Should institutions such as schools, churches, and community agencies establish policies concerning abortion counseling? Although the answers are not simple, the school counselors and their professional organizations must begin to develop the answers in order to provide good counseling services to young women exercising their right to

  14. THE ROLE OF COUNSELING IN DOMESTIC VIOLENCE

    OpenAIRE

    Mayuri Sahay; G. S. Venumadhava

    2016-01-01

    The role of counseling dealing with domestic violence cases is excessively significant undoubtedly. This article describes to find out the role of counseling in order to deal with domestic violence cases and to understand the role of domestic violence counselor. There are, though, new domestic violence prevention strategies emerging, and prevention approaches from the counseling field can serve as models for further development of these strategies.

  15. Power, Relationships and Ethics in Counselling Psychology

    OpenAIRE

    Hart, N.M.T.

    2002-01-01

    Introduction This portfolio focuses on the issues of power and ethics within relationship in the practice of counselling psychology. The impetus behind the work came from a desire to acknowledge that power is part of all relationships and as the practice of counselling psychology is based on relationship it would be interesting to explore the impact of the power dynamic within three different types of relationship contexts. The aim of the work is to explore relationships within counselling...

  16. Consumer credit counseling: credit card issuers' perspectives

    OpenAIRE

    Mark Furletti

    2003-01-01

    On Friday, May 23, 2003, the Payment Cards Center hosted a workshop led by collections managers from J.P. Morgan Chase and Juniper Bank. The managers provided the credit card issuers' perspective on the consumer credit counseling industry. The day's discussion complemented an earlier workshop at which representatives from local consumer credit counseling services (CCCS) discussed their business model. After describing the ways in which new market entrants have affected the counseling industry...

  17. A pilot RCT of an intervention to reduce HIV condomless sex and increase self-acceptance among MSM in Chennai, India

    OpenAIRE

    Safren, Steven A.; Thomas, Beena E.; Mayer, Kenneth H.; Biello, Katie B.; Mani, Jamuna; Rajagandhi, Vijaylakshmi; Periyasamy, Murugesan; Swaminathan, Soumya; Mimiaga, Matthew J.

    2014-01-01

    This is a 2-arm pilot randomized controlled trial (N=96) of a behavioral intervention (4 group and 4 individual sessions) integrating risk reduction counseling with counseling to foster self-acceptance in MSM in India compared to Enhanced Standard of Care (ESOC). Both conditions involved HIV and STI testing and counseling at baseline and 6-months, and assessments of condomless sex at baseline, 3-, and 6-months. A significant condition by time interaction suggested a difference in the rate of ...

  18. General Counsel`s office FY 1995 site support program plan WBS 6.10.5

    Energy Technology Data Exchange (ETDEWEB)

    Moreno, S.R.

    1994-09-01

    The General Counsel`s office provides legal counsel to all levels of WHC management; administers the intellectual property program; coordinates all WHC investigative activity and supports WHC activities to ensure compliance with all applicable federal, state, and local laws, DOE directives, contractual provisions, and other requirements. In so doing, the Office of General Counsel supports the Hanford site mission of transforming the Hanford site into an environmentally attractive and economically sustainable community. This document briefs the FY95 site support plan.

  19. An Efficient Authentication and Access Control Scheme to Protect Integrity of Anonymous Networks

    Directory of Open Access Journals (Sweden)

    Santhosh S, Asst. Prof. Alok Ranjan

    2013-03-01

    Full Text Available Concerns about privacy and security have received greater attention with the rapid growth and public acceptance of the Internet and the pervasive deployment of various network technologies. Anonymous network services is a large field of research and development that steadily continues to grow. Several credential systems have been proposed in which users can authenticate to services anonymously. Various anonymous network are readily available such as tor, i2p these allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. But this provision can be utilized both by the genuine users and misbehaving ones alike. Dishonest users take advantage of anonymity for abusive purpose such as website defacing. The administrators of these websites are unable to blacklist such users since their identity is not known. As a result they block the complete network using onion routing to ensure protection to their servers denying anonymous access to genuine and dishonest users alike. To surmount this problem, assuming a tor environment a credential system is proposed which enables the system administrators to detect any malicious activity and further block the malicious user continuing un-interrupted access to genuine users

  20. An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products

    Science.gov (United States)

    Zhang, Zhen; Kim, K. H. (Kane); Kang, Myeong-Ho; Zhou, Tianran; Chung, Byung-Ho; Kim, Shin-Hyo; Lee, Seok-Joon

    The rapid growing of online purchasing of information products poses challenges of how to preserve the customer's privacy during the online transactions. The current widely used way of online shopping does not consider the customer's privacy protection. It exposes the customer's sensitive information unnecessarily. We propose a new five-party implementation model called 5PAPS that provides much enhanced protection of the customer's privacy. The model combines the advantages of the e-cash techniques, the mix technique, the anonymous-honoring merchant model, and the anonymity-protecting payment gateway model. It is aimed for protecting the customer's anonymity in all applicable aspects. Security and anonymity issues of the model have been analyzed. The results show that the model is robust against varieties of common attacks and the customer's anonymity can be protected even in the presence of some collusion among the parties involved in the transactions. Experimental prototyping of the essential parts yields partial validation of the practical nature of the 5PAPS model, and it has also produced reliable estimates of the storage and messaging volume requirements present in sizable purchasing systems.

