WorldWideScience

Sample records for anonymous sex counselling

  1. Research into the efficacy and cost-effectiveness of brief, free of charge and anonymous sex counselling to improve (mental health in youth: Design of a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Veen Evert

    2009-12-01

    Full Text Available Abstract Background The capacity to form romantic relationships and sexual health of adolescents in the Netherlands are compromised by several factors, including young age of first intercourse and adolescent depression. Several thresholds like own expenses, trust and embarrassment prevent adolescents to seek help for their sexual problems. To overcome these thresholds, brief sex counselling has been developed. It has been used since 2006 within the Rotterdam-Rijnmond Public Health Service, but there is lack of information about the (cost- effectiveness. In the current study we will evaluate the (cost- effectiveness of brief sex counselling for sexual problems in adolescents and young adults between 18 and 25 years of age. Methods In a randomised controlled trial we will compare (1 brief sex counselling with (2 intensive sexological treatment, and (3 delayed treatment (waiting list. Embedded in this RCT will be a trial-based economic evaluation, looking at the cost-effectiveness and cost-utility of brief sex counselling versus the two other interventions. Four hundred fifty adolescents (aged 18-25 with sexual problems will be recruited among the persons who visit the Public Health Service (PHS and through various websites. After a screening procedure, eligible participants will be randomly allocated to one of the three intervention groups. Primary outcome measure of the clinical evaluation is the severity of sexual problems. Other outcomes include psychological distress, especially depression. The economic evaluation will be performed from a societal perspective. Costs will be assessed continuously by a retrospective questionnaire covering the last 3 month. All outcome assessments (including those for the economic evaluation will take place via the internet at baseline, and at 3, 6, 9, and 12 months after baseline. Discussion The proposed research project will be the first study to provide preliminary data about the effect and cost

  2. Motivational Counseling: Implications for Counseling Male Juvenile Sex Offenders

    Science.gov (United States)

    Patel, Samir H.; Lambie, Glenn W.; Glover, Michelle Muenzenmeyer

    2008-01-01

    Juvenile sex offenders (JSOs) often appear unmotivated to change, which thus necessitates a therapeutic approach that matches "resistant" client characteristics. In this article, the authors review common traits of JSOs, introduce motivational counseling as an effective treatment modality, and offer a case illustration. (Contains 1 table and 1…

  3. Anonymous sex and HIV risk practices among men using the Internet specifically to find male partners for unprotected sex.

    Science.gov (United States)

    Klein, H

    2012-06-01

    To examine the popularity of anonymous sex practices among men using the Internet to find male partners for unprotected sex, and how anonymous sex relates to involvement in other HIV-related risk behaviours, and to investigate the factors associated with engaging in anonymous sex. Structured telephone interviews were conducted with men who used the Internet specifically to find male partners for unprotected sex. Random sampling from 16 websites was used to obtain a national sample. The data reported in this paper were based on quantitative interviews collected with a cross-sectional study design. Between January 2008 and May 2009, confidential telephone interviews lasting approximately 1-2 h were completed with 332 men. Participants were paid $35 for their participation. Most of the men (67.4%) liked anonymous sex, and slightly more than half (51.2%) had engaged in the behaviour during the month prior to interview. Involvement in anonymous sex was associated with greater involvement in a variety of human immunodeficiency virus (HIV)-related risk practices, such as illegal drug use, number of sex partners, and amount of unprotected sex. Four factors were associated with having vs not having anonymous sex: (1) being HIV positive; (2) answering all of the HIV-related knowledge questions correctly; (3) deriving greater enjoyment from having sex in public places, such as parks, public toilets, or adult book shops; and (4) greater impulsivity. Seven factors were associated with greater vs lesser involvement in anonymous sex among those practising the behaviour: (1) being involved in a relationship with a long-term partner; (2) liking to have sex in public places; (3) using bareback-oriented websites to identify sex partners; (4) greater impulsivity; (5) low level of condom use self-efficacy; (6) greater knowledge about HIV/acquired immunodeficiency syndrome; and either (7a) severe childhood maltreatment or (7b) Caucasian race. Men in this population often sought

  4. Anonymous or confidential HIV counseling and voluntary testing in federally funded testing sites--United States, 1995-1997.

    Science.gov (United States)

    1999-06-25

    Human immunodeficiency virus (HIV) counseling and voluntary testing (CT) programs have been an important part of national HIV prevention efforts since the first HIV antibody tests became available in 1985. In 1995, these programs accounted for approximately 15% of annual HIV antibody testing in the United States, excluding testing for blood donation. CT opportunities are offered to persons at risk for HIV infection at approximately 11,000 sites, including dedicated HIV CT sites, sexually transmitted disease (STD) clinics, drug-treatment centers, hospitals, and prisons. In 39 states, testing can be obtained anonymously, where persons do not have to give their name to get tested. All states provide confidential testing (by name) and have confidentiality laws and regulations to protect this information. This report compares patterns of anonymous and confidential testing in all federally funded CT programs from 1995 through 1997 and documents the importance of both types of testing opportunities.

  5. Social work practice and sex counseling | Nitin | East African Journal ...

    African Journals Online (AJOL)

    Sex counselors and Clinical Psychologist today need to understand the changing social environment and challenging role in making people accept normal sexual practices, abstaining from perversion and safe sexual rehabilitation by behavioral therapy and counseling for having happy marital life. Challenges in sex ...

  6. Sex Differences in Attitudes towards Online Privacy and Anonymity among Israeli Students with Different Technical Backgrounds

    Science.gov (United States)

    Weinberger, Maor; Zhitomirsky-Geffet, Maayan; Bouhnik, Dan

    2017-01-01

    Introduction: In this exploratory study, we proposed an experimental framework to investigate and model male/female differences in attitudes towards online privacy and anonymity among Israeli students. Our aim was to comparatively model men and women's online privacy attitudes, and to assess the online privacy gender gap. Method: Various factors…

  7. Revisiting relationships between sex-related variables and continuation in counseling.

    Science.gov (United States)

    Hatchett, Gregory T; Park, Heather L

    2004-04-01

    This study examined the relationships between three sex-related variables (client sex, therapist sex, and dyad matching on sex) and continuation in counseling. 245 college students who were clients at three university counseling centers participated. Consistent with previous studies, women comprised 68.2% of the clients seeking services at these counseling centers. Clients' sex was significantly related to counseling duration, explaining 2.2% of the common variance. Female clients, on the average, attended 1.8 more sessions than male clients. However, neither the therapists' sex nor dyad matching on sex was significantly related to the duration of counseling. None of the sex-related variables correlated with premature termination of counseling. The results have implications for providing counseling and outreach services to male students. Despite relatively equivalent rates in the incidence of mental health problems, female students continue to comprise the majority of clients. Therefore, university counseling centers need to communicate their services better to male students in need of mental health services.

  8. Finding erotic oases: locating the sites of men's same-sex anonymous sexual encounters.

    Science.gov (United States)

    Tewksbury, Richard

    2008-01-01

    Because anonymous sexual relations between two men are widely considered deviant many men seeking such activities look to erotic oases-natural environments appropriated for covert, often furtive sexual purposes. Previous research on erotic oases has focused on characteristics of involved men and processes of locating, negotiating with, and consummating sexual relations with others. This study draws on one major Web site listing of "cruising places" in the United States to identify common locations for erotic oases. Results show that the most common locations identified as erotic oases by users are public parks, adult bookstores, health clubs, and college campuses. Locations most likely to be listed as believed to be under law enforcement surveillance are outdoor, high traffic locations. Based on these results existing research has only begun to examine the most common locations for this highly stigmatized, deviant behavior and subculture.

  9. Client Discourses on the Process of Seeking Same-Sex Couple Counselling

    Science.gov (United States)

    Grove, Jan; Peel, Elizabeth; Owen-Pugh, Valerie

    2013-01-01

    How same-sex couples manage the process of seeking help for their relationships is an under-researched area. Twelve semi-structured interviews were conducted with 16 people who had engaged in same-sex couple counselling, and were analysed using discourse analysis. The ways in which the couples positioned themselves as part of a "minority…

  10. The Effects of Sex Education on Psychological Counselling Students in Turkey

    Science.gov (United States)

    Çuhadaroglu, Alper

    2017-01-01

    Sex education is not included in Turkey's national curriculum and is rarely referenced in school and university curricula. This is even true for those undertaking training in psychological counselling where the need may be great. Only a very few university schools of education offer an elective sex education course. A group of 64 guidance and…

  11. Sex-Role Stereotypes and Conceptions of Mental Health of Graduate Students in Counseling.

    Science.gov (United States)

    Terrill, Marilyn J.

    The design of this study closely follows one by Broverman in order to test the applicability of results to graduate students in counseling and counselor education programs. Subjects were administered the Sex-Role Questionnaire; masculinity, femininity, and adult agreement and health scores were computed and compared by t-tests. Results indicated…

  12. Sex-Typing and the Politics of Language in Counseling and Psychotherapy.

    Science.gov (United States)

    Pepinsky, Harold B.

    Male chauvinism and its counterpart, a hostile feminism, are inherently competitive stances. The discord can be mitigated, however, by a redefinition of the work situation. To cite one example of the changes which can be brought about with respect to sex-typing and the politics of language in counseling and psychotherapy, a constructive…

  13. Marriage Equality for Same-Sex Couples: Counseling Psychologists as Social Change Agents

    Science.gov (United States)

    Rostosky, Sharon S.; Riggle, Ellen D. B.

    2011-01-01

    The denial of civil marriage rights is a specific example of minority stress that can negatively affect the psychosocial well-being of self-identified lesbian, gay, bisexual, transgender, and queer (LGBTQ) individuals in same-sex partnerships, their families, and their allies. Counseling psychologists have an important role in addressing the…

  14. Clients of sex workers in Switzerland: it makes sense to counsel and propose rapid test for HIV on the street, a preliminary report.

    Science.gov (United States)

    Diserens, Esther-Amélie; Bodenmann, Patrick; N'Garambe, Chantal; Ansermet-Pagot, Anne; Vannotti, Marco; Masserey, Eric; Cavassini, Matthias

    2010-03-19

    Clients of street sex workers may be at higher risk for HIV infection than the general population. Furthermore, there is a lack of knowledge regarding HIV testing of clients of sex workers in developed countries. This pilot study assessed the feasibility and acceptance of rapid HIV testing by the clients of street-based sex workers in Lausanne, Switzerland. For 5 evenings, clients in cars were stopped by trained field staff for face-to-face interviews focusing on sex-related HIV risk behaviors and HIV testing history. The clients were then offered a free anonymous rapid HIV test in a bus parked nearby. Rapid HIV testing and counselling were performed by experienced nurse practitioners. Clients with reactive tests were offered confirmatory testing, medical evaluation, and care in our HIV clinic. We intercepted 144 men, 112 (77.8%) agreed to be interviewed. Among them, 50 (46.6%) had never been tested for HIV. A total of 31 (27.7%) rapid HIV tests were performed, 16 (51.6%) in clients who had not previously been tested. None were reactive. Initially, 19 (16.9%) additional clients agreed to HIV testing but later declined due to the 40-minute queue for testing. This pilot study showed that rapid HIV testing in the red light district of Lausanne was feasible, and that the clients of sex workers accepted testing at an unexpectedly high rate. This setting seems particularly appropriate for targeted HIV screening, since more than 40% of the clients had not previously been tested for HIV even though they engaged in sex-related HIV risk behaviour.

  15. A Single Transcriptome of a Green Toad (Bufo viridis Yields Candidate Genes for Sex Determination and -Differentiation and Non-Anonymous Population Genetic Markers.

    Directory of Open Access Journals (Sweden)

    Jörn F Gerchen

    Full Text Available Large genome size, including immense repetitive and non-coding fractions, still present challenges for capacity, bioinformatics and thus affordability of whole genome sequencing in most amphibians. Here, we test the performance of a single transcriptome to understand whether it can provide a cost-efficient resource for species with large unknown genomes. Using RNA from six different tissues from a single Palearctic green toad (Bufo viridis specimen and Hiseq2000, we obtained 22,5 Mio reads and publish >100,000 unigene sequences. To evaluate efficacy and quality, we first use this data to identify green toad specific candidate genes, known from other vertebrates for their role in sex determination and differentiation. Of a list of 37 genes, the transcriptome yielded 32 (87%, many of which providing the first such data for this non-model anuran species. However, for many of these genes, only fragments could be retrieved. In order to allow also applications to population genetics, we further used the transcriptome for the targeted development of 21 non-anonymous microsatellites and tested them in genetic families and backcrosses. Eleven markers were specifically developed to be located on the B. viridis sex chromosomes; for eight markers we can indeed demonstrate sex-specific transmission in genetic families. Depending on phylogenetic distance, several markers, which are sex-linked in green toads, show high cross-amplification success across the anuran phylogeny, involving nine systematic anuran families. Our data support the view that single transcriptome sequencing (based on multiple tissues provides a reliable genomic resource and cost-efficient method for non-model amphibian species with large genome size and, despite limitations, should be considered as long as genome sequencing remains unaffordable for most species.

  16. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  17. An overview of anonymity and anonymous communication

    NARCIS (Netherlands)

    Koot, M.

    2008-01-01

    Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of

  18. Counselling clients to follow 'the rules' of safe sex and ARV treatment

    DEFF Research Database (Denmark)

    Mubanda Rasmussen, Louise

    2013-01-01

    Ideas of ‘responsible sexuality’ are located at the centre of counselling in current antiretroviral treatment (ART) programmes. This paper analyses counselling practices in three HIV/AIDS clinics in Uganda on the basis of participant observation of counselling sessions and interviews...... behaviour. To explore this phenomenon, the paper analyses a number of dynamics characterising HIV counselling in Uganda, including the pressures of the global bio-political project to ‘save lives’ with ART, the counsellors' working conditions in resource-constrained clinics, the professional authority...

  19. Anonymous steps: gender and Gamblers Anonymous

    OpenAIRE

    Rogers, Jim

    2015-01-01

    The biggest source of help for problem gamblers remains gamblers anonymous (GA) in terms of accessibility and availability. GA has traditionally been very much a male preserve. This paper reports on a literature review of Gamblers Anonymous together with data from observations of a contemporary open GA meeting over a one year period. Whilst some studies from North America suggest a changing culture and gender balance within GA programmes observations from the North of England, supported b...

  20. Determinants of unmet needs for healthcare and sexual health counselling among Ugandan university students with same-sex sexuality experience.