  1. 可追踪的匿名证书%The Traceable Anonymous Certificate

    Institute of Scientific and Technical Information of China (English)

    王兵

    2014-01-01

    This paper introduces the traceable anonymous certificate, and analyzes the proposed traceable anonymous certificate is⁃suing and tracing protocol in detail, the traceable anonymous certificate should possess two core characteristics: anonymity and non-repudiation, the two features ensure that users can prove the identity himself but without revealing his true identity, this certificate can be used to provide anonymous service in network application.%该文介绍了可追踪匿名证书,并对提出的可追踪匿名证书的发布和追踪协议进行了详细的分析,可追踪匿名证书应该具有匿名性和不可否认性两个核心特点,这两个特点保证了用户可以在不泄露自己的真实身份的情况下来证明用户的身份,这样的证书可以被用于需要提供匿名服务的网络应用中。

  2. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  3. Counseling through Images: Using Photography to Guide the Counseling Process and Achieve Treatment Goals

    Science.gov (United States)

    Ginicola, Misty M.; Smith, Cheri; Trzaska, Jessica

    2012-01-01

    Creative approaches to counseling help counselors to meet the needs of diverse populations. The utility of photography in counseling has been demonstrated through several case studies; however, clear implications of how photography relates to the counseling process have not been well delineated. The existing literature on phototherapy is reviewed…

  4. 36 CFR 1211.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 1211.425 Section 1211.425 Parks, Forests, and Public Property NATIONAL... Education Programs or Activities Prohibited § 1211.425 Counseling and use of appraisal and...

  5. Counseling Skills Pre-Practicum Training at Guidance and Counseling Undergraduate Programs: A Qualitative Investigation

    Science.gov (United States)

    Aladag, Mine

    2013-01-01

    This study was aimed to describe counseling skills pre-practicum training at guidance and counseling undergraduate programs in Turkey. A descriptive study was conducted based upon qualitative data. The research group of this study consisted of 11 guidance and counseling undergraduate programs voluntarily participate into study. The Survey Form…

  6. Trainees versus Staff: Exploring Counseling Outcomes in a College Counseling Center

    Science.gov (United States)

    Ilagan, Guy; Vinson, Mike; Sharp, Julia L.; Havice, Pamela; Ilagan, Jill

    2014-01-01

    Investigators compared counseling outcomes among nonpaid graduate-level trainees and professional staff at a college counseling center. Counseling outcomes for 331 college student participants were measured using the Outcome Questionnaire 45.2 (OQ45.2), employing a pretest--posttest design. The two groups of service providers did not differ…

  7. Using technology, choosing sex. The campaign against sex determination and the question of choice.

    Science.gov (United States)

    1992-01-01

    Women's groups and people's science and health groups formed the Forum Against Sex Determination and Sex Pre-Selection in November 1985 in Bombay, India, to prevent sex determination and sex preselection tests. The Forum considered sex determination and sex preselection to be an abuse of science and technology against people, especially women. Between 1901 and 1991, the sex ratio fell from 972 females/1000 males to 929/1000. The Forum saw the issue of sex determination and sex preselection as a link to oppression of and discrimination against females in all sectors of society. It also believed this to be a human rights issue. The Forum lobbied for a law regulating diagnostic techniques without banning them, since determining chromosomal abnormalities is important. The State of Maharashtra passed such a law in June 1988. It had some provisions which were counter-productive, however. For example, women undergoing a sex determination test must pay a fine of Rs 5 if found guilty of planning to terminate a pregnancy of a female fetus. Yet, neither the husband nor parents-in-law are liable, even though they often pressure women to undergo sex determination tests. The Forum's efforts and enactment of the law in Maharashtra have prompted other state governments and the central government to propose similar legislation. These state governments include Goa, Gujarat, and Orissa. The central government has met with organizations and individuals lobbying against misuse of diagnostic tests to obtain their counsel. The Forum does not feel comfortable with state control, however, since it tends to consider government to be against the people. Yet, the Forum did want the state to protect women's interests. It has raised important questions about technology, particularly concerning criteria to determine desirable and appropriate technologies. PMID:12286888

  8. Impact of Anonymity on Information Sharing through Internal Psychological Processes: A Case of South Korean Online Communities

    OpenAIRE

    Ho Lee; Jaewon Choi; Kyung Kyu Kim; Ae Ri Lee

    2014-01-01

    Many web users post their opinions and information without revealing their identities (i.e., demographics, social standing, and/or expertise); anonymity has become a common form of information exchange in online communities such as social media sites and Internet forums. In the meantime, negative social consequences have resulted from anonymous activities in online communities. Existing literature reports largely mixed results about the impact of online anonymity on online community outcomes....

  9. Knowledge of folic acid and counseling practices among Ohio community pharmacists

    Directory of Open Access Journals (Sweden)

    Rodrigues CR

    2012-09-01

    Full Text Available Objective: To determine knowledge of folic acid use for neural tube defect (NTD prevention and counseling practices among community pharmacists registered in Ohio.Methods: A cross-sectional study was performed on a random sample (n=500 of community pharmacists registered with the Ohio Board of Pharmacy and practicing in Ohio. A survey previously used by researchers to assess folic acid knowledge and practices among samples of other healthcare provider groups in the United States was adapted with permission for this study. The final tool consisted of 28 questions evaluating the knowledge, counseling practices, and demographics of respondents. The cover letter did not reveal the emphasis on folic acid, and surveys were completed anonymously. The university institutional review board deemed the study exempt.Results: Of the 122 pharmacists who completed the survey, 116 (95.1% knew that folic acid prevents some birth defects. Twenty-eight (22.9% responded that they “always” or “usually” discuss multivitamins with women of childbearing potential, and 19 (15.6% responded that they “always” or “usually” discuss folic acid supplements. Some gaps in knowledge specific to folic acid were revealed. While 63.1% of pharmacists selected the recommended dose of folic acid intake for most women of childbearing potential, 13.1% could identify the dose recommended for women who have had a previous NTD-affected pregnancy. Respondents identified continuing education programs, pharmacy journals/magazines, and the Internet as preferred avenues to obtain additional information about folic acid and NTD.Conclusion: This study represents the first systematic evaluation of folic acid knowledge and counseling practices among a sample of pharmacists in the United States. As highly accessible healthcare professionals, community pharmacists can fulfill a vital public health role by counseling women of childbearing potential about folic acid intake. Educational

  10. The Comparison of Attention Biases to Opiates in Substance Dependent and Treated Clients of Therapeutic Clinics and Narcotics Anonymous Memberships

    Directory of Open Access Journals (Sweden)

    Javad Enayat

    2012-11-01

    Full Text Available Aim: The purpose of this study was to compare the attention bias about tempting incentives related to opium materials in treated, addicted and normal people. Duration of consumption and treating were also considered. Method: In this causal-comparative study population was all addicted people who were referred to the rehabilitation offices, addiction treatment clinic, rebirthing centers and Narcotics Anonymous of East Azerbaijan. This study consisted of five groups of men, including addicted to opium materials which are divided into two groups namely: long consumption period and people with short consumption period, also, treated people including long term treated and short term treated, and a normal control group. Altogether, 103 selected people were studied. Sample groups were similar in terms of age, education, and sex. For measuring attention bias towards tempting stimuli related opiates, a words recognition test was used. This test included three subtests and one recognition test. The recognition scores for the three categories of words were measured. Results: The findings indicated that there was a difference in attention against opium material incentives between control group and the mild and severe consumers groups. Also there were significant differences between treated people with the short time distance and control group, and control group had less temptation and biases in comparison to the other groups. Finally, those who have mild consumption are threatened more in comparison with the control group. Conclusion: The findings have applied implications.

  11. Sexually transmitted infection screening and reproductive health counseling in adolescent renal transplant recipients: Perceptions and practice patterns. A study from the Midwest Pediatric Nephrology Consortium.

    Science.gov (United States)

    Ashoor, Isa F; Dharnidharka, Vikas R

    2015-11-01

    We wanted to identify practice patterns and perceived barriers among pediatric nephrologists regarding STI screening and reproductive health counseling in adolescent renal transplant recipients. We created an online Likert-scaled survey. Response rate was 54%. The majority (83%) believed STI risk in their patients was similar to or higher than healthy teens. Interestingly, while 67% felt moderately or very confident in asking about sexual activity and counseling about safer sex, only 43% routinely or always inquired about sexual activity, and only 42% routinely or always counseled about safer sex. Fifty-four percent routinely or always discussed contraceptive options and implications of unintentional pregnancy. Fifty-one percent routinely or always referred patients to a gynecologist or adolescent provider for contraception prescription. The most common counseling mechanism was informal discussions in clinic (87%). Ten percent had no mechanism in place. Major barriers included time limitations, adolescents' fear regarding confidentiality, and lack of professional training. This is the first report of perceptions and practice patterns of pediatric nephrologists regarding STI screening and reproductive health counseling. Providers seem to recognize the importance of counseling; however, translation into practice remains low. Professional training in this area and increased encounter time could improve counseling delivery and thereby reduce risk in this population. PMID:26260626

  12. Anonymity and informed consent in artificial procreation: a report from Denmark

    DEFF Research Database (Denmark)

    Lebech, Anne Mette

    1997-01-01

    problem concerning its application when dealing with people having a serious mental, social or even physical disability. Within the field of artificial procreation there are even more problems. Informed written consent is often demanded from anonymous donors of gametes in order to ensure their consent to...... the legal and moral consequences of their anonymity. The child resulting from the artificial procreation, on the contrary, cannot consent to, nor be informed before being conceived, of the secrecy laid on the identity of its genetic parents. Some countries resolve this problem by allowing the children......, when they reach their majority, to obtain some information pertaining to the health or the identity of their genetic parents. This presents ethical problems. It can be argued that the anonymity of the parents chiefly affects the children, so that an agreement on this point among parents, doctors and...