    Science.gov (United States)

    Larsson, Markus; Ross, Michael W; Tumwine, Gilbert; Agardh, Anette

    2016-01-01

    Research from sub-Saharan Africa has shown that persons with same-sex sexuality experience are at elevated risk for ill health due to sexual risk taking, stigma, and discrimination. However, studies of healthcare seeking among young people in this region with same-sex sexuality experience are limited. To identify determinants of unmet healthcare and sexual health counselling needs, respectively, among Ugandan university students with experience of same-sex sexuality. In 2010, 1,954 Ugandan university students completed a questionnaire assessing socio-demographic factors, mental health, alcohol usage, sexual behaviours, and healthcare seeking. The study population consisted of those 570 who reported ever being in love with, sexually attracted to, sexually fantasised about, or sexually engaged with someone of the same sex. Findings showed that 56% and 30% reported unmet healthcare and sexual health counselling needs, respectively. Unmet healthcare needs were associated with poor mental health and exposure to sexual coercion (OR 3.9, 95% confidence intervals [CI]: 2.7-5.7; OR 2.0, 95% CI: 1.3-3.0, respectively). Unmet sexual health counselling needs were significantly associated with poor mental health (OR 3.2, 95% CI: 2.1-4.8), exposure to sexual coercion (OR 2.6, 95% CI: 1.7-3.9), frequent heavy episodic drinking (OR 3.3, 95% CI: 1.9-5.8), and number of sexual partners (OR 1.9, 95% CI: 1.04-3.3). The associations between poor mental health, sexual coercion, and unmet healthcare needs (AOR 4.2, 95% CI: 2.1-8.5; AOR 2.8, 95% CI: 1.3-5.8) and unmet needs for sexual health counselling (AOR 3.3, 95% CI: 1.6-7.1; AOR 2.7, 95% CI: 1.4-5.4) persisted after adjustment for socio-demographic factors, number of sexual partners, and frequent heavy episodic drinking. These findings indicate that exposure to sexual coercion and poor mental health may influence healthcare seeking behaviours of same-sex sexuality experienced students. Targeted interventions that integrate mental

  1. Determinants of unmet needs for healthcare and sexual health counselling among Ugandan university students with same-sex sexuality experience

    Directory of Open Access Journals (Sweden)

    Markus Larsson

    2016-03-01

    Full Text Available Background: Research from sub-Saharan Africa has shown that persons with same-sex sexuality experience are at elevated risk for ill health due to sexual risk taking, stigma, and discrimination. However, studies of healthcare seeking among young people in this region with same-sex sexuality experience are limited. Objective: To identify determinants of unmet healthcare and sexual health counselling needs, respectively, among Ugandan university students with experience of same-sex sexuality. Design: In 2010, 1,954 Ugandan university students completed a questionnaire assessing socio-demographic factors, mental health, alcohol usage, sexual behaviours, and healthcare seeking. The study population consisted of those 570 who reported ever being in love with, sexually attracted to, sexually fantasised about, or sexually engaged with someone of the same sex. Results: Findings showed that 56% and 30% reported unmet healthcare and sexual health counselling needs, respectively. Unmet healthcare needs were associated with poor mental health and exposure to sexual coercion (OR 3.9, 95% confidence intervals [CI]: 2.7–5.7; OR 2.0, 95% CI: 1.3–3.0, respectively. Unmet sexual health counselling needs were significantly associated with poor mental health (OR 3.2, 95% CI: 2.1–4.8, exposure to sexual coercion (OR 2.6, 95% CI: 1.7–3.9, frequent heavy episodic drinking (OR 3.3, 95% CI: 1.9–5.8, and number of sexual partners (OR 1.9, 95% CI: 1.04–3.3. The associations between poor mental health, sexual coercion, and unmet healthcare needs (AOR 4.2, 95% CI: 2.1–8.5; AOR 2.8, 95% CI: 1.3–5.8 and unmet needs for sexual health counselling (AOR 3.3, 95% CI: 1.6–7.1; AOR 2.7, 95% CI: 1.4–5.4 persisted after adjustment for socio-demographic factors, number of sexual partners, and frequent heavy episodic drinking. Conclusions: These findings indicate that exposure to sexual coercion and poor mental health may influence healthcare seeking behaviours of

  2. Shaping parents: impact of contrasting professional counseling on parents' decision making for children with disorders of sex development.

    Science.gov (United States)

    Streuli, Jürg C; Vayena, Effy; Cavicchia-Balmer, Yvonne; Huber, Johannes

    2013-08-01

    The management of disorders or differences of sex development (DSD) remains complex, especially with respect to parents' decision for or against early genitoplasty. Most parents still tend to disfavor postponing surgery until the child is old enough to provide consent. To identify the determinants of parental decisions for or against early sex assignment surgery in DSD children, and in particular to assess the influence of contrasting behavior of health-care professionals and the information they dispense. Preliminary data analysis from a focus group identified two broad approaches to counseling information. Two six-minute counseling videos were produced on this basis: one medicalized, by an endocrinologist, the other demedicalized, by a psychologist. Third-year medical students (N = 89) were randomized to watch either video as prospective parents and report its impact on their decision in a self-administered questionnaire. Statistical analysis of questionnaire responses regarding decisions for or against surgery, including self-assessed impact of potential determinants. Thirty-eight of eighty-nine "parents" (43%) chose early surgery for "their" child, including 27/41 "parents" (66%) shown the medicalized video vs. 11/48 (23%) shown the demedicalized video (P parents" perceived their personal attitudes on a four-point Likert scale as the main influence on their decision although their "attitude" was significantly shaped by the video. Parental decisions concerning early sex assignment surgery for DSD children depend on the health professional counseling received, to a degree of which neither parents nor professionals appear fully aware. In the absence of conclusive data for or against early surgery, there is a danger of medicalized or demedicalized parentalism resulting in irreversible and inadequately grounded decisions, regardless of the consensus statement of 2005 and the subsequent call for multidisciplinary management. © 2013 International Society for

  3. Quantum anonymous voting with anonymity check

    International Nuclear Information System (INIS)

    Horoshko, Dmitri; Kilin, Sergei

    2011-01-01

    We propose a new protocol for quantum anonymous voting having serious advantages over the existing protocols: it protects both the voters from a curious tallyman and all the participants from a dishonest voter in unconditional way. The central idea of the protocol is that the ballots are given back to the voters after the voting process, which gives a possibility for two voters to check the anonymity of the vote counting process by preparing a special entangled state of two ballots. Any attempt of cheating from the side of the tallyman results in destroying the entanglement, which can be detected by the voters.

  4. Data anonymization patent landscape

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2017-01-01

    Full Text Available The omnipresent, unstoppable increase in digital data has led to a greater understanding of the importance of data privacy. Different approaches are used to implement data privacy. The goal of this paper is to develop a data anonymization patent landscape, by determining the following: (i the trend in data anonymization patenting, (ii the type of technical content protected in data anonymization, (iii the organizations and countries most active in patenting data anonymization know-how; and (iv the topics emerging most often in patent titles. Patents from the PatSeer database relating to data anonymization from 2001 to 2015 were analyzed. We used the longitudinal approach in combination with text mining techniques to develop a data anonymization patent landscape. The results indicated the following. The number of single patent families is growing with a high increase after 2010, thus indicating a positive trend in the area of patenting data anonymization solutions. The majority of patenting activities relate to the G Physics section. Organizations from the USA and Japan assigned the majority of patents related to data anonymization. The results of text mining indicate that the most often used word in titles of data anonymization patents are “anonym*, “method”, “data” and “system”. Several additional words that indicated the most frequent topics related to data anonymization were: “equipment”, “software”, “protection”, “identification”, or “encryption”, and specific topics such as “community”, “medical”, or “service”.

  5. [Anonymous birth and neonaticide in Tyrol].

    Science.gov (United States)

    Danner, C; Pacher, M; Ambach, E; Brezinka, C

    2005-10-01

    In 2001 the Austrian government provided the legal means that formally enabled "anonymous birth": a woman can now give birth in any hospital in Austria without giving her name or insurance number, the baby is taken into care by social services and placed with adoptive parents. The cost of the hospital stay is covered from public funds. These measures were put into effect after some highly publicized cases of infant abandonment and neonaticide in Austria. In the mostly rural and small-town province of Tyrol province in western Austria (687,000 inhabitants, 7000 births per year) four cases of neonaticide were discovered in the years from 1996 to 2004. One child was abandoned inside a hospital. Since 2001 two women have made use of the "anonymous birth" option. Neither had had any pregnancy controls, both showed up at or near term with contractions. They delivered healthy infants that were then taken into care by local adoption services. Both women were extensively counselled by psychologists, social workers, medical and midwifery staff and both insisted on their original decision to remain anonymous. A few weeks later one of the women found herself at the centre of a criminal investigation for infanticide after anonymous letters were sent to family members insinuating she had done away with the child. Police stopped that investigation when hospital staff confirmed that the woman had had an "anonymous" delivery. Despite the option of legal "anonymous" birth free of charge in modern hospitals there are still cases of infant abandonment and neonaticide in Austria. It is proposed that the women who opt for anonymous birth may not be the women who would otherwise kill their babies. Instead, it appears that the women opted for anonymity to escape the probably well-intentioned but overbearing attention of their families and of social services. It is doubtful that the option of anonymous birth will lead to a complete disappearance of infanticide and infant abandonment in

  6. Trust in Anonymity Networks

    Science.gov (United States)

    Sassone, Vladimiro; Hamadou, Sardaouna; Yang, Mu

    Anonymity is a security property of paramount importance, as we move steadily towards a wired, online community. Its import touches upon subjects as different as eGovernance, eBusiness and eLeisure, as well as personal freedom of speech in authoritarian societies. Trust metrics are used in anonymity networks to support and enhance reliability in the absence of verifiable identities, and a variety of security attacks currently focus on degrading a user's trustworthiness in the eyes of the other users. In this paper, we analyse the privacy guarantees of the Crowds anonymity protocol, with and without onion forwarding, for standard and adaptive attacks against the trust level of honest users.

  7. Proxies for Anonymous Routing

    National Research Council Canada - National Science Library

    Reed, Michael G; Syverson, Paul F; Goldschlag, David M

    1996-01-01

    ...), and file transfers (FTP) have been implemented. Onion routing provides application independent, real-time, and bi-directional anonymous connections that are resistant to both eavesdropping and traffic analysis...

  8. Anonymous women? Gamblers Anonymous and gender

    OpenAIRE

    Rogers, Jim

    2016-01-01

    One of the rapidly changing elements in gambling environments is the increasing participation of women in many forms of gambling, and the growing proportions of problem gamblers who are female. It is known that women who develop gambling problems differ from men in a range of ways:for example they are more likely to have co-morbidities such as anxiety and depression, and to gamble as an 'escape' from such co-occuring problems. Gamblers Anonymous (GA) has a number of meetings across New Zeala...

  9. Vigilância e anonimato em aplicativos mobile: um estudo sobre a privacidade em relações homoafetivas no digital | Surveillance and anonymity in mobile applications: a study about the privacy in digital same sex relations

    Directory of Open Access Journals (Sweden)

    Manuela do Corral Vieira

    2016-11-01

    Full Text Available RESUMO Este artigo busca compreender de que forma homens que utilizam os aplicativos de relacionamento Tinder, Grindr e Scruff – considerando seus pontos de semelhanças e de especificidades, conforme serão detalhadas ao longo deste estudo – experienciam facetas de suas identidades e constroem práticas de sociabilidade, fazendo uso ou não do anonimato, na vivência de relações homoafetivas. Além disso, a pesquisa analisa de que forma estas plataformas digitais se configuram como heterotopias e “armários digitais”, nos quais os sujeitos desenvolvem formas de resistência e proteção a práticas de vigilâncias sociais on e off-lines. Palavras-chave: Privacidade; Anonimato; Identidade; Sociabilidade; Aplicativos de Relacionamento. ABSTRACT This article seeks to understand how men who use the relationship applications Tinder, Grindr and Scruff – considering their similarities points and specificities, as will be detailed in the course of this study – experience facets of their identities and build sociability practices making use or not of anonymity, in experiences of same sex relations. Furthermore, the research examines how these digital platforms are configured as heterotopias and "digital lockers" in which subjects develop forms of resistance and protection to the surveillances practices on and off-lines. Keywords: Privacy; Anonymity; Identity; Sociability; Relationship Applications.

  10. Anonymous Connections and Onion Routing

    National Research Council Canada - National Science Library

    Syverson, Paul F; Goldschlag, David M; Reed, Michael G

    1997-01-01

    .... Unmodified Internet applications can use these anonymous connections by means of proxies. The proxies may also make communication anonymous by removing identifying information from the data stream...

  11. HIV Testing and Counseling Among Female Sex Workers : A Systematic Literature Review

    NARCIS (Netherlands)

    Tokar, Anna; Broerse, Jacqueline E.W.; Blanchard, James; Roura, Maria

    2018-01-01

    HIV testing uptake continues to be low among Female Sex Workers (FSWs). We synthesizes evidence on barriers and facilitators to HIV testing among FSW as well as frequencies of testing, willingness to test, and return rates to collect results. We systematically searched the MEDLINE/PubMed, EMBASE,

  12. Anonymization of Court Orders

    DEFF Research Database (Denmark)

    Povlsen, Claus; Jongejan, Bart; Hansen, Dorte Haltrup

    We describe an anonymization tool that was commissioned by and specified together with Schultz, a publishing company specialized in Danish law related publications. Unavailability of training data and the need to guarantee compliance with pre-existing anonymization guidelines forced us to implement...... a tool using manually crafted rules. We used Bracmat, a programming language that is specialized in transforming tree data structures, to meet the requirement to pass the XML structure of the input document unscathed through the whole workflow. The tool attains a reassuringly good recall, makes almost...

  13. HIV Testing and Counseling Among Female Sex Workers: A Systematic Literature Review.

    Science.gov (United States)

    Tokar, Anna; Broerse, Jacqueline E W; Blanchard, James; Roura, Maria

    2018-02-20

    HIV testing uptake continues to be low among Female Sex Workers (FSWs). We synthesizes evidence on barriers and facilitators to HIV testing among FSW as well as frequencies of testing, willingness to test, and return rates to collect results. We systematically searched the MEDLINE/PubMed, EMBASE, SCOPUS databases for articles published in English between January 2000 and November 2017. Out of 5036 references screened, we retained 36 papers. The two barriers to HIV testing most commonly reported were financial and time costs-including low income, transportation costs, time constraints, and formal/informal payments-as well as the stigma and discrimination ascribed to HIV positive people and sex workers. Social support facilitated testing with consistently higher uptake amongst married FSWs and women who were encouraged to test by peers and managers. The consistent finding that social support facilitated HIV testing calls for its inclusion into current HIV testing strategies addressed at FSW.

  14. Using Meditation in Addiction Counseling

    Science.gov (United States)

    Young, Mark E.; DeLorenzi, Leigh de Armas; Cunningham, Laura

    2011-01-01

    Meditation has been studied as a way of reducing stress in counseling clients since the 1960s. Alcoholics Anonymous, Narcotics Anonymous, and new wave behavior therapies incorporate meditation techniques in their programs. This article identifies meditation's curative factors and limitations when using meditation in addiction settings.

  15. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... anonymous steganography, { A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), { A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  16. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... defining anonymous steganography, - A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), - A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  17. A Pilot Randomized Controlled Trial of an Integrated In-person and Mobile Phone Delivered Counseling and Text Messaging Intervention to Reduce HIV Transmission Risk among Male Sex Workers in Chennai, India.

    Science.gov (United States)

    Mimiaga, Matthew J; Thomas, Beena; Biello, Katie; Johnson, Blake E; Swaminathan, Soumya; Navakodi, Pandiyaraja; Balaguru, S; Dhanalakshmi, A; Closson, Elizabeth F; Menon, Sunil; O'Cleirigh, Conall; Mayer, Kenneth H; Safren, Steven A

    2017-11-01

    Men who have sex with men (MSM) are at increased risk for HIV infection in India, particularly those who engage in transactional sex with other men (i.e., male sex workers; MSW). Despite the need, HIV prevention efforts for Indian MSW are lacking. As in other settings, MSW in India increasingly rely on the use of mobile phones for sex work solicitation. Integrating mobile phone technology into an HIV prevention intervention for Indian MSW may mitigate some of the challenges associated with face-to face approaches, such as implementation, lack of anonymity, and time consumption, while at the same time proving to be both feasible and useful. This is a pilot randomized controlled trial to examine participant acceptability, feasibility of study procedures, and preliminary efficacy for reducing sexual risk for HIV. MSW (N = 100) were equally randomized to: (1) a behavioral HIV prevention intervention integrating in-person and mobile phone delivered HIV risk reduction counseling, and daily, personalized text or voice messages as motivating "cognitive restructuring" cues for reducing condomless anal sex (CAS); or (2) a standard of care (SOC) comparison condition. Both groups received HIV counseling and testing at baseline and 6-months, and completed ACASI-based, behavioral and psychosocial assessments at baseline, 3, and 6 months. Mixed-effects regression procedures specifying a Poisson distribution and log link with a random intercept and slope for month of follow-up was estimated to assess the intervention effect on the primary outcomes: (1) CAS acts with male clients who paid them for sex, and (2) CAS acts with male non-paying sexual partners-both outcomes assessed over the past month. The intervention was both feasible (98% retention at 6-months) and acceptable (>96% of all intervention sessions attended); all intervention participants rated the intervention as "acceptable" or "very acceptable." A reduction in the reported number of CAS acts with male clients who

  18. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  19. 45 CFR 618.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Activities Prohibited § 618.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or guidance of...

  20. 34 CFR 106.36 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling... Programs or Activities Prohibited § 106.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or...

  1. 45 CFR 2555.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Activities Prohibited § 2555.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or guidance of...

  2. 32 CFR 196.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling... Programs or Activities Prohibited § 196.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or...

  3. Risk factors for HIV and STI diagnosis in a community-based HIV/STI testing and counselling site for men having sex with men (MSM) in a large German city in 2011-2012.