  13. Achieving k-anonymity Using Improved Greedy Heuristics for Very Large Relational Databases

    Directory of Open Access Journals (Sweden)

    Korra Sathya Babu

    2013-04-01

    Full Text Available Advances in data storage, data collection and inference techniques have enabled the creation of huge databases of personal information. Dissemination of information from such databases - even if formally anonymised, creates a serious threat to individual privacy through statistical disclosure. One of the key methods developed to limit statistical disclosure risk is k-anonymity. Several methods have been proposed to enforce k-anonymity notably Samarati's algorithm and Sweeney's Datafly, which both adhere to full domain generalisation. Such methods require a trade off between computing time and information loss. This paper describes an improved greedy heuristic for enforcing k-anonymity with full domain generalisation. The improved greedy algorithm was compared with the original methods. Metrics like information loss, computing time and level of generalisation were deployed for comparison. Results show that the improved greedy algorithm maintains a better balance between computing time and information loss.

  14. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions. PMID:26785867

  15. RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks

    Science.gov (United States)

    Wei, Yu-Chih; Chen, Yi-Ming; Shan, Hwai-Ling

    In Vehicular Networks, for enhancing driving safety as well as supporting other applications, vehicles periodically broadcast safety messages with their precise position information to neighbors. However, these broadcast messages make it easy to track specific vehicles and will likely lead to compromise of personal privacy. Unfortunately, current location privacy enhancement methodologies in VANET, including Pseudonymization, K-anonymity, Random silent period, Mix-zones and path confusion, all suffer some shortcomings. In this paper, we propose a RSSI (Received Signal Strength Indicator)-based user centric anonymization model, which can significantly enhance the location privacy and at the same time ensure traffic safety. Simulations are performed to show the advantages of the proposed method. In comparison with traditional random silent period method, our method can increase at least 47% of anonymity in both simple and correlation tracking.

  16. The French bioethics public consultation and the anonymity doctrine: empirical ethics and normative assumptions.

    Science.gov (United States)

    Spranzi, Marta; Brunet, Laurence

    2015-03-01

    The French bioethics laws of 1994 contain the principles of the anonymity and non commodification of all donations of body parts and products including gametes in medically assisted reproduction. The two revisions of the law, in 2004 and 2011 have upheld the rule. In view of the latest revision process, the French government organized a large public consultation in 2009 ("Etats généraux de la bioéthique"). Within the event a "consensus conference" was held in Rennes about different aspects of assisted reproduction (access, anonymity, gratuity and surrogacy). In what follows we shall first describe the anonymity clause for gamete donations in the French law and the debates surrounding it. We shall then analyse the procedure used for the 2009 public consultation and the related consensus conference, as well as its upshot concerning the anonymity doctrine. In this respect we shall compare the citizens' own recommendations on the gamete anonymity issue and its translation in the consultation's final report drafted by a philosopher mandated by the organizing committee. Whereas the final report cited some fundamental ethical arguments as reason for upholding the provisions of the law-most notably the refusal of the 'all biological' approach to reproductive issues-citizens were more careful and tentative in their position although they also concluded that for pragmatic reasons the anonymity rule should continue to hold. We shall argue that the conservative upshot of the public consultation is due to some main underlying presuppositions concerning the citizens' role and expertise as well as to the specific design of the consensus conference. Our conclusion will be that public consultations and consensus conferences can only serve as an empirical support for devising suitable bioethics norms by using second-order normative assumptions. PMID:25783454

  17. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    LENUS (Irish Health Repository)

    Walsh, Anthony PH

    2011-04-20

    Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004\\/23\\/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004\\/23\\/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  18. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.

    Science.gov (United States)

    Bushnag, Anas; Abuzneid, Abdelshakour; Mahmood, Ausif

    2016-01-01

    Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques. PMID:27355948

  19. Contemporary Counseling and Its Discontents: A Counselogist on Homo Consultans

    OpenAIRE

    Kargul, Józef

    2014-01-01

    The paper addresses risks and threats inherent in the “counseling boom”, which has affected the actual modes of help provision in guidance/counseling, and generated a unique “counseling fashion” for counseling of various kinds and hence, of various quality. Offering a critical analysis of counseling, the author proposes a few hypotheses about the phenomenon and posits that: (1) Some of the current counseling interventions—also within career counseling—are clearly market-driven; (2) Neoliberal...

  20. Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance

    OpenAIRE

    Ries, Thorsten; Panchenko, Andriy; State, Radu; Engel, Thomas

    2011-01-01

    The most popular system for providing practical low-latency anonymity on the Internet is Tor. However, many other tools besides Tor exist as both free and commercial solutions. In this paper, we consider five most popular low-latency anonymisation services that represent the current state of the art: single-hop proxies (Perfect Privacy and free proxies) and Onion Routing based solutions (Tor, I2P, and Jon-Donym). We assess their usability and rank them in regard to their anonymity. We also as...

  1. Online political discussions tend to be less civil when the participants are anonymous

    OpenAIRE

    Rowe, Ian

    2013-01-01

    Despite the internet’s unlimited potential in informing, engaging, and empowering citizens, it is all too often used as a forum for foul-tempered arguments behind a veil of anonymity, with obvious repercussions for our democracy. Drawing on a study of the content of comments left by readers of the Washington Post online, Ian Rowe argues that it is anonymity that is often to blame, and that the more accountable model used by Facebook holds hope for a more civil online political ...

  2. Determination of the Internet Anonymity Influence on the Level of Aggression and Usage of Obscene Lexis

    OpenAIRE

    Potapova, Rodmonga; Gordeev, Denis

    2015-01-01

    This article deals with the analysis of the semantic content of the anonymous Russian-speaking forum 2ch.hk, different verbal means of expressing of the emotional state of aggression are revealed for this site, and aggression is classified by its directions. The lexis of different Russian-and English- speaking anonymous forums (2ch.hk and iichan.hk, 4chan.org) and public community "MDK" of the Russian-speaking social network VK is analyzed and compared with the Open Corpus of the Russian lang...

  3. Open Access and Database Anonymization an Open Source Procedure Based on an Italian Case Study

    OpenAIRE

    Leschiutta, Luca; Futia, Giuseppe

    2014-01-01

    The only method, believed to be compliant to privacy laws, to open a database that contains personal data is anonymization. This work is focused on a car accidents database case study and on the Italian DP law. Database anonymization is described from a procedural point of view and it is explained how it is possible to complete the whole process relying solely on widespread open-source software applications. The proposed approach is empirical and is founded on the letter of the Italian privac...

  4. Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET

    Science.gov (United States)

    Park, Youngho; Sur, Chul; Jung, Chae Duk; Rhee, Kyung-Hyune

    In this paper, we propose an efficient authentication protocol with conditional privacy preservation for secure vehicular communications. The proposed protocol follows the system model to issue on-the-fly anonymous public key certificates to vehicles by road-side units. In order to design an efficient message authentication protocol, we consider a key-insulated signature scheme for certifying anonymous public keys of vehicles to such a system model. We demonstrate experimental results to confirm that the proposed protocol has better performance than other protocols based on group signature schemes.

  5. Sexual counselling for patients with cardiovascular disease: protocol for a pilot study of the CHARMS sexual counselling intervention

    Science.gov (United States)

    Mc Sharry, Jenny; Casey, Dympna; Doherty, Sally; Gillespie, Paddy; Jaarsma, Tiny; Murphy, Andrew W; Newell, John; O'Donnell, Martin; Steinke, Elaine E; Toomey, Elaine; Byrne, Molly

    2016-01-01

    Introduction Sexual problems are common with cardiovascular disease, and can negatively impact quality of life. To address sexual problems, guidelines have identified the importance of sexual counselling during cardiac rehabilitation, yet this is rarely provided. The Cardiac Health and Relationship Management and Sexuality (CHARMS) intervention aims to improve the provision of sexual counselling in cardiac rehabilitation in Ireland. Methods and analysis This is a multicentre pilot study for the CHARMS intervention, a complex, multilevel intervention delivered within hospital-based cardiac rehabilitation programmes. The intervention includes (1) training in sexual counselling for staff, (2) a staff-led patient education and support intervention embedded within the cardiac rehabilitation programme, (3) a patient information booklet and (4) an awareness raising poster. The intervention will be delivered in two randomly selected cardiac rehabilitation centres. In each centre 30 patients will be recruited, and partners will also be invited to participate. Data will be collected from staff and patients/partners at T1 (study entry), T2 (3-month follow-up) and T3 (6-month follow-up). The primary outcome for patients/partners will be scores on the Sexual Self-Perception and Adjustment Questionnaire. Secondary outcomes for patients/partners will include relationship satisfaction; satisfaction with and barriers to sexual counselling in services; sexual activity, functioning and knowledge; physical and psychological well-being. Secondary outcomes for staff will include sexuality-related practice; barriers to sexual counselling; self-ratings of capability, opportunity and motivation; sexual attitudes and beliefs; knowledge of cardiovascular disease and sex. Fidelity of intervention delivery will be assessed using trainer self-reports, researcher-coded audio recordings and exit interviews. Longitudinal feasibility data will be gathered from patients/partners and staff via

  6. Genetic Counseling: Implications for Community Counselors.

    Science.gov (United States)

    Bodenhorn, Nancy; Lawson, Gerard

    2003-01-01

    Special issue of the "Journal of Health Psychology" (Vol. 7, No. 2, 2002) was reviewed. Articles covered a variety of qualitative studies conducted using an interpretive phenomenological analysis method to examine the interviews with people who had received genetic testing and counseling. Implications for the broader counseling field were also…

  7. Counseling and Psychotherapy: A Comparative Analysis.

    Science.gov (United States)

    Rattner, Leo

    Counseling and psychotherapy are not the same, but rather represent two modalities with different theoretical premises which use different techniques and pursue different goals. Counseling always focuses on a specific subject and the interaction between the counselor and the client is generally goal-directed. The counselor focuses on the acute…

  8. Mindfulness-Based Interventions in Counseling

    Science.gov (United States)

    Brown, Amanda P.; Marquis, Andre; Guiffrida, Douglas A.