    Science.gov (United States)

    Marcus, Ulrich; Ort, Jasmin; Grenz, Marc; Eckstein, Kai; Wirtz, Karin; Wille, Andreas

    2015-01-13

    In recent years community-based voluntary counselling and testing sites (CB-VCT) for men having sex with men (MSM) have been established in larger cities in Germany to offer more opportunities for HIV testing. Increasingly, CB-VCTs also offer testing for other bacterial sexually transmitted infections. In Hamburg, tests in CB-VCTs are offered free and anonymously. Data on demographics and sexual risk behaviours are collected with a paper questionnaire. Questionnaire data from the MSM CB-VCT in Hamburg were linked with serological test results for HIV and syphilis, and with rectal and pharyngeal swab results for gonorrhoea and chlamydia. MSM were defined as males reporting male sex partners. CB-VCT clients were characterized demographically, and associations between sexual behaviour variables and diagnosis of HIV and sexually transmitted infections (STI) were analysed by bivariate and multivariate logistic regression analysis. Among the male clients of the CB-VCT in 2011-2012 who were tested for HIV or any STI 1476 reported male sex partners. Unprotected anal intercourse (UAI) was reported as reason for testing by 61% of the clients. Forty-one of 1413 clients testing for HIV were tested positive (2.9%). Twenty-four of 1380 clients testing for syphilis required treatment (1.7%). Tests for simultaneous detection of N. gonorrhoea and Chlamydia trachomatis were conducted on 882 pharyngeal and 642 rectal swabs, revealing 58 (=6.6%) pharyngeal and 71 (=11.1%) rectal infections with one or both pathogens. In multivariate logistic regression analysis number of partners, UAI (OR=2.42) and relying on visual impression when selecting sex partners (OR = 2.92) were associated with increased risks for diagnosis of syphilis or a rectal STI. Syphilis or rectal STI diagnosis (OR=4.52) were associated with increased risk for HIV diagnosis. The MSM CB-VCT in Hamburg reaches clients at high risk for HIV and STIs. The diagnosis of syphilis or a rectal STI was associated with increased

  4. An Extensive Study on Data Anonymization Algorithms Based on K-Anonymity

    Science.gov (United States)

    Simi, Ms. M. S.; Sankara Nayaki, Mrs. K.; Sudheep Elayidom, M., Dr.

    2017-08-01

    For business and research oriented works engaging Data Analysis and Cloud services needing qualitative data, many organizations release huge microdata. It excludes an individual’s explicit identity marks like name, address and comprises of specific information like DOB, Pin-code, sex, marital status, which can be combined with other public data to recognize a person. This implication attack can be manipulated to acquire any sensitive information from social network platform, thereby putting the privacy of a person in grave danger. To prevent such attacks by modifying microdata, K-anonymization is used. With potentially increasing data, the effective method to anonymize it stands challenging. After series of trails and systematic comparison, in this paper, we propose three best algorithms along with its efficiency and effectiveness. Studies help researchers to identify the relationship between the values of k, degree of anonymization, choosing a quasi-identifier and focus on execution time.

  5. Comments on ``Anonymous Reviews'' An Editor's View of Anonymous Reviews

    Science.gov (United States)

    Goff, John A.

    I have read with great interest the recent Forum commentaries in Eos by Myrl Beck, Charles Robinove, Robert Criss, and Anne Hofmeister regarding anonymous reviews. I heartily support their position that anonymous reviews should be avoided. I have not written an anonymous review in ages (and regret the few that I did), and have always appreciated and respected greatly anyone who signs a critical review of one of my own papers. However, I would like to add some perspective from the editorial standpoint. I have served as JGR associate editor for 3 years (never anonymously!), and as Eos editor for seismology and tectonophysics for 4. Over the years, I have rejected a fair number of papers, most of those based on anonymous reviews (fortunately, none of the above commentators was one of them). The vast majority of anonymous reviews I received were well considered. While I would wish that all reviews were signed, I don't think we can summarily dismiss the fear that many would have of enmity and reprisal over a critical review. Some of these fears are likely justified. On more than one occasion, have I witnessed overly aggressive responses on the part of authors to anonymous reviews that I considered to be entirely fair and constructive in their criticisms. I do think we need to do all we can to discourage anonymous reviews, but it will be difficult to completely remove that choice from the process.

  6. [HIV infection and syphilis prevalence among men who have sex with men receiving voluntary counseling and testing appointed through a web-based registering system and related factors].

    Science.gov (United States)

    Wu, Qiongmiao; Cheng, Weibin; Zhong, Fei; Xu, Huifang; Liu, Qi; Lin, Peng

    2015-05-01

    To understand the human immunodeficiency virus (HIV) infection status and syphilis prevalence among men who have sex with men (MSM) receiving voluntary counseling and testing appointed through a web-based registering system and related factors. The MSM receiving web appointed HIV counseling and testing from 2011 to 2012 in Guangzhou were recruited and a questionnaire survey was conduct among them to obtain the information about their demographic characteristics and sexual behavior. Binary and multivariate logistic regression model were used to identify the factors associated with HIV infection or syphilis prevalence. A total of 4,904 MSM were enrolled in the study, the average age of the MSM was (28.77±7.24) years, and 70.3% of them had high education level; the unmarried MSM accounted for 72.7%. The HIV infection rate and syphilis prevalence were 8.7% and 4.4% respectively. The co-infection rate of HIV and Treponema pallidum was 1.2% (59/4 904). About one in three MSM did not use condom at latest homosexual behavior, 43.5% did not use condoms at each homosexual behavior in the past three months. Lower education level, occupation (worker or farmer), non-consistent condom use at each sex with men in the past three months, receiving HIV test or not and Treponema pallidum infection were associated with HIV infection. Age≥40 years, lower education level, multi male sex partners in the past three months and HIV infection were associated with Treponema pallidum infection. MSM receiving web appointed HIV counseling and testing had high prevalence of risk behaviors and high HIV infection rate, but had low previous HIV testing rate. It is necessary to strengthen the promotion of HIV test through web based appointment and conduct target behavior intervention in older MSM with lower education level.

  7. A Randomized Controlled Trial to Compare Computer-assisted Motivational Intervention with Didactic Educational Counseling to Reduce Unprotected Sex in Female Adolescents.

    Science.gov (United States)

    Gold, Melanie A; Tzilos, Golfo K; Stein, L A R; Anderson, Bradley J; Stein, Michael D; Ryan, Christopher M; Zuckoff, Allan; DiClemente, Carlo

    2016-02-01

    To examine a computer-assisted, counselor-guided motivational intervention (CAMI) aimed at reducing the risk of unprotected sexual intercourse. DESIGN, SETTING, PARTICIPANTS, INTERVENTIONS, AND MAIN OUTCOME MEASURES: We conducted a 9-month, longitudinal randomized controlled trial with a multisite recruitment strategy including clinic, university, and social referrals, and compared the CAMI with didactic educational counseling in 572 female adolescents with a mean age of 17 years (SD = 2.2 years; range = 13-21 years; 59% African American) who were at risk for pregnancy and sexually transmitted diseases. The primary outcome was the acceptability of the CAMI according to self-reported rating scales. The secondary outcome was the reduction of pregnancy and sexually transmitted disease risk using a 9-month, self-report timeline follow-back calendar of unprotected sex. The CAMI was rated easy to use. Compared with the didactic educational counseling, there was a significant effect of the intervention which suggested that the CAMI helped reduce unprotected sex among participants who completed the study. However, because of the high attrition rate, the intent to treat analysis did not demonstrate a significant effect of the CAMI on reducing the rate of unprotected sex. Among those who completed the intervention, the CAMI reduced unprotected sex among an at-risk, predominantly minority sample of female adolescents. Modification of the CAMI to address methodological issues that contributed to a high drop-out rate are needed to make the intervention more acceptable and feasible for use among sexually active predominantly minority, at-risk, female adolescents. Copyright © 2016 North American Society for Pediatric and Adolescent Gynecology. Published by Elsevier Inc. All rights reserved.

  8. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  9. 10 CFR 1042.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials... on the Basis of Sex in Education Programs or Activities Prohibited § 1042.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on...

  10. 22 CFR 146.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 146.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on...

  11. 7 CFR 15a.36 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling... Education Programs and Activities Prohibited § 15a.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the...

  12. 22 CFR 229.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 229.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on...

  13. 49 CFR 25.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 25.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on...

  14. 45 CFR 86.36 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 86.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on...

  15. 6 CFR 17.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 17.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on...

  16. 10 CFR 5.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials... in Education Programs or Activities Prohibited § 5.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the...

  17. Anonymous Transactions in Computer Networks

    Science.gov (United States)

    Dolev, Shlomi; Kopeetsky, Marina

    We present schemes for providing anonymous transactions while privacy and anonymity are preserved, providing user anonymous authentication in distributed networks such as the Internet. We first present a practical scheme for anonymous transactions while the transaction resolution is assisted by a Trusted Authority. This practical scheme is extended to a theoretical scheme where a Trusted Authority is not involved in the transaction resolution. Given an authority that generates for each player hard to produce evidence EVID (e. g., problem instance with or without a solution) to each player, the identity of a user U is defined by the ability to prove possession of said evidence. We use Zero-Knowledge proof techniques to repeatedly identify U by providing a proof that U has evidence EVID, without revealing EVID, therefore avoiding identity theft.

  18. Alcoholics Anonymous and nursing. Lessons in holism and spiritual care.

    Science.gov (United States)

    McGee, E M

    2000-03-01

    Alcoholic Anonymous (AA) is a worldwide, million-member organization that has assisted countless alcoholics to achieve sobriety through a spiritual program of recovery from alcoholism. Based on spiritual principles known as the "Twelve Steps" and "Twelve Traditions," AA has provided a model for other recovery programs such as Narcotics Anonymous (NA), Gamblers Anonymous (GA), and Sex and Love Addicts Anonymous (SLAA). Recovery in AA appears to involve a process of self-transcendence. In recent years, nursing scholars have increasingly explored the concepts of self-transcendence and spirituality as they apply to nursing theory and practice. This article explores the roots and spiritual dimensions of 12-step recovery programs. It further explores the ways in which theoretical and clinical knowledge about the delivery of spiritual care interventions may be gained from an understanding of AA's spiritual approach to recovery.

  19. Peer counselling versus standard-of-care on reducing high-risk behaviours among newly diagnosed HIV-positive men who have sex with men in Beijing, China: a randomized intervention study.

    Science.gov (United States)

    Liu, Yu; Vermund, Sten H; Ruan, Yuhua; Liu, Hongjie; Rivet Amico, K; Simoni, Jane M; Shepherd, Bryan E; Shao, Yiming; Qian, Han-Zhu

    2018-02-01

    Reducing high-risk behaviours (i.e. multiple partnership, condomless anal/vaginal sex, alcohol use before sex, illicit drug use) after HIV diagnosis is critical for curtailing HIV transmission. We designed an intervention to explore peer- counselling in reducing high-risk behaviours among newly diagnosed HIV-positive Chinese men who have sex with men (MSM). We randomized 367 newly diagnosed HIV-positive men to either standard-of-care (SOC; n = 183) or peer-counselling intervention (n = 184), and followed them for 12 months (visit at 0-, 3-, 6-, 9- and 12-month). SOC participants received counselling on high-risk behaviour reduction by clinic staff. Intervention participants received both SOC and peer counselling. A generalized estimating equation was used to compare pre-post diagnosis high-risk behaviour change; logistic regression was used to assess the likelihood of practicing high-risk behaviours between intervention and SOC participants. Both intent-to-treat and per-protocol (full-dosage) approaches were used for the analyses. For pre- and post-diagnosis comparisons, multiple partnership fell from 50% to 16% (p peer counselling was more likely to reduce insertive anal sex (AOR = 0.65; 95% CI: 0.45 to 0.94), condomless anal sex (AOR = 0.27; 95% CI: 0.10 to 0.64) and illicit drug use (AOR = 0.32; 95% CI: 0.16 to 0.64). In the per-protocol analysis, peer counselling was associated with a lower likelihood of using illicit drug (OR = 0.23; 95% CI: 0.07 to 0.81) and having condomless vaginal sex with women (OR = 0.12; 95% CI: 0.07 to 0.98). We observed a 14 to 43% decrease in the prevalence of selected high-risk behaviours after HIV diagnosis. Peer counselling had a greater impact in reducing condomless anal sex with men, illicit drug use and condomless vaginal sex with women over time. Future studies with exclusive peer-counselling arm are necessary to test its efficacy and effectiveness among Chinese MSM. Clinical Trial Number: NCT01904877. © 2018

  20. Mental health professionals' acceptance of online counseling

    OpenAIRE

    Lazuras, Lambros; Dokou, Anna

    2016-01-01

    The development of online counseling services has followed the advent on information and communication technologies. The present study assessed mental health professionals' perspectives of online counseling by using an extended version of the technology acceptance model. Participants completed anonymous structured questionnaires assessing technology acceptance-related variables, including perceived usefulness and ease of use, usage intentions, job relevance, social norms, attitudes, computer ...

  1. High Linkage to Care in a Community-Based Rapid HIV Testing and Counseling Project Among Men Who Have Sex With Men in Copenhagen

    DEFF Research Database (Denmark)

    Qvist, Tavs; Cowan, Susan Alice; Graugaard, Christian

    2014-01-01

    INTRODUCTION: The aim of the study was to evaluate a community-based human immunodeficiency virus (HIV) testing program for its capacity to reach men who have sex with men (MSM) and successfully refer HIV-positive patients to treatment. METHODS: A walk-in clinic placed in the heart....... RESULTS: A total of 3012 HIV tests with concomitant counseling were performed between 2008 and 2012. The median age of users was 33 years (range, 16-73 years), 18% were non-Danish citizens, and 12% reported that this was their first HIV test. Thirty-eight individuals tested positive; however, 1 was found...... to be false positive by routine confirmatory testing. The remaining 37 users were true positive. All but 1 user was successfully linked to care at an infectious disease department and achieved full viral suppression after a median of 8 months (interquartile range, 5-19 months). The 37 positive patients...

  2. Sex and Race/Ethnicity Differences in Implantable Cardioverter-Defibrillator Counseling and Use Among Patients Hospitalized With Heart Failure: Findings from the Get With The Guidelines-Heart Failure Program.

    Science.gov (United States)

    Hess, Paul L; Hernandez, Adrian F; Bhatt, Deepak L; Hellkamp, Anne S; Yancy, Clyde W; Schwamm, Lee H; Peterson, Eric D; Schulte, Phillip J; Fonarow, Gregg C; Al-Khatib, Sana M

    2016-08-16

    Previous studies have found that women and black patients eligible for a primary prevention implantable cardioverter-defibrillator (ICD) are less likely than men or white patients to receive one. We performed an observational analysis of the Get With The Guidelines-Heart Failure Program from January 1, 2011, to March 21, 2014. Patients admitted with heart failure and an ejection fraction ≤35% without an ICD were included. Rates of ICD counseling among eligible patients and ICD receipt among counseled patients were examined by sex and race/ethnicity. Among 21 059 patients from 236 sites, 4755 (22.6%) received predischarge ICD counseling. Women were counseled less frequently than men (19.3% versus 24.6%, Prace/ethnic group 14.4% versus white 24.3%, Pdifferences by race and ethnicity persisted. © 2016 American Heart Association, Inc.

  3. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  4. k-Times Anonymous Authentication

    Science.gov (United States)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  5. Anonymous Web Browsing and Hosting

    OpenAIRE

    MANOJ KUMAR; ANUJ RANI

    2013-01-01

    In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that ho...

  6. [Comparison of human papilloma virus infection status between men who have sex with men recruited from gay bathhouses and HIV voluntary counseling and testing clinics respectively in Urumqi].

    Science.gov (United States)

    Tian, T; Cai, A J; Huang, B X; Abidan, Ainiwaer; Wang, H; Dai, J H

    2017-01-10

    Objective: To understand the human papilloma virus (HPV) infection status in men who have sex with men (MSM) recruited from gay bathhouses and HIV voluntary counseling and testing (VCT) clinics in Urumqi, Xinjiang Uygur autonomous region, and identify the associated risk factors. Methods: A total of 200 MSM aged ≥18 years were recruited by using the " snowballing" sampling method from gay bathhouses and VCT clinics in Urumqi during March-May, 2016. The MSM recruited completed questionnaires after filling in the informed consent form. The information about their demographic characteristics and sexual behaviors were collected, and anal swabs were collected from them for HPV genotyping. Results: The overall HPV infection rate was 54.0 % . The HPV infection rate was 66.7 % (74/111) in MSM from gay bathhouses and 38.2 % (34/89) in MSM from VCT clinics and the high risk type HPV infection rate was 39.6 % (44/111) in MSM from gay bathhouses and 14.6 % (13/89) in MSM from VCT clinics, the differences were significant ( χ (2)=16.112, P prevalence of HPV in MSM from gay bathhouses was higher than that in MSM from VCT clinics, indicating that close attention should be paid to the behavior intervention in MSM.

  7. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  8. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  9. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  10. The relationship between health worker stigma and uptake of HIV counseling and testing and utilization of non-HIV health services: the experience of male and female sex workers in Kenya.

    Science.gov (United States)

    Nyblade, Laura; Reddy, Aditi; Mbote, David; Kraemer, John; Stockton, Melissa; Kemunto, Caroline; Krotki, Karol; Morla, Javier; Njuguna, Stella; Dutta, Arin; Barker, Catherine

    2017-11-01

    The barrier HIV-stigma presents to the HIV treatment cascade is increasingly documented; however less is known about female and male sex worker engagement in and the influence of sex-work stigma on the HIV care continuum. While stigma occurs in all spheres of life, stigma within health services may be particularly detrimental to health seeking behaviors. Therefore, we present levels of sex-work stigma from healthcare workers (HCW) among male and female sex workers in Kenya, and explore the relationship between sex-work stigma and HIV counseling and testing. We also examine the relationship between sex-work stigma and utilization of non-HIV health services. A snowball sample of 497 female sex workers (FSW) and 232 male sex workers (MSW) across four sites was recruited through a modified respondent-driven sampling process. About 50% of both male and female sex workers reported anticipating verbal stigma from HCW while 72% of FSW and 54% of MSW reported experiencing at least one of seven measured forms of stigma from HCW. In general, stigma led to higher odds of reporting delay or avoidance of counseling and testing, as well as non-HIV specific services. Statistical significance of relationships varied across type of health service, type of stigma and gender. For example, anticipated stigma was not a significant predictor of delay or avoidance of health services for MSW; however, FSW who anticipated HCW stigma had significantly higher odds of avoiding (OR = 2.11) non-HIV services, compared to FSW who did not. This paper adds to the growing evidence of stigma as a roadblock in the HIV treatment cascade, as well as its undermining of the human right to health. While more attention is being paid to addressing HIV-stigma, it is equally important to address the key population stigma that often intersects with HIV-stigma.

  11. Compatibility of Adlerian Theory and Practice with the Philosophy and Practices of Alcoholics Anonymous.

    Science.gov (United States)

    Carroll, Jane J.

    1999-01-01

    Tenets of Adlerian theory and practice are compatible with the philosophy and practices of Alcoholics Anonymous. Counselors can expect treatment approaches based on Adlerian counseling theory to be congruent with 12-step practices of individuals who are in recovery from alcohol dependence. (Author)

  12. An Anonymous Credit Card System

    Science.gov (United States)

    Androulaki, Elli; Bellovin, Steven

    Credit cards have many important benefits; however, these same benefits often carry with them many privacy concerns. In particular, the need for users to be able to monitor their own transactions, as well as bank’s need to justify its payment requests from cardholders, entitle the latter to maintain a detailed log of all transactions its credit card customers were involved in. A bank can thus build a profile of each cardholder even without the latter’s consent. In this paper, we present a practical and accountable anonymous credit system based on ecash, with a privacy preserving mechanism for error correction and expense-reporting.

  13. [The Frankfurt concept for health counseling for men].

    Science.gov (United States)

    Bickeböller, R; Busch, O; Peters, M; Jonas, D; Binder, J

    2002-01-01

    The discussion on the difference between the sexes received significant impulses from the formation of feminist theory. Masculinity was interpreted in a rather morally negative manner. Masculinity continuously endeavors to achieve reproduction and self-confirmation. Competitive pursuit of hegemony is the preeminent pattern by which masculine identity is formed. Male socialization leads to externalization, which impedes the development of communicative skills. Males tend to lead a high-risk life-style, which instrumentalizes their body. Symptoms are less often interpreted as warning signals, reflected in a significantly reduced life expectancy in comparison to females. In view of the specific male socialization, the Frankfurt concept of "men's health counseling" attempts to create a professional atmosphere in which men seeking advice are offered the opportunity to consult a specialist on all topics of men's health anonymously and, for the moment, free of charge.

  14. Pattern-Guided k-Anonymity

    Directory of Open Access Journals (Sweden)

    Rolf Niedermeier

    2013-10-01

    Full Text Available We suggest a user-oriented approach to combinatorial data anonymization. A data matrix is called k-anonymous if every row appears at least k times—the goal of the NP-hard k-ANONYMITY problem then is to make a given matrix k-anonymous by suppressing (blanking out as few entries as possible. Building on previous work and coping with corresponding deficiencies, we describe an enhanced k-anonymization problem called PATTERN-GUIDED k-ANONYMITY, where the users specify in which combinations suppressions may occur. In this way, the user of the anonymized data can express the differing importance of various data features. We show that PATTERN-GUIDED k-ANONYMITY is NP-hard. We complement this by a fixed-parameter tractability result based on a “data-driven parameterization” and, based on this, develop an exact integer linear program (ILP-based solution method, as well as a simple, but very effective, greedy heuristic. Experiments on several real-world datasets show that our heuristic easily matches up to the established “Mondrian” algorithm for k-ANONYMITY in terms of the quality of the anonymization and outperforms it in terms of running time.

  15. Bisexuality, Sexual Risk Taking, and HIV Prevalence Among Men Who Have Sex With Men Accessing Voluntary Counseling and Testing Services in Mumbai, India

    Science.gov (United States)

    Kumta, Sameer; Lurie, Mark; Weitzen, Sherry; Jerajani, Hemangi; Gogate, Alka; Row-kavi, Ashok; Anand, Vivek; Makadon, Harvey; Mayer, Kenneth H.

    2010-01-01

    Objectives To describe sociodemographics, sexual risk behavior, and estimate HIV and sexually transmitted infection (STI) prevalence among men who have sex with men (MSM) in Mumbai, India. Methods Eight hundred thirty-one MSM attending voluntary counseling and testing (VCT) services at the Humsafar Trust, answered a behavioral questionnaire and consented for Venereal Disease Research Laboratory and HIV testing from January 2003 through December 2004. Multivariate logistic regression was performed for sociodemographics, sexual risk behavior, and STIs with HIV result as an outcome. Results HIV prevalence among MSM was 12.5%. MSM who were illiterate [adjusted odds ratio (AOR) 2.28; 95% confidence interval (CI): 1.08 to 4.84], married (AOR 2.70; 95% CI: 1,56 to 4.76), preferred male partners (AOR 4.68; 95% CI: 1.90 to 11.51), had partners of both genders (AOR 2.73; 95% CI: 1.03 to 7.23), presented with an STI (AOR 3.31; 95% CI: 1.96 to 5.61); or presented with a reactive venereal disease research laboratory test (AOR 4.92; 95% CI: 2.55 to 9.53) at their VCT visit were more likely to be HIV infected. Conclusions MSM accessing VCT services in Mumbai have a high risk of STI and HIV acquisition. Culturally appropriate interventions that focus on sexual risk behavior and promote condom use among MSM, particularly the bridge population of bisexual men, are needed to slow the urban Indian AIDS epidemic. PMID:19934765

  16. The cost-effectiveness in the use of HIV counselling and testing-mobile outreaches in reaching men who have sex with men (MSM) in northern Nigeria.

    Science.gov (United States)

    Ifekandu, Chiedu; Suleiman, Aliyu; Aniekwe, Ogechukwu

    2014-01-01

    Men who have sex with men (MSM) are at increased risk of HIV and other STI infections in Nigeria. This is because MSM are afraid to seek medical help because the healthcare workers in various facilities are afraid of the consequences if they provide services for MSM citing the law as a reason not to intervene. MSM in northern states of Nigeria are facing double-jeopardy because the few international partners working in MSM in Nigeria are pulling out of these volatile areas because of the fear of attacks by the Boko Haram and the Nigerian law enforcement agencies. The intervention was conducted to promote affordable and sustainable HIV care and treatment for MSM in Nigeria. This intervention was conducted in the Boko Haram ravaged cities of Kano and Maiduguri (North-East Nigeria). Twenty MSM-key influencers from the two cities were identified and trained on HIV counselling and testing, caregivers, case managers and on initiation process for ARV treatment for new HIV+MSM as well as ethical considerations. The mean age of the key influencers was 24 years +/-SD. Each of the trained 20 key influencers reached 20 MSM-peer with condom promotion, HCT, referral to identified MSM-community health centers and follow-up/caregiving within the space of one month. The project was able to reach 400 MSM in the two cities. 89% of the peers consented to HCT. HIV prevalence among the participants was at 18%. The project recorded ARV-successful referral to healthcare facilities for the respondents that tested positive. The key influencers have been following up for ARV-adherence. Use of community members should be promoted for sustainability and ownership. It also helps in eradicating socio-cultural barrier to HIV intervention for MSM. Moreover, this proves to be one of the safest and affordable methods of reaching MSM in Nigeria in this ugly time of legalization of homophobia in the country's constitution.

  17. [Co-infections of HIV, syphilis and HSV-2 among men who have sex with men at the voluntary HIV counseling and testing clinics in Shanghai].

    Science.gov (United States)

    Liu, Y; Tang, H F; Ning, Z; Zheng, H; He, N; Zhang, Y Y

    2017-10-10

    Objective: To understand the prevalence rates of HIV-syphilis and HIV-herpes simplex virus 2 (HSV-2) co-infections and related factors among men having sex with men (MSM) who had visited the voluntary HIV counseling and testing (VCT) clinics in Shanghai, China. Methods: 756 eligible MSM who attended the VCT clinics of Shanghai Municipality and Putuo district during March to August, 2015 were recruited to participate in a cross-sectional survey with questionnaire interview and blood testing for HIV, syphilis and HSV-2. Results: A total of 732 participants completed a valid questionnaire survey. The prevalence rates were 3.3 % (24/732) for HIV/Syphilis co-infection, 1.9 % (14/732) for HIV/HSV-2 co-infection, and 0.7 % (5/732) for HIV/Syphilis/HSV-2 co-infection, respectively. HIV prevalence appeared significantly higher among syphilis-infected participants (45.3 % , 24/53) than those without Syphilis (7.2 % , 61/679) (χ(2)=63.11, P Syphilis co-infection. Those participants who had high middle school or lower levels of education ( OR =6.87, 95 %CI : 1.86-25.42; OR =9.82, 95 %CI : 2.25-42.85) were under risk on HIV and HSV-2 co-infection. Conclusion: HIV/Syphilis and HIV/HSV-2 co-infection were seen among MSM who attended the VCT clinics in Shanghai that called for special attention, especially on migrants, those with low education or illicit drug users.

  18. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  19. Alcoholics anonymous, other 12-step movements and psychotherapy in the US population, 1990.

    Science.gov (United States)

    Room, R; Greenfield, T

    1993-04-01

    Based on the 1990 US National Alcohol Survey, this note provides the first available comprehensive findings on self-reported utilization of a variety of sources of personal support and counselling for alcohol and other problems. Respondents were queried about lifetime attendance and number of times they went to identified sources of help in the prior year. Twelve-step groups included Alcoholics Anonymous, Al-Anon, Adult Children of Alcoholics, and other non-alcohol-oriented groups like Gamblers Anonymous, Narcotics Anonymous, and Overeaters Anonymous; additional questions inquired about support or therapy groups and individual counselling for non-alcohol problems. Of the US adult population, 9% have been to an AA meeting at some time, 3.6% in the prior year, only about one-third of these for problems of their own. About half these percentages, mostly women, have attended Al-Anon. Of the same population, 13.3% indicate ever attending a 12-step meeting (including non-alcohol-oriented groups), 5.3% in the last year. During the prior year a further 2.1% used other support/therapy groups and 5.5% sought individual counselling/therapy for personal problems other than alcohol. In contrast to this high reported utilization, only 4.9% (ever) and 2.3% (12-months) reported going to anyone including AA for a problem (of their own) related to drinking.

  20. A Test of Concept Study of At-Home, Self-Administered HIV Testing With Web-Based Peer Counseling Via Video Chat for Men Who Have Sex With Men.

    Science.gov (United States)

    Maksut, Jessica L; Eaton, Lisa A; Siembida, Elizabeth J; Driffin, Daniel D; Baldwin, Robert

    2016-12-14

    Men who have sex with men (MSM), particularly MSM who identify as African-American or Black (BMSM), are the sociodemographic group that is most heavily burdened by the human immunodeficiency virus (HIV) epidemic in the United States. To meet national HIV testing goals, there must be a greater emphasis on novel ways to promote and deliver HIV testing to MSM. Obstacles to standard, clinic-based HIV testing include concerns about stigmatization or recognition at in-person testing sites, as well as the inability to access a testing site due to logistical barriers. This study examined the feasibility of self-administered, at-home HIV testing with Web-based peer counseling to MSM by using an interactive video chatting method. The aims of this study were to (1) determine whether individuals would participate in at-home HIV testing with video chat-based test counseling with a peer counselor, (2) address logistical barriers to HIV testing that individuals who report risk for HIV transmission may experience, and (3) reduce anticipated HIV stigma, a primary psychosocial barrier to HIV testing. In response to the gap in HIV testing, a pilot study was developed and implemented via mailed, at-home HIV test kits, accompanied by HIV counseling with a peer counselor via video chat. A total of 20 MSM were enrolled in this test of concept study, 80% of whom identified as BMSM. All participants reported that at-home HIV testing with a peer counseling via video chat was a satisfying experience. The majority of participants (13/18, 72%) said they would prefer for their next HIV testing and counseling experience to be at home with Web-based video chat peer counseling, as opposed to testing in an office or clinic setting. Participants were less likely to report logistical and emotional barriers to HIV testing at the 6-week and 3-month follow-ups. The results of this study suggest that self-administered HIV testing with Web-based peer counseling is feasible and that MSM find it to be a

  1. Comparison of the Personality Profiles of Inmate Anonymous and Non-Anonymous Male Addicts

    Directory of Open Access Journals (Sweden)

    Nasrolah Erfani

    2013-05-01

    Full Text Available Aim: This study compared the personality profiles of inmate anonymous and non-anonymous male addicts. Method: The participants of study were anonymous and non-anonymous male addicts of the prisons of the Hamadan province in 1391. The population was 3130 addicts, including 627 anonymous and 2503 non-anonymous addicts. The 310 addicts were selected by stratified random sampling the sample size was determined by Cochran formula.The short-form NEO Five Factor personality questionnaire administered among selected sample. Data analyzed by descriptive statistic as frequency and percentage, also, inferential statistic as multivariate analysis of variance was run. Results: The results showed that personality profiles of anonymous and non-anonymous addicts were significantly different. That is, mean score of neuroticism in anonymous addicts was less than non anonymous. Also, mean score of extraversion was higher in anonymous addicts. Conclusion: It can be concluded that the anonymous male addicts are differ with non-anonymous male addicts in personality traits.

  2. 41 CFR 101-4.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Counseling and use of appraisal and counseling materials. 101-4.425 Section 101-4.425 Public Contracts and Property Management... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 101-4.425 Counseling and use...

  3. 43 CFR 41.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling materials. 41.425 Section 41.425 Public Lands: Interior Office of the Secretary of the Interior... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 41.425 Counseling and use of...

  4. 15 CFR 8a.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials. 8a.425 Section 8a.425 Commerce and Foreign Trade Office of the Secretary of Commerce... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 8a.425 Counseling and use of...

  5. 40 CFR 5.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 5.425 Section 5.425 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 5.425 Counseling and use of...

  6. 44 CFR 19.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling materials. 19.425 Section 19.425 Emergency Management and Assistance FEDERAL... Basis of Sex in Education Programs or Activities Prohibited § 19.425 Counseling and use of appraisal and...

  7. 28 CFR 54.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 54.425 Section 54.425 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 54.425 Counseling and use of...

  8. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as

  9. Self-tallying quantum anonymous voting

    Science.gov (United States)

    Wang, Qingle; Yu, Chaohua; Gao, Fei; Qi, Haoyu; Wen, Qiaoyan

    2016-08-01

    Anonymous voting is a voting method of hiding the link between a vote and a voter, the context of which ranges from governmental elections to decision making in small groups like councils and companies. In this paper, we propose a quantum anonymous voting protocol assisted by two kinds of entangled quantum states. Particularly, we provide a mechanism of opening and permuting the ordered votes of all the voters in an anonymous manner; any party who is interested in the voting results can acquire a permutation copy and then obtains the voting result through a simple calculation. Unlike all previous quantum works on anonymous voting, our quantum anonymous protocol possesses the properties of privacy, self-tallying, nonreusability, verifiability, and fairness at the same time. In addition, we demonstrate that the entanglement of the quantum states used in our protocol makes an attack from an outside eavesdropper and inside dishonest voters impossible. We also generalize our protocol to execute the task of anonymous multiparty computation, such as anonymous broadcast and anonymous ranking.