    2013-01-01

    Mindfulness is a relatively new construct in counseling that is rapidly gaining interest as it is applied to people struggling with a myriad of problems. Research has consistently demonstrated that counseling interventions using mindfulness improve well-being and reduce psychopathology. This article provides a detailed definition of mindfulness,…

  9. College and Career Counseling Training Initiative

    Science.gov (United States)

    Southern Regional Education Board (SREB), 2014

    2014-01-01

    The Southern Regional Education Board's (SREB) College and Career Counseling Training Initiative works to increase the knowledge and skills of counselors who advise students on their postsecondary aspirations. Membership in the initiative provides access to Strategies in College and Career Counseling, a series of online training modules that can…

  10. Consciousness Counseling: New Roles and New Goals.

    Science.gov (United States)

    Roberts, Thomas Bradford

    1979-01-01

    Presents a systematic attempt to help counselors operate within the areas of transcendence and states of consciousness. Consciousness counseling recognizes that human experience includes the person and that it also goes beyond the self to include transpersonal experiences. Consciousness counseling recognizes that people experience many states of…

  11. Developing a Transpersonal Approach to Pastoral Counselling.

    Science.gov (United States)

    Sutherland, Mark

    2001-01-01

    A key area of difficulty for those engaged in pastoral counseling often concerns the adequate integration of pastoral, psychological and spiritual concepts and resources. Proposes that existing forms of Christian pastoral counseling will benefit through a deeper use of spiritual resources drawing both on transpersonal psychology and the tradition…

  12. Mental Health Counseling: A Stakeholder's Manifesto.

    Science.gov (United States)

    Beck, Edward S.

    1999-01-01

    Discusses the original dreams of the founders of the American Mental Health Counselors Association; looks at history and comments on the state of mental health counseling as it has struggled to evolve as a profession. Urges those in the counseling profession to consider an acquisitions and mergers corporate mentality to ensure and enhance the…

  13. 33 CFR 1.07-40 - Counsel.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Counsel. 1.07-40 Section 1.07-40 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL GENERAL PROVISIONS Enforcement; Civil and Criminal Penalty Proceedings § 1.07-40 Counsel. A party has the right to be...

  14. Integrating Internationalization in Counseling Psychology Training Programs

    Science.gov (United States)

    Turner-Essel, Laura; Waehler, Charles

    2009-01-01

    Previous scholars have made specific suggestions regarding what counseling psychology training programs can do to help future psychologists become more cross-culturally aware. This article addresses the questions of whether and how U.S. counseling psychology training programs are currently employing these suggestions. Forty-seven American…

  15. Marital and Family Counseling in Prisons.

    Science.gov (United States)

    Showalter, David; Jones, Charlotte Williams

    1980-01-01

    Describes series of successful marital workshops conducted at Kansas State Penitentiary, involving problems of inmates, their wives and children. Marital and family counseling seen as effective in implementing changes in inmates' attitudes and behaviors. Recommends marital counseling in all penitentiaries; suggests social workers work to make…

  16. Venezuelan Counseling: Advancement and Current Challenges

    Science.gov (United States)

    Vera, George Davy

    2011-01-01

    In the worldwide community it is not well known that counseling and guidance professional practices have a long tradition in Venezuela. Therefore, this contribution's main purpose is to inform the international audience about past and contemporary counseling in Venezuela. Geographic, demographic, and cultural facts about Venezuela are provided.…

  17. Narrative Counseling for Professional School Counselors

    Science.gov (United States)

    Nafziger, Jacinta; DeKruyf, Lorraine

    2013-01-01

    This article introduces narrative counseling concepts and techniques for professional school counselors. The authors provide a case study of narrative school counseling with an elementary student struggling with selective mutism. Examples also demonstrate how a narrative approach could be used at elementary, middle, and high school levels within…

  18. Counselling young cannabis users by text message

    DEFF Research Database (Denmark)

    Laursen, Ditte

    2010-01-01

    factual information to advice and counselling. The messages prompt reflection and awareness among the recipients, and their repetitive, serial nature plays a significant part in the process of change. This is especially true of the young people whose use of cannabis is recreational. For them, the SMS...... services offer a less demanding, potentially less confrontational alternative to traditional forms of counselling and treatment....

  19. Mergers & Acquisitions: Counseling and Choice of Method

    DEFF Research Database (Denmark)

    Fomcenco, Alex

    MERGERS & ACQUISITIONS: Counseling and Choice of Method describes and analyzes the current state of law in Europe in regard to some relevant selected elements related to mergers and acquisitions, and the adviser’s counsel in this regard. The focus is aimed and maintained at application and...

  20. Qualitative Research in Counseling Psychology: Conceptual Foundations

    Science.gov (United States)

    Morrow, Susan L.