  10. Atheists, agnostics and Alcoholics Anonymous.

    Science.gov (United States)

    Tonigan, J Scott; Miller, W R; Schermer, Carol

    2002-09-01

    In spite of the strong emphasis in AA on spiritual beliefs and practices, findings are mixed about the importance of such beliefs in predicting AA affiliation. This study of the Project MATCH outpatient (N = 952) and aftercare (N = 774) samples tested three hypotheses about the role of client God belief and subsequent AA attendance and benefit, taking into account that some individuals may, in fact, deny the existence of a God. Longitudinal analyses were conducted (N = 1,526) investigating client God beliefs, AA attendance, patterns of AA attendance and alcohol use. Assessments were conducted at intake and in 3-month intervals using the Form 90, Religious Behaviors and Background, and the Alcoholics Anonymous Inventory. 12-Step treatment was significantly more likely to promote pre-post shifts in client God beliefs, and atheist and agnostic clients attended AA significantly less often throughout follow-up relative to clients self-labeled as spiritual and religious. AA attendance, however, was significantly associated with increased abstinence and reductions in drinking intensity regardless of God belief. Finally, no differences in percent days abstinence and drinking intensity were found between atheist and agnostic versus spiritual and religious clients, but clients unsure about their God belief reported significantly higher drinking frequency relative to the other groups. God belief appears to be relatively unimportant in deriving AA-related benefit, but atheist and agnostic clients are less likely to initiate and sustain AA attendance relative to spiritual and religious clients. This apparent reticence to affiliate with AA ought to be clinically recognized when encouraging AA participation.

  11. HIV Risk Perception, Sexual Behavior, and HIV Prevalence among Men-Who-Have-Sex-with-Men at a Community-Based Voluntary Counseling and Testing Center in Kuala Lumpur, Malaysia

    OpenAIRE

    Koh, Kwee Choy; Yong, Lit Sin

    2014-01-01

    We describe the HIV risk perception, sexual behavior, and HIV prevalence among 423 men-who-have-sex-with-men (MSM) clients who received voluntary counseling and testing (VCT) services at a community-based center in Kuala Lumpur, Malaysia. The mean age was 29 years old. One hundred one (23.9%) clients rated themselves as low risk, 118 (27.9%) as medium risk, 36 (8.5%) as high risk, and 168 (39.7%) were unsure of their risk. Twenty-four (9.4%) clients tested HIV positive (4 (4%) low risk, 9 (7....

  12. The selective adaptation of the alcoholics anonymous program by Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1991-09-01

    This paper is largely based on a year long observation study of Gamblers Anonymous and Alcoholics Anonymous meetings in northern California. The paper argues, contrary to popular assumption, that Gamblers Anonymous is significantly different from Alcoholics Anonymous. Differences, in members' consciousness for example, are discussed. The paper contends that although there is some12 step consciousness in G.A., the dominant consciousness ispage 17 consciousness. The significant differences are attributed to the selective adaptation of the Alcoholics Anonymous program. Several consequences of these differences, such as the central role of a language of the self in A.A. and not in G.A., are highlighted.

  13. HIV Risk Perception, Sexual Behavior, and HIV Prevalence among Men-Who-Have-Sex-with-Men at a Community-Based Voluntary Counseling and Testing Center in Kuala Lumpur, Malaysia.

    Science.gov (United States)

    Koh, Kwee Choy; Yong, Lit Sin

    2014-01-01

    We describe the HIV risk perception, sexual behavior, and HIV prevalence among 423 men-who-have-sex-with-men (MSM) clients who received voluntary counseling and testing (VCT) services at a community-based center in Kuala Lumpur, Malaysia. The mean age was 29 years old. One hundred one (23.9%) clients rated themselves as low risk, 118 (27.9%) as medium risk, 36 (8.5%) as high risk, and 168 (39.7%) were unsure of their risk. Twenty-four (9.4%) clients tested HIV positive (4 (4%) low risk, 9 (7.6%) medium risk, 11 (30.6%) high risk, and 13 (7.7%) unsure risk). We found a positive correlation between risk perception and HIV infection in this study. Clients with high HIV risk perception have 17x the odds of testing HIV positive compared to low risk clients. High HIV risk perception was significantly associated with multiple sex partners, multiple types of sex partners, alcohol use before intercourse, unprotected sex beyond 6 months, and inconsistent condom use during anal sex compared to low risk clients. There were no statistically significant differences between medium risk and unsure risk clients compared to low risk clients. Strategies should be targeted towards change in sexual practices among those who are perceived to be at high risk.

  14. HIV Risk Perception, Sexual Behavior, and HIV Prevalence among Men-Who-Have-Sex-with-Men at a Community-Based Voluntary Counseling and Testing Center in Kuala Lumpur, Malaysia

    Directory of Open Access Journals (Sweden)

    Kwee Choy Koh

    2014-01-01

    Full Text Available We describe the HIV risk perception, sexual behavior, and HIV prevalence among 423 men-who-have-sex-with-men (MSM clients who received voluntary counseling and testing (VCT services at a community-based center in Kuala Lumpur, Malaysia. The mean age was 29 years old. One hundred one (23.9% clients rated themselves as low risk, 118 (27.9% as medium risk, 36 (8.5% as high risk, and 168 (39.7% were unsure of their risk. Twenty-four (9.4% clients tested HIV positive (4 (4% low risk, 9 (7.6% medium risk, 11 (30.6% high risk, and 13 (7.7% unsure risk. We found a positive correlation between risk perception and HIV infection in this study. Clients with high HIV risk perception have 17x the odds of testing HIV positive compared to low risk clients. High HIV risk perception was significantly associated with multiple sex partners, multiple types of sex partners, alcohol use before intercourse, unprotected sex beyond 6 months, and inconsistent condom use during anal sex compared to low risk clients. There were no statistically significant differences between medium risk and unsure risk clients compared to low risk clients. Strategies should be targeted towards change in sexual practices among those who are perceived to be at high risk.

  15. A Mechanism for Anonymous Credit Card Systems

    Science.gov (United States)

    Tamura, Shinsuke; Yanase, Tatsuro

    This paper proposes a mechanism for anonymous credit card systems, in which each credit card holder can conceal individual transactions from the credit card company, while enabling the credit card company to calculate the total expenditures of transactions of individual card holders during specified periods, and to identify card holders who executed dishonest transactions. Based on three existing mechanisms, i.e. anonymous authentication, blind signature and secure statistical data gathering, together with implicit transaction links proposed here, the proposed mechanism enables development of anonymous credit card systems without assuming any absolutely trustworthy entity like tamper resistant devices or organizations faithful both to the credit card company and card holders.

  16. Anonymity in P2P Systems

    Science.gov (United States)

    Manzanares-Lopez, Pilar; Muñoz-Gea, Juan Pedro; Malgosa-Sanahuja, Josemaria; Sanchez-Aarnoutse, Juan Carlos

    In the last years, the use of peer-to-peer (P2P) applications to share and exchange knowledge among people around the world has experienced an exponential growth. Therefore, it is understandable that, like in any successful communication mechanism used by a lot of humans being, the anonymity can be a desirable characteristic in this scenario. Anonymity in P2P networks can be obtained by means of different methods, although the most significant ones are broadcast protocols, dining-cryptographer (DC) nets and multiple-hop paths. Each of these methods can be tunable in order to build a real anonymity P2P application. In addition, there is a mathematical tool called entropy that can be used in some scenarios to quantify anonymity in communication networks. In some cases, it can be calculated analytically but in others it is necessary to use simulation to obtain the network entropy.

  17. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis

    2015-01-01

    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  18. Anon-Pass: Practical Anonymous Subscriptions.

    Science.gov (United States)

    Lee, Michael Z; Dunn, Alan M; Katz, Jonathan; Waters, Brent; Witchel, Emmett

    2013-12-31

    We present the design, security proof, and implementation of an anonymous subscription service. Users register for the service by providing some form of identity, which might or might not be linked to a real-world identity such as a credit card, a web login, or a public key. A user logs on to the system by presenting a credential derived from information received at registration. Each credential allows only a single login in any authentication window, or epoch . Logins are anonymous in the sense that the service cannot distinguish which user is logging in any better than random guessing. This implies unlinkability of a user across different logins. We find that a central tension in an anonymous subscription service is the service provider's desire for a long epoch (to reduce server-side computation) versus users' desire for a short epoch (so they can repeatedly "re-anonymize" their sessions). We balance this tension by having short epochs, but adding an efficient operation for clients who do not need unlinkability to cheaply re-authenticate themselves for the next time period. We measure performance of a research prototype of our protocol that allows an independent service to offer anonymous access to existing services. We implement a music service, an Android-based subway-pass application, and a web proxy, and show that adding anonymity adds minimal client latency and only requires 33 KB of server memory per active user.

  19. Protecting genomic sequence anonymity with generalization lattices.

    Science.gov (United States)

    Malin, B A

    2005-01-01

    Current genomic privacy technologies assume the identity of genomic sequence data is protected if personal information, such as demographics, are obscured, removed, or encrypted. While demographic features can directly compromise an individual's identity, recent research demonstrates such protections are insufficient because sequence data itself is susceptible to re-identification. To counteract this problem, we introduce an algorithm for anonymizing a collection of person-specific DNA sequences. The technique is termed DNA lattice anonymization (DNALA), and is based upon the formal privacy protection schema of k -anonymity. Under this model, it is impossible to observe or learn features that distinguish one genetic sequence from k-1 other entries in a collection. To maximize information retained in protected sequences, we incorporate a concept generalization lattice to learn the distance between two residues in a single nucleotide region. The lattice provides the most similar generalized concept for two residues (e.g. adenine and guanine are both purines). The method is tested and evaluated with several publicly available human population datasets ranging in size from 30 to 400 sequences. Our findings imply the anonymization schema is feasible for the protection of sequences privacy. The DNALA method is the first computational disclosure control technique for general DNA sequences. Given the computational nature of the method, guarantees of anonymity can be formally proven. There is room for improvement and validation, though this research provides the groundwork from which future researchers can construct genomics anonymization schemas tailored to specific datasharing scenarios.

  20. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    Science.gov (United States)

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  1. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    Directory of Open Access Journals (Sweden)

    Sills Eric

    2010-08-01

    Full Text Available Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF and embryo transfer (ET where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  2. Is it OK to be an Anonymous?

    Directory of Open Access Journals (Sweden)

    Philip Serracino-Inglott

    2013-12-01

    Full Text Available Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between formal norm enforcement practice and Internet natives’ experience of it. Anons are more like eco-warriors than terrorists. While their actions are contentious, their force is framed in a vision of common good that is not unreasonable. Engaging with online deviants is shown to be a productive way of identifying the weaknesses in concepts underpinning moral evaluation of Internet-enabled phenomena.

  3. Scalable and Anonymous Group Communication with MTor

    Directory of Open Access Journals (Sweden)

    Lin Dong

    2016-04-01

    Full Text Available This paper presents MTor, a low-latency anonymous group communication system. We construct MTor as an extension to Tor, allowing the construction of multi-source multicast trees on top of the existing Tor infrastructure. MTor does not depend on an external service to broker the group communication, and avoids central points of failure and trust. MTor’s substantial bandwidth savings and graceful scalability enable new classes of anonymous applications that are currently too bandwidth-intensive to be viable through traditional unicast Tor communication-e.g., group file transfer, collaborative editing, streaming video, and real-time audio conferencing.

  4. A Randomized Controlled Trial Evaluating Efficacy of Promoting a Home-Based HIV Self-Testing with Online Counseling on Increasing HIV Testing Among Men Who Have Sex with Men.

    Science.gov (United States)

    Wang, Zixin; Lau, Joseph T F; Ip, Mary; Ho, Shara P Y; Mo, Phoenix K H; Latkin, Carl; Ma, Yee Ling; Kim, Yoona

    2018-01-01

    We developed an innovative home-based HIV self-testing (HIVST) service that included mailing of a free HIVST kit, and providing online real-time instructions and pre-test/post-test counseling (HIVST-OIC). The present parallel-group and non-blinded randomized controlled trial was conducted to evaluate the efficacy of promoting HIVST-OIC in increasing HIV testing rate among 430 men who have sex with men (MSM), with access to online live-chat applications in Hong Kong. At month 6, as compared to the control group, the intervention group reported significantly higher prevalence of HIV testing of any type (89.8 vs. 50.7%; relative risk (RR): 1.77; p strong potential in increasing prevalence of HIV testing and reducing sexual risk behaviors. Implementation research is warranted.

  5. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  6. An outcome study of Gamblers Anonymous.

    Science.gov (United States)

    Stewart, R M; Brown, R I

    1988-02-01

    Retrospective and prospective studies of a total sample of 232 attenders at groups of Gamblers Anonymous suggest that total abstinence from gambling was maintained by 8% of all comers at one year from first attendance and by 7% at two years.

  7. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel; Kalnis, Panos; Tao, Yufei

    2011-01-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  8. Fieldale-Collinsville Middle School: Banishing Anonymity

    Science.gov (United States)

    Principal Leadership, 2010

    2010-01-01

    It is no accident that the staff at Fieldale-Collinsville Middle School adopted a central tenet of "Breaking Ranks in the Middle"--to banish anonymity by creating a personalized learning environment for all of its students. The school was created six years ago when the four middle schools in Henry County, VA, were consolidated into two…

  9. Botnet detection and prevention in anonymous networks

    NARCIS (Netherlands)

    Kuhnert, Katharina; Steinberger, Jessica; Baier, Harald

    Botnets are a major threat to the Internet landscape and have been responsible for large scale distributed attacks on online services. To make take down measures more difficult, Botnet operators started to incorporate anonymous networks into their software to protect their users and their Botnets.

  10. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  11. Online counseling: a narrative and critical review of the literature.

    Science.gov (United States)

    Richards, Derek; Viganó, Noemi

    2013-09-01

    This article aimed to critically review the literature on online counseling. Database and hand-searches were made using search terms and eligibility criteria, yielding a total of 123 studies. The review begins with what characterizes online counseling. Outcome and process research in online counseling is reviewed. Features and cyberbehaviors of online counseling such as anonymity and disinhibition, convenience, time-delay, the loss of social signaling, and writing behavior in cyberspace are discussed. Ethical behavior, professional training, client suitability, and clients' and therapists' attitudes and experiences of online counseling are reviewed. A growing body of knowledge to date is positive in showing that online counseling can have a similar impact and is capable of replicating the facilitative conditions as face-to-face encounters. A need remains for stronger empirical evidence to establish efficacy and effectiveness and to understand better the unique mediating and facilitative variables. © 2013 Wiley Periodicals, Inc.

  12. Career Counseling for the Gifted: Assessments and Interventions.

    Science.gov (United States)

    Kerr, Barbara A.

    1986-01-01

    Compared (a) three vocational assessment batteries, (b) structured individual counseling and unstructured individual counseling, and (c) mixed-sex versus same sex career groups in terms of their usefulness, educational value, and enjoyability as perceived by gifted adolescents. Students preferred a test battery consisting of the Self-Directed…

  13. Research on Anonymization and De-anonymization in the Bitcoin System

    OpenAIRE

    ShenTu, QingChun; Yu, JianPing

    2015-01-01

    The Bitcoin system is an anonymous, decentralized crypto-currency. There are some deanonymizating techniques to cluster Bitcoin addresses and to map them to users' identifications in the two research directions of Analysis of Transaction Chain (ATC) and Analysis of Bitcoin Protocol and Network (ABPN). Nowadays, there are also some anonymization methods such as coin-mixing and transaction remote release (TRR) to cover the relationship between Bitcoin address and the user. This paper studies an...

  14. Substance Abuse and Clinical Counseling Students' Characteristics and Career Goals

    Science.gov (United States)

    Goodwin, Lloyd R., Jr.; Sias, Shari M.

    2007-01-01

    Students from a master's program in Substance Abuse and Clinical Counseling (SACC) at a midsize southeastern university were surveyed to determine personal characteristics and career goals. Sixty-two of the 68 students currently enrolled in the program volunteered to anonymously complete the questionnaire. The typical profile of the SACC student…

  15. Academic freedom, public reactions, and anonymity.

    Science.gov (United States)

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims. © 2014 John Wiley & Sons Ltd.