    2007-01-01

    Beginning with calls for methodological diversity in counseling psychology, this article addresses the history and current state of qualitative research in counseling psychology. It identifies the historical and disciplinary origins as well as basic assumptions and underpinnings of qualitative research in general, as well as within counseling…

  1. Cinderella and Science: Career Counseling and Girls.

    Science.gov (United States)

    Verheyden-Hilliard, Mary Ellen

    The need for educational and career counseling for girls and women is described in this paper. Expectations, the "Cinderella syndrome", independence, and adolescence are discussed. Factors which reduce girls' aspirations and options are identified. Career counseling that concerns itself with strength, independence, role model equality, and sharing…

  2. Multicultural Counseling and the Orthodox Jew

    Science.gov (United States)

    Schnall, Eliezer

    2006-01-01

    The cultural diversity literature largely ignores the effects of religion, and especially Judaism, on counseling and psychotherapy. The author reviews the meager and mostly anecdotal accounts relating to Orthodox Jews in the literature of several related disciplines, including counseling, social work, psychology, and psychiatry. The objective is…

  3. Formal and Applied Counseling in Israel

    Science.gov (United States)

    Israelashvili, Moshe; Wegman-Rozi, Orit

    2012-01-01

    Living in Israel is intensive and demanding but also meaningful and exciting. This article addresses the gap between the narrowly defined formal status of counseling in Israel and the widespread occurrence of counseling in various settings. It is argued that several recent changes, especially in the definition of treatment, along with the…

  4. A Model for Counselling Cancer Patients.

    Science.gov (United States)

    Jevne, Ronna F.; Nekolaichuk, Cheryl L.; Williamson, F. Helen A.

    1998-01-01

    Describes a model for counseling cancer patients that integrates the unique features of the cancer experience within a basic counseling framework. It combines a nine-step problem-solving approach with a biopsychosocial perspective, placing greater emphasis on the person than the problem. Utilizes innovative questioning techniques and strategies.…

  5. Education and counseling children about physical health.

    NARCIS (Netherlands)

    Theunissen, N.C.M.; Tates, K.; Visser, A.

    2004-01-01

    The amount and variety of research in patient education and counseling has increased substantially during the last decades. However, studies that aimed at children are still relatively scarce. In this special issue, are view is presented of recent studies on educating and counseling children about t

  6. The Ethics of Prayer in Counseling

    Science.gov (United States)

    Weld, Chet; Eriksen, Karen

    2007-01-01

    Spirituality has become increasingly important in counseling, with prayer being the spiritual intervention of choice for Christian counselors. The controversial nature of including prayer in counseling requires careful consideration of ethical issues. This article addresses the intersection of spiritual interventions, particularly prayer, with…

  7. Using Multilevel Modeling in Counseling Research

    Science.gov (United States)

    Lynch, Martin F.

    2012-01-01

    This conceptual and practical overview of multilevel modeling (MLM) for researchers in counseling and development provides guidelines on setting up SPSS to perform MLM and an example of how to present the findings. It also provides a discussion on how counseling and developmental researchers can use MLM to address their own research questions.…

  8. The use of telephone in genetic counseling versus in-person counseling: a randomized study on counselees’ outcome

    OpenAIRE

    Platten, Ulla; Rantala, Johanna; Lindblom, Annika; Brandberg, Yvonne; Lindgren, Gunilla; Arver, Brita

    2012-01-01

    Increased demand for genetic counseling services necessitates exploring alternatives to in-person counseling. Telephone counseling is a less time-consuming and more cost-effective alternative. So far there is insufficient evidence to support a pre-counseling telephone model. This randomized questionnaire study aims to evaluate the oncogenetic counseling process and to compare the impact of the initial part of the oncogenetic counseling, when conducted via telephone versus in-person. The aspec...

  9. Switzerland's videotex computer sex education programme.

    Science.gov (United States)

    Barbey, M A

    1991-05-01

    Switzerland's videotex computer sex education program in French is a telematic service set up in youth centers, schools and post offices, or for a monthly home rental charge of 9 swiss francs. German and Italian versions will be available by the end of 1991. CIAO receives 100 calls a month, or 20,000 screen page consultations. Anonymity is assured for caller and specialist through identification by pseudonym. This article discusses the experience of 2 trained specialists, a social worker and a sex education teacher, who answer questions. 70% of callers are boys, perhaps due to greater familiarity with computers, and to public location and freer attitude talking about sex in a group. Girls may use family planning centers for their questions. The typical boys 13-15 years questions concern anatomy and the size of the penis, breast stimulation, masturbation. Guilt and fear of consequences are communicated. Adolescents tend to focus on relationships, with shyness a typical pattern. There is expressed concern for whether it's OK to sexually explore certain sex zones, and what tells me she's happy. Communication between partners about sex is the difficulty and specialists emphasize asking the girl herself how she feels. With increasing age, the focus is very specific; i.e., premature ejaculation, STD's, homosexuality, but also with concern for knowledge about normal love-making and worry about not wanting it enough. In general, questions tend to be bound by traditional roles and questions on contraception are rare. Condom questions are usually related to AIDs. Questions express self-doubt and honesty, which sometimes focuses on the tragedy of sexual abuse, rape, AIDS, and suicide. Specialists find the work rewarding and helpful in sex education discussions in the classroom; great respect for young people is generated. PMID:12343175

  10. 78 FR 64141 - 30-Day Notice of Proposed Information Collection: Certificate of Housing Counseling...

    Science.gov (United States)

    2013-10-25

    ... Collection: Certificate of Housing Counseling: Homeownership and Certificate of Housing Counseling: Home... Counseling: Homeownership and Certificate of Housing Counseling: Home Retention. OMB Approval Number: 2502... Information and Proposed Use: Counseling certificates will provide proof to lenders and other...

  11. Fertility Issues in Disorders of Sex Development.

    Science.gov (United States)

    Guercio, Gabriela; Costanzo, Mariana; Grinspon, Romina P; Rey, Rodolfo A

    2015-12-01

    Fertility potential should be considered by the multidisciplinary team when addressing gender assignment, surgical management, and patient and family counselling of individuals with disorders of sex development. In 46,XY individuals, defects of gonadal differentiation or androgen or anti-Müllerian hormone synthesis or action result in incomplete or absent masculinization. In severe forms, raised as females, motherhood is possible with oocyte donation if Müllerian ducts have developed. In milder forms, raised as males, azoospermia or oligospermia are frequently found, however paternity has been reported. Most 46,XX patients with normal ovarian organogenesis are raised as females, and fertility might be possible after treatment. PMID:26568498

  12. Effect Of Diet Counseling On Type 2 Diabetes Mellitus

    Directory of Open Access Journals (Sweden)

    Kusumaneela Bolla

    2015-08-01

    Full Text Available Abstract Diabetes is a metabolic disorder. Metabolism is the way the uses digested food for growth amp energy. Importance of diet in diabetes can be treated back to the days of the ancient ayurvedic physician Sushreeta. Type of diabetes age of the patient body weight severity of the hyperglycemia associated complications and mode of treatment being followed determine the exact allowance and type of diet. This needs to be worked out for each individual diabetic. Dietary management is the corn stone of diabetes treatment and should receive the almost consideration by the patient and by the treating physician. Objective To assess The Nutritional Status and To Study the Effect Of Diet Counseling on Type II Diabetic Patients. Methodology For this study from diabetic hospital in Vijayawada were selected. In this study 40 samples age 30 to 60 years. They belong to age between 30 to 60 years. Preparation of Questionnaire to collect the General information age sex past history of subjects Anthropometric data Biochemical information Dietary information. Conclusion There is significant changes in the blood sugar levels after the diet counseling. Intake of the high amounts of the fiber low glycemic foods and functional foods helps to reduce the blood sugar levels randomly.

  13. What's in a Name? Some Reflections on the Sociology of Anonymity.

    Science.gov (United States)

    Marx, Gary T.

    1999-01-01

    Presents seven types of identity knowledge. Identifies major rationales and contexts for anonymity and identifiability and suggests a principle which holds that those who use pseudonyms on the Internet in personal communications are obliged to indicate they are doing so. Suggests 13 procedural questions to guide the development and assessment of…

  14. Mesh Technique for Nymble Architecture Sustaining - Secrecy and Security in Anonymizing Networks

    Directory of Open Access Journals (Sweden)

    J.Praveen Kumar

    2013-03-01

    Full Text Available Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks, however, hasbeen limited by users employing this secrecy for abusive purposes such as defacing popular websites. Website administrators routinely rely on IP-address blocking for disabling access to misbehaving users, but blocking IP addresses is not practical if the abuser routes through an anonymizing network. As a result, administrators block all known exit nodes of anonymizing networks, denying secrecy access to misbehaving and behaving users alike. To address this problem, present Nymble, a system in which servers can “blacklist”misbehaving users, thereby blocking users without compromising their anonymity. Our system is thus agnostic to different servers’ definitions of misbehavior servers can blacklist user’s .by using of Mesh technique. Which has been completely blocked by several services because of users who abuse their secrecy and providing security with MD5 algorithm

  15. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme. PMID:25276847

  16. Improvement of the security of quantum protocols for anonymous voting and surveying

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Several quantum protocols were proposed in a recent paper by Vaccaro,Spring and Chefles for ensuring the anonymous voting in a number of different scenarios.However,it is shown that their protocols are very vulnerable in terms of security.Improved schemes are also presented to recover the security.

  17. Brother-Sister Incest: Data from Anonymous Computer-Assisted Self Interviews

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel; Stroupe, Walter

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self interview. Forty were classified as victims of brother-sister incest, 19 were classified as victims of father-daughter incest, and 232 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The…

  18. Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones

    Science.gov (United States)

    Gow, Gordon A.; Parisi, Jennifer

    2008-01-01

    In recent years there has been concern among law enforcement and national security organizations about the use of "anonymous" prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates…

  19. Leadership Style, Anonymity, and Creativity in Group Decision Support Systems: The Mediating Role of Optimal Flow.

    Science.gov (United States)

    Sosik, John J.; Kahai, Surinder S.; Avolio, Bruce J.

    1999-01-01

    A study involving 159 undergraduates found that flow (a psychological state characterized by concentration, enjoyment, and intrinsic motivation) mediated effects of leadership style on creativity in a Group Decision Support System (GDSS) context, and that its role may be moderated by anonymity. Results also indicated that both flow and anonymity…

  20. Anonymity in giving in a natural context - a field experiment in 30 churches

    NARCIS (Netherlands)

    Soetevent, AR

    2005-01-01

    The role of anonymity in giving is examined in a field experiment performed in 30 Dutch churches. For a period of 29 weeks, the means by which offerings are gathered is determined by chance, prescribing for each offering the use of either 'closed' collection bags or open collection baskets. When usi