  16. Yahtzee: an anonymized group level matching procedure.

    Science.gov (United States)

    Jones, Jason J; Bond, Robert M; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam D I; Marlow, Cameron; Fowler, James H

    2013-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  17. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  18. Anonymous quantum communications using the quantum one-time pad

    International Nuclear Information System (INIS)

    Wang, Qing-Le; Gao, Fei-; Liu, Bin; Song, Ting-Ting; Wen, Qiao-Yan

    2015-01-01

    We present the first quantum secure communication protocol for an anonymous receiver without the assistance of anonymous entanglement. In previous works, if a public sender wants to send quantum messages to a chosen receiver while protecting the identity of the receiver from others, all participants should cooperate first to construct the entanglement between the sender and the anonymous receiver. This is the most important process in anonymous quantum communications. With anonymous entanglement, the sender can communicate quantum messages to the anonymous receiver by applying teleportation protocols. In contrast, our protocol is novel and achieves communication of quantum messages directly from the public sender to the anonymous receiver based on the quantum one-time pad and current achievements. Notably, the anonymity of the receiver, as well as the privacy of the quantum messages, is perfectly protected with the exception of an exponentially small probability in our protocol. (paper)

  19. A framework for automatically checking anonymity with μ CRL

    OpenAIRE

    Chothia, T.; Orzan, S.M.; Pang, J.; Torabi Dashti, M.; Montanari, U.; Sannella, D.; Bruni, R.

    2007-01-01

    We present a powerful and flexible method for automatically checking anonymity in a possibilistic general-purpose process algebraic verification toolset. We propose new definitions of a choice anonymity degree and a player anonymity degree, to quantify the precision with which an intruder is able to single out the true originator of a given event or to associate the right event to a given protocol participant. We show how these measures of anonymity can be automatically calculated from a prot...

  20. Assessing Anonymous Communication on the Internet: Policy Deliberations.

    Science.gov (United States)

    Kling, Rob; Lee, Yaching; Frankel, Mark S.; Teich, Al

    1999-01-01

    Examines the social character of anonymous online communication and the ways that anonymous communication has played important roles for professionals such as journalists and the police. Explains some of the new technological supports for anonymous communication on the Internet. Discusses some of the nuances behind the controversies and policy…

  1. Security Analysis of Accountable Anonymous Group Communication in Dissent

    Science.gov (United States)

    2013-01-31

    instance, group discussion forums or instant messaging. Misbehaving users may abuse this anonymity to disrupt communication, however, and existing...Abstract Users often wish to communicate anonymously on the Internet using, for instance, group discussion forums or instant messaging. Misbehaving users may...personal reprisal (Stein 2003). Yet anonymity makes it difficult to trace or exclude misbehaving participants (Davenport 2002). Online proto- cols

  2. Factors for Personal Counseling among Counseling Trainees

    Science.gov (United States)

    Byrne, J. Stephen; Shufelt, Brett

    2014-01-01

    The present study explored the use of counseling among counselor trainees and the characteristics of consumers and nonconsumers. Approximately 61% of those surveyed (n = 85) reported that they had received counseling, with the majority being mental health counseling trainees. Nonconsumers (n = 54) indicated that they coped with problems in other…

  3. Suicidal behavior among members of Gamblers Anonymous.

    Science.gov (United States)

    Frank, M L; Lester, D; Wexler, A

    1991-09-01

    A national sample of 500 members of Gamblers Anonymous was surveyed by mail in order to gather information on suicidal history. One hundred sixty two usable surveys were returned representing 32.4% of the original sample. Compulsive gamblers who had a history of suicidal preoccupation began gambling at an earlier age than nonsuicidal gamblers and were more likely to have stolen to support their gambling. They also tended to have addicted relatives and children more than nonsuicidal gamblers did. The data suggest that those gamblers who had been suicidal tend to be more serious gamblers than nonsuicidal respondents.

  4. Towards Predicting Efficient and Anonymous Tor Circuits

    OpenAIRE

    Barton, Armon; Imani, Mohsen; Ming, Jiang; Wright, Matthew

    2018-01-01

    The Tor anonymity system provides online privacy for millions of users, but it is slower than typical web browsing. To improve Tor performance, we propose PredicTor, a path selection technique that uses a Random Forest classifier trained on recent measurements of Tor to predict the performance of a proposed path. If the path is predicted to be fast, then the client builds a circuit using those relays. We implemented PredicTor in the Tor source code and show through live Tor experiments and Sh...

  5. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  6. For the Lulz: Anonymous, Aesthetics and Affect

    Directory of Open Access Journals (Sweden)

    Rodrigo Ferrada Stoehrel

    2014-03-01

    Full Text Available The focus of this paper is on different but connected areas of power – relating to things such as economic globalisation, surveillance, censorship/freedom, ‘terrorism’ and/or specific military activity – visually represented through online media, and intentionally produced to inform a wide spectrum of individuals and interest groups about global and local social injustices. Or, more importantly, produced and distributed with the purpose of providing users with possibilities to engage, bodily and emotionally, in diverse ways: may it be through physical antiwar/anti-wall street protests or hacktivist tactics (e.g. DDoS attacks. We examine a sample of videos, photographs and propaganda posters produced, and digitally distributed (2008-2013, by the fragmented body of activists united globally under the generic name of Anonymous. Analytically, we will draw upon Mouffe’s thoughts on ‘antagonism’ and ‘passion,’ Foucault’s ideas on international citizenship and the (ethical ‘right to intervene’ (beyond governmentality, together with Sontag’s notion of institutional political inertia and the Deleuzian/Spinozian perspective on affect as a capacity for action. The goal is to analyse the ways in which Anonymous systematically inspire (not only the radical and social imaginary but also other direct forms of action that have potential societal effects.

  7. Yahtzee: an anonymized group level matching procedure.

    Directory of Open Access Journals (Sweden)

    Jason J Jones

    Full Text Available Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  8. Our Anonymous Online Research Participants Are Not Always Anonymous: Is This a Problem?

    Science.gov (United States)

    Dawson, Phillip

    2014-01-01

    When educational research is conducted online, we sometimes promise our participants that they will be anonymous--but do we deliver on this promise? We have been warned since 1996 to be careful when using direct quotes in Internet research, as full-text web search engines make it easy to find chunks of text online. This paper details an empirical…

  9. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    LENUS (Irish Health Repository)

    Sills, Eric Scott

    2010-08-11

    Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p < 0.001). Infertility duration was ≥3 yrs for couples enrolling in dual gamete donation, and each had ≥2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5\\/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  10. Digital anonymity on the internet : new rules for anonymous electronic transactions? an exploration of the private law implications of digital anonymity

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.; Prins, C.

    2001-01-01

    This article sets out the most important conclusions of the first stage of a study into the dimensions of digital anonymity. It is intended to set out the problem, make people aware of the intricacies of the problem and thus stimulate the debate on useful legal structures for anonymity. The

  11. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  12. Sex and the Filipino adolescent.

    Science.gov (United States)

    Anigan, G

    1979-01-01

    Very little is known about Filipino adolescents. Professional opinion varies enormously as to what is to be considered normal and abnormal. 1 aspect of adolescence which is agreed upon is that it is a period of great change. What brings on puberty is a controversial topic. Nutrition and genetic inheritance have been found to affect the age at which menstruation begins. Environment plays a large role in emotional and social growth. Filipino sex education is rather haphazard. A study of over 5000 adolescents in 1972-73 showed that sexual information was gained principally from pornographic literature, movies, television and friends. Boys also watched strip-tease acts and went to houses of prostitution. 2/3 of males and 3/4 of females had had crushes, while over 1/2 of both sexes had "gone steady" by age 16. Boys fell in love more often and less seriously than did girls. Girls generally have more adjustment problems in adolescence than do boys. Among Filipino adolescents, dating is the top ranking sex-related problem. Both sexes are concerned with what is the proper behavior in dating. Dating is an erotic as well as a social experience for Filipino adolescents. Premarital sexual activity is now receiving more tolerance. Urban males are less concerned with the virginity of their brides, but adults are still intolerant. Perhaps the present generation of adolescents is the harbinger of a new sexual morality. Fertility rates for 15-19 year olds have been declining since the 1960s. However, among adolescents with problems, pregnancy ranks high. Homosexuals are more visible in the Philippines now, as they are being more tolerated. Adolescent fertility is the last great challenge in the family planning field. Problems are unwillingness of counselors to participate in studies and a paucity of basic research. 3 studies are now being conducted in the Metro Manila area. Peer counseling and multiservice centers which provide relative anonymity are 2 approaches which shoul d be

  13. Really not god: Secularization and pragmatism in Gamblers Anonymous.

    Science.gov (United States)

    Browne, B R

    1994-09-01

    The paper argues that despite maintaining the image of a twelve-step organization, the central theme of the history of Gamblers Anonymous (GA) in the United States is the increasing secularization of the program of the recovery. The paper documents the increasing secularization and pragmatism of Gamblers Anonymous, as reflected in key documents, despite the spiritual vision of its founding member. The author speculates on why Gamblers Anonymous took a secularized development path. Further research is called for.

  14. Utility-preserving anonymization for health data publishing.

    Science.gov (United States)

    Lee, Hyukki; Kim, Soohyung; Kim, Jong Wook; Chung, Yon Dohn

    2017-07-11

    Publishing raw electronic health records (EHRs) may be considered as a breach of the privacy of individuals because they usually contain sensitive information. A common practice for the privacy-preserving data publishing is to anonymize the data before publishing, and thus satisfy privacy models such as k-anonymity. Among various anonymization techniques, generalization is the most commonly used in medical/health data processing. Generalization inevitably causes information loss, and thus, various methods have been proposed to reduce information loss. However, existing generalization-based data anonymization methods cannot avoid excessive information loss and preserve data utility. We propose a utility-preserving anonymization for privacy preserving data publishing (PPDP). To preserve data utility, the proposed method comprises three parts: (1) utility-preserving model, (2) counterfeit record insertion, (3) catalog of the counterfeit records. We also propose an anonymization algorithm using the proposed method. Our anonymization algorithm applies full-domain generalization algorithm. We evaluate our method in comparison with existence method on two aspects, information loss measured through various quality metrics and error rate of analysis result. With all different types of quality metrics, our proposed method show the lower information loss than the existing method. In the real-world EHRs analysis, analysis results show small portion of error between the anonymized data through the proposed method and original data. We propose a new utility-preserving anonymization method and an anonymization algorithm using the proposed method. Through experiments on various datasets, we show that the utility of EHRs anonymized by the proposed method is significantly better than those anonymized by previous approaches.

  15. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...... bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...

  16. Emotional Intelligence Levels and Counselling Skills of Prospective Psychological Counsellors

    Science.gov (United States)

    Odaci, Hatice; Degerli, Fatma Irem; Bolat, Neslihan

    2017-01-01

    This research aimed to determine the correlation between emotional intelligence (EI) and counselling skills of Turkish prospective psychological counsellors and to investigate differences in both EI and counselling skills in terms of sex, previous experience of group studies, and class levels. Within a correlational pattern, the sample of the…

  17. What Does Anonymization Mean? DataSHIELD and the Need for Consensus on Anonymization Terminology.

    Science.gov (United States)

    Wallace, Susan E

    2016-06-01

    Anonymization is a recognized process by which identifiers can be removed from identifiable data to protect an individual's confidentiality and is used as a standard practice when sharing data in biomedical research. However, a plethora of terms, such as coding, pseudonymization, unlinked, and deidentified, have been and continue to be used, leading to confusion and uncertainty. This article shows that this is a historic problem and argues that such continuing uncertainty regarding the levels of protection given to data risks damaging initiatives designed to assist researchers conducting cross-national studies and sharing data internationally. DataSHIELD and the creation of a legal template are used as examples of initiatives that rely on anonymization, but where the inconsistency in terminology could hinder progress. More broadly, this article argues that there is a real possibility that there could be possible damage to the public's trust in research and the institutions that carry it out by relying on vague notions of the anonymization process. Research participants whose lack of clear understanding of the research process is compensated for by trusting those carrying out the research may have that trust damaged if the level of protection given to their data does not match their expectations. One step toward ensuring understanding between parties would be consistent use of clearly defined terminology used internationally, so that all those involved are clear on the level of identifiability of any particular set of data and, therefore, how that data can be accessed and shared.

  18. Sex and Fertility After SCI

    Medline Plus

    Full Text Available ... Counseling Blog About Media Donate Spinal Cord Injury Medical Expert Videos Topics menu Topics Sex and Fertility ... injury? What is a Spinal Cord Injury? SCI Medical Experts People Living With SCI Personal Experiences By ...

  19. Sex and Fertility After SCI

    Medline Plus

    Full Text Available ... Resources Peer Counseling Blog About Media Donate close search Understanding Spinal Cord Injury What is a Spinal ... male fertility? play_arrow Where can people get information on sex and fertility after a spinal cord ...

  20. Sex and Fertility After SCI

    Medline Plus

    Full Text Available ... Topic Resources Peer Counseling Blog About Media Donate Spinal Cord Injury Medical Expert Videos Topics menu Topics Sex and Fertility After Spinal Cord Injury Adult Injuries Spinal Cord Injury 101 David Chen, ...

  1. Sex and Fertility After SCI

    Medline Plus

    Full Text Available ... Topic Resources Peer Counseling Blog About Media Donate Spinal Cord Injury Medical Expert Videos Topics menu Topics Sex and Fertility After Spinal Cord Injury Adult Injuries Spinal Cord Injury 101 David ...

  2. Edo Journal of Counselling

    African Journals Online (AJOL)

    Edo Journal of Counselling, the official publication of Edo Chapter of Counselling ... The Mediating Impact of Personality and Socio-Economic Status in the ... Fostering Adolescents' Interpersonal Behaviour: An Empirical Assessment of ...

  3. Prenatal Genetic Counseling (For Parents)

    Science.gov (United States)

    ... Videos for Educators Search English Español Prenatal Genetic Counseling KidsHealth / For Parents / Prenatal Genetic Counseling What's in ... can they help your family? What Is Genetic Counseling? Genetic counseling is the process of: evaluating family ...

  4. Vote to link: Recovering from misbehaving anonymous users

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation,

  5. An Applet-based Anonymous Distributed Computing System.

    Science.gov (United States)

    Finkel, David; Wills, Craig E.; Ciaraldi, Michael J.; Amorin, Kevin; Covati, Adam; Lee, Michael

    2001-01-01

    Defines anonymous distributed computing systems and focuses on the specifics of a Java, applet-based approach for large-scale, anonymous, distributed computing on the Internet. Explains the possibility of a large number of computers participating in a single computation and describes a test of the functionality of the system. (Author/LRW)

  6. Contraceptive counseling for adolescents.

    Science.gov (United States)

    Potter, Julia; Santelli, John S

    2015-11-01

    The majority of adolescents become sexually active during their teenage years, making contraceptive counseling an important aspect of routine adolescent healthcare. However, many healthcare providers express discomfort when it comes to counseling adolescents about contraceptive options. This Special Report highlights the evidence supporting age-appropriate contraceptive counseling for adolescents and focuses on best practices for addressing adolescents' questions and concerns about contraceptive methods.

  7. Are anonymous evaluations a better assessment of faculty teaching performance? A comparative analysis of open and anonymous evaluation processes.

    Science.gov (United States)

    Afonso, Nelia M; Cardozo, Lavoisier J; Mascarenhas, Oswald A J; Aranha, Anil N F; Shah, Chirag

    2005-01-01

    We compared teaching performance of medical school faculty using anonymous evaluations and open evaluations (in which the evaluator was not anonymous) and examined barriers to open evaluation. Residents and medical students evaluated faculty using an open evaluation instrument in which their identity was indicated in the evaluation. Following this, they completed anonymous evaluation on the same faculty members. Aggregate outcomes using the two evaluation systems were compared. Outcomes by group of evaluators (residents and students) were analyzed. Trainees were also asked to rate the barriers to the open evaluation process. A statistically significant difference between the open and anonymous evaluations was noted across all items, with faculty receiving lower scores on the anonymous evaluations. The mean score for all the items on the open evaluations was 4.45 +/- 0.65, compared to mean score of 4.07 +/- 0.80 on the anonymous evaluations. There was also a statistically significant difference between open and anonymous evaluations in five clinical teaching domains that were evaluated individually. Residents perceived that the three most common barriers to optimal evaluation were an apprehension of possible encounters with the same attending physician in the future, destruction of working relationships with the attending, and a feeling of frustration with the evaluation system. The evaluation of faculty teaching performance is complex. Most academic medical centers use the open evaluation format. This study supports the case for the use of the anonymous evaluation method as a more accurate reflection of teaching performance.

  8. “We are Anonymous.” Anonymity in the Public Sphere – Challenges of Free and Open Communication

    Directory of Open Access Journals (Sweden)

    Saskia Sell

    2013-05-01

    Full Text Available Anonymity, the stealth mode of public communication, challenges different actors who deal with freedom of communication issues in their day to day life – be it professional journalists, information and communication scientists, technicians or political activists. This article aims to deliver theoretical background on the concept of anonymity on the macro-level, as well as to shed light on how different communicators deal with anonymity on the micro-level. Based on the example of the Anonymous movement, communicative actions are put in relation to media technological artifacts and their surrounding media environment with a focus on journalistic practice and public response to the phenomenon. The analysis concludes with the need for a preservation of options for anonymous public communication as a dimension of freedom of communication after carefully considering both the advantages and the potential risks connected to that mode of private-public communication.

  9. Fictional Marriage Proposal of Anonymous Astrakhan Khan

    Directory of Open Access Journals (Sweden)

    Roman Hautala

    2017-03-01

    Full Text Available The following text is reproduced from a handwritten copy of the letter made by the Italian humanist Gian Vincenzo Pinelli (1535–1601 and contained in one codex of Ambrosiana Library in Milan (R 104 sup., fol. 194r [see the description of the codex in: 3, no. 341. p. 125]. This codex (588 folios contains Italian and Latin texts of the 16th century of extremely diverse content, which does not allow to determe neither the name of the author of the reproduced letter, nor the date of its writing. Nevertheless, a reference to the name of “Luther” in the letter suggests that it must have been written in the 16th century and an indication of the main purpose of the letter – matchmaking to anonymous queen – makes it possible to put forward quite a bold (but, for now, unproven hypothesis that this letter might be addressed to approximates of the Polish Queen Bona Sforza and the widow of King Sigismund I the Old starting with the April 1, 1548. Following this hypothesis, the alleged author of the letter could be the ruler of Astrakhan Yamgurchi or the Crimean khan Sahib Giray. However, this assumption remains only a hypothesis, and the author of this article hopes that future researchers will be able to identify both the author of the letter and its recipients. Be that as it may, this letter is of undoubtedly fictitious character since it does not indicate the name of its author and the date of writing and obviously differs from official form of the Tatar rulers’ letters. Undoubtedly, this letter refers to the literary genre of fictional letters of the rulers, which became extremely popular in Europe since the second half of the 15th century. As an illustration of this genre, the author of this article presents a “letter” of the Turkish sultan to the Tatars and their “response” from the fictional collection of “Letters of the Great Turk” [1, fol. 18r] of Laudivius Hierosolymitanus, which was a relatively widespread in Europe in the

  10. Knowledge, Attitudes, and Practices of Voluntary HIV Counseling and Testing among Rural Migrants in Shanghai, China

    Science.gov (United States)

    He, Na; Zhang, Jinling; Yao, Jinjian; Tian, Xiuhong; Zhao, Genming; Jiang, Qingwu; Detels, Roger

    2009-01-01

    A study of knowledge, attitudes and practices (KAP) of voluntary HIV counseling and testing (VCT) among rural migrants was conducted in Shanghai, China. An anonymous questionnaire was administered face-to-face. Among 2,690 participants, 78% reported having had lifetime sexual intercourse with 41.3% of singles reporting sexual intercourse, 9.2%…

  11. Predicting Burnout and Career Choice Satisfaction in Counseling Psychology Graduate Students

    Science.gov (United States)

    Clark, Heddy Kovach; Murdock, Nancy L.; Koetting, Kristin

    2009-01-01

    Counseling psychology doctoral students (N = 284) from 53 training programs throughout the United States anonymously completed online measures of burnout, career choice satisfaction, global stress, role conflict, social support (from family/friends, advisors, other students) and psychological sense of community (SOC) in the doctoral program. Two…

  12. Property-Based Anonymous Attestation in Trusted Cloud Computing

    Directory of Open Access Journals (Sweden)

    Zhen-Hu Ning

    2014-01-01

    Full Text Available In the remote attestation on Trusted Computer (TC computing mode TCCP, the trusted computer TC has an excessive burden, and anonymity and platform configuration information security of computing nodes cannot be guaranteed. To overcome these defects, based on the research on and analysis of current schemes, we propose an anonymous proof protocol based on property certificate. The platform configuration information is converted by the matrix algorithm into the property certificate, and the remote attestation is implemented by trusted ring signature scheme based on Strong RSA Assumption. By the trusted ring signature scheme based on property certificate, we achieve the anonymity of computing nodes and prevent the leakage of platform configuration information. By simulation, we obtain the computational efficiency of the scheme. We also expand the protocol and obtain the anonymous attestation based on ECC. By scenario comparison, we obtain the trusted ring signature scheme based on RSA, which has advantages with the growth of the ring numbers.

  13. Authentic Attributes with Fine-Grained Anonymity Protection

    Science.gov (United States)

    2000-01-01

    registrations and ecommerce trans- Preprint - 2 Stuart G. Stubblebine, and Paul F. Syverson. Authentic Attributes with Fine-Grained Anonymity Protection...driver’s license and birth certi cate. When the registration process is complete, certi cates could be on a smart card that the customer is carrying. The...proof. At least initially, it might not be electronic, e.g., possession of a passport, of a driver’s license and birth certi cate, etc. Anonymous

  14. System for Anonymous Data Collection Based on Group Signature Scheme

    Directory of Open Access Journals (Sweden)

    David Troják

    2016-01-01

    Full Text Available This paper deals with an anonymous data collection in the Internet of Things (IoT. the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

  15. Virginia Tech's Cook Counseling Center receives international counseling accreditation

    OpenAIRE

    DeLauder, Rachel

    2010-01-01

    The Virginia Tech Thomas E. Cook Counseling Center has been accredited by the International Association of Counseling Services, Inc., an organization of United States, Canadian, and Australian counseling agencies based in Alexandria, Va.

  16. Prospective parents' intentions regarding disclosure following the removal of donor anonymity.

    Science.gov (United States)

    Crawshaw, Marilyn

    2008-06-01

    This short survey of UK infertility counsellors was designed to determine whether the removal of donor anonymity resulted in noticeable changes in prospective parents' stated intentions regarding disclosure of their origins to any children conceived through donor conception. Members of the British Infertility Counselling Association working in Human Fertilisation and Embryology Authority (HFEA) -- licensed centres, before and after the legal changes, were sent a short questionnaire that included space for free comments (take-up: 62%). Three-quarters reported changes. Of these, two-thirds said prospective parents were more likely to say they would disclose, while less than a tenth said prospective parents were less likely do so. Where no changes were noted, this was primarily because the majority of prospective parents had stated their intention to be open even prior to the legal changes. Possible influences on intentions included: the culture within the centre, moves towards openness within the wider society, and parents' lack of confidence regarding how to go about disclosure. Follow-up studies are needed to improve understanding of whether influences on decision making carry through to patterns of actual disclosure; whether involvement in counselling affects outcomes; and whether access to professional assistance at the time of planned disclosure is helpful.

  17. The 'reformation' of counselling

    Directory of Open Access Journals (Sweden)

    G.A. Lotter

    2001-08-01

    Full Text Available Although the Reformation took place some four hundred years ago, one area in which reformation is really needed today is the counselling of people. Since Wilhelm Wundt started the “study of the mind” in 1879, William James and Sigmund Freud followed and secular psychology gradually has developed to take the “front seat”; hence moving Biblical counselling, which has been practised since the times of the New Testament, to the “back burner”. This development had been going on for the greater part of the 20th century, up to the publication of Competent to Counsel by Jay E. Adams in 1970. In the model for counselling suggested by Adams, the principles of the Reformation of the sixteenth century, Soli Deo Gloria, Soli Scriptura, Soli Fidei, Sola Gratia, etc. were again implemented in assisting and counselling people with personal and interpersonal problems. The epistomological and anthropological approach of secular psychology differs radically from that of Biblical principles, thus necessitating a new “reformation” of counselling. Within this new form counselling, inter alia, implies the following: the Word of God has its rightful place, sin has to be taken seriously and the work of the Holy Spirit should be recognised. In this article it is proposed that the “reformation” of counselling was started by scholars with a Biblical Reformational approach and that this method of counselling followed the parameters of the Reformation of the sixteenth century. This “reformation” developed into a new direction in counselling and still continues today with fascinating new frontiers opening up for Biblical counselling.

  18. Interim policy on establishment and operation of internet open, anonymous information servers and services

    OpenAIRE

    Acting Dean of Computer and Information Services

    1995-01-01

    Purpose. To establish interim NPS general policy regarding establishment and operation of Open, Anonymous Information Servers and Services, such as World Wide Web (http), Gopher, Anonymous FTP, etc...

  19. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  20. Publishing International Counseling Articles

    Science.gov (United States)

    Hohenshil, Thomas H.; Amundson, Norman E.

    2011-01-01

    This article begins with a rationale for including international articles in the "Journal of Counseling & Development." Then, 2 general categories of international articles are described. First are articles that provide a general overview of counseling in a particular country. The 2nd category is more general and might involve international…

  1. Counseling in teacher education

    DEFF Research Database (Denmark)

    Mølgaard, Dorthe Busk

    Counseling is about supporting and challenging students in making decisions, being adaptive, seeing opportunities and acquiring self-knowledge. Literaturesearch of articles about counseling research in nordic teacher education 2008-2013 shows no results. We started a participant-orientated pilotp......Counseling is about supporting and challenging students in making decisions, being adaptive, seeing opportunities and acquiring self-knowledge. Literaturesearch of articles about counseling research in nordic teacher education 2008-2013 shows no results. We started a participant......-orientated pilotproject about counseling in teacher education. The aim was to acquire knowledge about how students perceive counseling. This knowledge could help uncover potential areas of development for counselingpractice. In the pilotproject it is tested if the chosen method is suitable for bigger qualitative study....... The study is a qualitative questionnaire survey. The “lifeworld” is central, therefore a phenomenological and hermeneutical approach was chosen, where the student’s perception of the counseling is studied. Central themes: Setting of the counseling and progress of the counselingcourse, content and shape...

  2. Narrative Dietary Counseling

    DEFF Research Database (Denmark)

    Søndergaard Jakobsen, Nina; Kaufmann, Lisbeth; Hennesser, Yvonne

    2017-01-01

    Using cases and empirical data from a research and development project at a Danish prevention center, this study explores whether and how the use of narrative dietary counseling can strengthen dietitians' relationships and collaboration with clients who are chronically ill. The results of the study...... dietary counseling empowered clients and improved relationship building and collaboration between client and dietitian....

  3. Beyond spaces of counselling

    DEFF Research Database (Denmark)

    Bank, Mads; Nissen, Morten

    2017-01-01

    The article articulates experiments with spatial constructions in two Danish social work agencies, basing on (a) a sketchy genealogical reconstruction of conceptualisations and uses of space in social work and counselling, (b) a search for theoretical resources to articulate new spaces, and (c...... spaces are forms of spatialisations which might be taken as prototypical in attempts to develop social work and counselling...

  4. Crisis Counseling: An Overview

    Science.gov (United States)

    Sandoval, Jonathan; Scott, Amy Nicole; Padilla, Irene

    2009-01-01

    Psychologists working in schools are often the first contacts for children experiencing a potentially traumatizing event or change in status. This article reviews basic concepts in crisis counseling and describes the components of psychological first aid. This form of counseling must be developmentally and culturally appropriate as well as…

  5. Counseling in Singapore

    Science.gov (United States)

    Yeo, Lay See; Tan, Soo Yin; Neihart, Maureen F.

    2012-01-01

    Singapore, a tiny island nation, rose from 3rd- to 1st-world status in just 3 decades. Unlike in most developed countries, counseling in Singapore has a short history with faith-based beginnings and currently faces challenges to remain culturally relevant. The authors trace the development of Singapore's counseling services, provide an update…

  6. Islamic approach in counseling.

    Science.gov (United States)

    Hanin Hamjah, Salasiah; Mat Akhir, Noor Shakirah

    2014-02-01

    A religious approach is one of the matters emphasized in counseling today. Many researchers find that there is a need to apply the religious element in counseling because religion is important in a client's life. The purpose of this research is to identify aspects of the Islamic approach applied in counseling clients by counselors at Pusat Kaunseling Majlis Agama Islam Negeri Sembilan (PKMAINS). In addition, this research also analyses the Islamic approach applied in counseling at PKMAINS with reference to al-Quran and al-Sunnah. This is a qualitative research in the form of case study at PKMAINS. The main method used in this research is interview. The research instrument used is interview protocol. The respondents in this study include 9 counselors who serve in one of the counseling centers in Malaysia. This study also uses questionnaire as an additional instrument, distributed to 36 clients who receive counseling service at the center. The findings of the study show that the Islamic approach applied in counseling at PKMAINS may be categorized into three main aspects: aqidah (faith), ibadah (worship/ultimate devotion and love for God) and akhlaq (moral conduct). Findings also show that the counseling in these aspects is in line with Islamic teachings as contained in al-Quran and al-Sunnah.

  7. Counseling Graduate Students.

    Science.gov (United States)

    Caple, Richard B.

    1995-01-01

    Explores how the understanding of graduate students' special needs and circumstances enhances counseling of this population. Looks at stress factors, educational preparation, delayed gratification, achieving autonomy, intellectual development, and the counseling process. Emphasizes the importance of establishing trust in the therapeutic dialog so…

  8. Counseling for Empowerment.

    Science.gov (United States)

    McWhirter, Ellen Hawley

    Counseling for empowerment is a complex and multifaceted process that requires, for some, a radical departure from the traditional conceptualization of the helper's role. The process of empowerment demands that professional helpers and their clients take an active, collaborative approach to identifying problems and goals. Drawing from counseling,…

  9. Malpractice in Counseling Neuropsychology.

    Science.gov (United States)

    Woody, Robert Henley

    1992-01-01

    Responds to earlier four articles on integration of counseling psychology and neuropsychology by noting that neuropsychology occurs in settings with high risk of legal complaints. Contends that aspiration to press counseling psychology toward clinical neuropsychology should be filtered through consideration for legal risk. Explores legal…

  10. Multiple Sex Partner and Risk Behaviour Among Secondary School ...

    African Journals Online (AJOL)

    Tanzania is realizing increase in adolescents engaged in multiple sex partner behaviour and premarital sex. The objective of this study was to assess the awareness of multiple sex partner behaviour and risk factors among secondary school students in Moshi, Tanzania. Anonymously, questionnaires were completed by 360 ...

  11. Criminal offenses in gamblers anonymous and hospital treated pathological gamblers.

    Science.gov (United States)

    Blaszczynski, A P; McConaghy, N

    1994-06-01

    The purpose of this study was to compare the nature and prevalence of gambling and non-gambling related offenses in samples of pathological gamblers seeking behavioural treatment from a hospital-based program and those attending Gamblers Anonymous. A semi-structured interview schedule obtaining demographic data and details of the nature, frequency, and consequent legal action of criminal offenses committed was administered to 152 consecutive hospital treated pathological gamblers, and 154 Gamblers Anonymous attendees who volunteered to participate in the study. Of the total sample, 59% admitted a gambling-related offense, and 23% to a conviction. There was no difference in the proportion of hospital treated and Gamblers Anonymous subjects who offended. The most common gambling-related offenses were larceny, embezzlement and misappropriation. Gamblers committed a median of ten offenses over an average ten year period of pathological gambling with a median value of $ A 300(1) per offense. The median value for each non-gambling-related offense was $ A 130. Except for the significantly older mean age of Gamblers Anonymous subjects, hospital treated gamblers did not differ from Gamblers Anonymous attenders on relevant demographic features or parameters of gambling behaviour. Findings were interpreted to suggest a possible causal link between pathological gambling and the commission of non-violent property offenses.

  12. The Effects of Perceived Anonymity on Altruistic Punishment

    Directory of Open Access Journals (Sweden)

    Jared Piazza

    2008-07-01

    Full Text Available Previous studies investigating altruistic punishment have confounded the effects of two independent variables: information transmission (or breach of privacy and personal identification (or breach of anonymity. Here we report findings from a brief study in which participants were asked to respond to a social norm violation (i.e., an anonymous actor had behaved selfishly in an economic game by deciding whether to sacrifice their own endowment to punish this person. A third of the participants were told that their economic decisions would be made known to another player but could not be identified (privacy breach condition, whereas another third were informed that their decision as well as their names would be made known (anonymity breach condition. (The decisions of control participants were completely anonymous and private. Participants also justified their economic decisions and reported their emotional experiences. The results were participants punished most in the privacy and anonymity breach conditions and least in the control condition. These findings have implications for existing evolutionary accounts of altruistic punishment.

  13. Anonymity in Peer-assisted CDNs: Inference Attacks and Mitigation

    Directory of Open Access Journals (Sweden)

    Jia Yaoqi

    2016-10-01

    Full Text Available The peer-assisted CDN is a new content distribution paradigm supported by CDNs (e.g., Akamai, which enables clients to cache and distribute web content on behalf of a website. Peer-assisted CDNs bring significant bandwidth savings to website operators and reduce network latency for users. In this work, we show that the current designs of peer-assisted CDNs expose clients to privacy-invasive attacks, enabling one client to infer the set of browsed resources of another client. To alleviate this, we propose an anonymous peer-assisted CDN (APAC, which employs content delivery while providing initiator anonymity (i.e., hiding who sends the resource request and responder anonymity (i.e., hiding who responds to the request for peers. APAC can be a web service, compatible with current browsers and requiring no client-side changes. Our anonymity analysis shows that our APAC design can preserve a higher level of anonymity than state-of-the-art peer-assisted CDNs. In addition, our evaluation demonstrates that APAC can achieve desired performance gains.

  14. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  15. Using anonymized reflection to teach ethics: a pilot study.

    Science.gov (United States)

    Kyle, Gaye

    2008-01-01

    Anonymized reflection was employed as an innovative way of teaching ethics in order to enhance students' ability in ethical decision making during a Care of the Dying Patient and Family' module. Both qualitative and quantitative data were collected from the first two student cohorts who experienced anonymized reflection ( n = 24). The themes identified were the richness and relevance of scenarios, small-group work and a team approach to teaching. Students indicated that they preferred this style of teaching. This finding was verified by a postal questionnaire conducted four months later. The conclusions drawn from this study suggest that using anonymized reflection is an effective method for teaching ethics to nurses and indicates that learning about ethical issues in this way reduces uncertainties.

  16. Anonymous Authorship Control for User-Generated Content

    Directory of Open Access Journals (Sweden)

    Suk-Bong LEE

    2007-12-01

    Full Text Available User-Generated Content (UGC is opening up new large market in content services, and more and more people are visiting web sites to share and enjoy UGCs. These trends make many authors to move into online. Authors want to conserve their authorship and expect to publish their UGC anonymously in cases. To meet the requirements, we propose a new authorship control model based on watermarking and metadata. Authors can embed their authorship into their UGC with identities or with anonym. Even though an author publishes his UGC anonymously, he can prove his authorship without unveiling his identity via 5 methods utilizing the proposed authorship model. The proposed model and methods need no TTP and are robust even based on fragile underlying watermarking scheme.

  17. Enabling genomic-phenomic association discovery without sacrificing anonymity.

    Directory of Open Access Journals (Sweden)

    Raymond D Heatherly

    Full Text Available Health information technologies facilitate the collection of massive quantities of patient-level data. A growing body of research demonstrates that such information can support novel, large-scale biomedical investigations at a fraction of the cost of traditional prospective studies. While healthcare organizations are being encouraged to share these data in a de-identified form, there is hesitation over concerns that it will allow corresponding patients to be re-identified. Currently proposed technologies to anonymize clinical data may make unrealistic assumptions with respect to the capabilities of a recipient to ascertain a patients identity. We show that more pragmatic assumptions enable the design of anonymization algorithms that permit the dissemination of detailed clinical profiles with provable guarantees of protection. We demonstrate this strategy with a dataset of over one million medical records and show that 192 genotype-phenotype associations can be discovered with fidelity equivalent to non-anonymized clinical data.

  18. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  19. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  20. Indigenous counseling: A needed area in school counseling in Nigeria

    African Journals Online (AJOL)

    Indigenous counselling has not been given attention in Nigeria's school counselling programme. This counselling gap was created by European colonialism, which succeeded in developing in the minds of the African that anything indigenous is local, unscientific and unorthodox. Indigenous counselling is one of the ...

  1. HIV counselling in prisons.

    Science.gov (United States)

    Curran, L; McHugh, M; Nooney, K

    1989-01-01

    HIV presents particular problem in penal establishments: the nature of the population; conditions in prison; media attention and misinformation; the possibility of transmission within and beyond the prison population; the extra issues that apply to female prisoners. These are discussed in the context of prison policy regarding HIV and the broad strategic approach which is being adopted to manage the problem of HIV within penal institutions. Counselling has a key role in the overall strategy. Pre- and post-test counselling with prisoners is described and the particular problems presented by inmates are discussed and illustrated by reference to case histories. Developments in counselling provision for inmates are outlined.

  2. Anonymizing patient genomic data for public sharing association studies.

    Science.gov (United States)

    Fernandez-Lozano, Carlos; Lopez-Campos, Guillermo; Seoane, Jose A; Lopez-Alonso, Victoria; Dorado, Julian; Martín-Sanchez, Fernando; Pazos, Alejandro

    2013-01-01

    The development of personalized medicine is tightly linked with the correct exploitation of molecular data, especially those associated with the genome sequence along with these use of genomic data there is an increasing demand to share these data for research purposes. Transition of clinical data to research is based in the anonymization of these data so the patient cannot be identified, the use of genomic data poses a great challenge because its nature of identifying data. In this work we have analyzed current methods for genome anonymization and propose a one way encryption method that may enable the process of genomic data sharing accessing only to certain regions of genomes for research purposes.

  3. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  4. Safe sex

    Science.gov (United States)

    ... sex; Sexually transmitted - safe sex; GC - safe sex; Gonorrhea - safe sex; Herpes - safe sex; HIV - safe sex; ... contact. STIs include: Chlamydia Genital herpes Genital warts Gonorrhea Hepatitis HIV HPV Syphilis STIs are also called ...

  5. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000 model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks.

  6. Controlling Depersonalized Counseling.

    Science.gov (United States)

    Balistrieri, Tom

    1982-01-01

    Outlines Gestalt therapy techniques to increase active listening and counselor/client involvement in career counseling. Discusses awareness through dialog, role playing or "presentizing," and experiential "presentizing." Presents a sample dialog as illustration. (RC)

  7. Therapy and Counseling

    Science.gov (United States)

    ... system of rewards and reinforcement of positive behavior. Psychoanalysis. This type of treatment encourages you to think ... work, marriage and family therapy, rehabilitation counseling, and psychoanalysis. Your family doctor can help you choose the ...

  8. A randomized controlled trial to evaluate the relative efficacy of adding voluntary counseling and testing (VCT) to information dissemination in reducing HIV-related risk behaviors among Hong Kong male cross-border truck drivers.

    Science.gov (United States)

    Lau, Joseph T F; Tsui, Hi Yi; Cheng, Shannon; Pang, Margaret

    2010-01-01

    Mobile populations are vulnerable to contracting HIV. The present study aims to evaluate the relative efficacy of the voluntary counseling and testing plus information dissemination (VCT-ID) approach versus the information dissemination (ID) approach for promoting HIV preventive behaviors in a mobile population, cross-border truck drivers. A total of 301 adult male cross-border truck drivers who self-reported having had sex with female sex workers (FSW) or non-regular sex partners (NRPs) in mainland China in the last 12 months were recruited and randomized into the VCT-ID intervention group (Group I) or ID control group (Group C). Anonymous structured questionnaires, administered through a computer-assisted method, were used to collect data. At the follow-up survey (about 8-9 weeks since the baseline survey), Group I participants, as compared to Group C participants, were more likely to be consistent condom users when having sex with FSW (85.5% versus 68.5%, p<0.05) and with NRP (54.8% versus 36.4%, p<0.1), more knowledgeable about HIV, and were less likely to have contracted sexually transmitted diseases (STD) in the last two months. The VCT-ID approach is shown to be more efficacious than the ID approach in promoting safer sex and HIV-related knowledge among local cross-border truck drivers. Feasibility of providing voluntary counseling and testing (VCT) services at locations which are convenient to the target population is demonstrated. It also shows that VCT services can be used as a means of HIV prevention. The findings of this study resulted in up-scaled VCT services for the local target population.

  9. Social distance and anonymity modulate fairness consideration: An ERP study

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  10. Policy-Aware Sender Anonymity in Location-Based Services

    Science.gov (United States)

    Vyas, Avinash

    2011-01-01

    Sender anonymity in Location-based services (LBS) refers to hiding the identity of a mobile device user who sends requests to the LBS provider for services in her proximity (e.g. "find the nearest gas station etc."). The goal is to keep the requester's interest private even from attackers who (via hacking or subpoenas) gain access to the LBS…

  11. Does spousal participation in Gamblers Anonymous benefit compulsive gamblers?

    Science.gov (United States)

    Johnson, E E; Nora, R M

    1992-12-01

    Extent of gambling-free periods was compared for 90 compulsive gamblers, 44 with spouses who participated in Gamblers Anonymous and 46 with spouses who did not. Although the results were in the direction of a beneficial effect of spousal participation, the relationship was statistically nonsignificant.

  12. Gamblers anonymous and cognitive-behavioral therapies for pathological gamblers.

    Science.gov (United States)

    Petry, Nancy M

    2005-01-01

    Numerous types of treatments for pathological gambling have been described, but two of the most common are Gamblers Anonymous (GA) and cognitive-behavioral therapy. This paper describes some outcome data associated with the two approaches. It also reviews evidence suggesting that a combined intervention may enhance therapy engagement and reduce relapse rates.

  13. Anonymous living liver donation: donor profiles and outcomes.

    Science.gov (United States)

    Reichman, T W; Fox, A; Adcock, L; Wright, L; Abbey, S E; Levy, G; Grant, D R

    2010-09-01

    There are no published series of the assessment process, profiles and outcomes of anonymous, directed or nondirected live liver donation. The outcomes of 29 consecutive potential anonymous liver donors at our center were assessed. We used our standard live liver assessment process, augmented with the following additional acceptance criteria: a logical rationale for donation, a history of social altruism, strong social supports and a willingness to maintain confidentiality of patient information. Seventeen potential donors were rejected and 12 donors were ultimately accepted (six male, six female). All donors were strongly motivated by a desire and sense of responsibility to help others. Four donations were directed toward recipients who undertook media appeals. The donor operations included five left lateral segmentectomies and seven right hepatectomies. The overall donor morbidity was 40% with one patient having a transient Clavien level 3 complication (a pneumothorax). All donors are currently well. None expressed regret about their decision to donate, and all volunteered the opinion that donation had improved their lives. The standard live liver donor assessment process plus our additional requirements appears to provide a robust assessment process for the selection of anonymous live liver donors. Acceptance of anonymous donors enlarges the donor liver pool. © 2010 The Authors Journal compilation © 2010 The American Society of Transplantation and the American Society of Transplant Surgeons.

  14. Who Goes There? Staying Anonymous on the Internet

    Science.gov (United States)

    Descy, Don E.

    2009-01-01

    Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…

  15. Simplifying Itai-Rodeh leaderelection for anonymous rings

    NARCIS (Netherlands)

    W.J. Fokkink (Wan); J. Pang

    2004-01-01

    textabstractWe present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh. In contrast to the Itai-Rodeh algorithm, our algorithms are finite-state. So they can be analyzed using explicit state space

  16. Simplifying Itai-Rodeh Leader Election for Anonymous Rings

    NARCIS (Netherlands)

    Fokkink, W.J.; Pang, J.

    2005-01-01

    We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh [A. Itai and M. Rodeh. Symmetry breaking in distributive networks. In Proc. FOCS'81, pp. 150-158. IEEE Computer Society, 1981]. In contrast to the

  17. The Efficacy of Non-Anonymous Measures of Bullying

    Science.gov (United States)

    Chan, John H. F.; Myron, Rowan; Crawshaw, Martin

    2005-01-01

    The Olweus checklist, along with most of the questionnaires commonly used in bullying research, is anonymous. The respondent is not required to put down his/her name. This has been accepted as the "best suited" method of assessing bullying. However, this assumption has not been adequately tested, and there is contrary evidence that this…

  18. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel; Zhao, Keliang; Papadias, Dimitris; Kalnis, Panos

    2010-01-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  19. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    van Drie, A.; Ganzevoort, R.R.; Spiering, M.

    2014-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria

  20. Forming Circle Formations of Anonymous Mobile Agents With Order Preservation

    NARCIS (Netherlands)

    Wang, Chen; Xie, Guangming; Cao, Ming

    2013-01-01

    We propose distributed control laws for a group of anonymous mobile agents to form desired circle formations when the agents move in the one-dimensional space of a circle. The agents are modeled by kinematic points. They share the common knowledge of the orientation of the circle, but are oblivious

  1. An Analysis of College Students' Anonymous Questions about Human Sexuality.

    Science.gov (United States)

    Valois, Robert F.; Waring, Kathryn A.

    1991-01-01

    Study analyzed the frequency and type of questions about sexuality submitted anonymously by college students in health education courses over five semesters. The most common categories were sexual arousal/response; general anatomy/physiology; contraception; dating/relationships; pregnancy/fertility; and sexually transmitted diseases. The appendix…

  2. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually

  3. Anonymously Productive and Socially Engaged While Learning at Work

    Science.gov (United States)

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  4. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  5. [Group counselling for the second trimester ultrasound: can group counselling be an alternative for individual counselling?].

    Science.gov (United States)

    de Lau, Hinke; Depmann, Martine; Laeven, Yvo J M; Stoutenbeek, Philip H; Pistorius, Lou R; van Beek, Erik; Schuitemaker, Nico W E

    2013-01-01

    To compare group counselling to individual counselling with respect to the second trimester ultrasound. A prospective cohort study at two hospitals. At one hospital, 100 pregnant women were counselled on the risks and benefits of the second trimester ultrasound in groups of up to 15 patients. Shortly before the ultrasound they were asked to fill out a questionnaire. Results were compared to 100 women who were counselled individually at another hospital. The primary outcome was the level of informed choice whether or not to undergo the ultrasound, defined as sufficient knowledge and a value-consistent decision. The secondary outcome measures were level of understanding of the second trimester ultrasound and the degree of satisfaction with the counselling. The resulting level of informed choice was 87.0% after group counselling compared to 79.4% after individual counselling (p = 0.47). The mean knowledge score was 8.8 for the women who attended group counselling; women who were individually counselled had a mean score of 7.4 (p counselling was 7.0 for group counselling and 6.2 for individual counselling (p group counselling was associated with higher post-counselling knowledge and satisfaction scores. Group counselling should therefore be considered as an alternative counselling method.

  6. HIV sexual risk behavior among black men who meet other men on the internet for sex.

    Science.gov (United States)

    White, Jaclyn M; Mimiaga, Matthew J; Reisner, Sari L; Mayer, Kenneth H

    2013-06-01

    Using the Internet to meet sexual partners is associated with increased HIV risk behavior, including substance use, sex with multiple or anonymous partners, and unprotected anal sex (UAS), among diverse samples of MSM, yet little is known about Internet use and HIV risk among Black MSM specifically. In 2008, a sample of 197 Black MSM completed an interviewer-administered assessment and voluntary HIV counseling and testing. One fifth of the sample (20 %) reported meeting a sexual partner via the Internet in the past 12 months. Men who met sexual partners over the Internet had significantly more male sex partners (M = 13.44, SD = 20.01) than men who did not meet partners in this manner (M = 4.11, SD = 4.14, p Internet, identifying as gay, and lower knowledge about HIV transmission. These findings highlight the unique HIV risk behaviors among Black MSM meeting sexual partners via the Internet and warrant tailoring of prevention activities to address the specific behaviors and social influences that may contribute to increased HIV spread among this population.

  7. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  8. 38 CFR 21.3100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.3100.... Chapter 35 Counseling § 21.3100 Counseling. (a) Purpose of counseling. The purpose of counseling is to...)) (b) Availability of counseling. Counseling assistance is available for— (1) Identifying and removing...

  9. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    Science.gov (United States)

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  10. A cross-sectional survey of attitudes to HIV risk and rapid HIV testing among clients of sex workers in Switzerland.

    Science.gov (United States)

    Darling, Katharine E A; Diserens, Esther-Amélie; N'garambe, Chantal; Ansermet-Pagot, Anne; Masserey, Eric; Cavassini, Matthias; Bodenmann, Patrick

    2012-10-01

    To assess attitudes to HIV risk and acceptability of rapid HIV testing among clients of street-based female sex workers (FSW) in Lausanne, Switzerland, where HIV prevalence in the general population is 0.4%. The authors conducted a cross-sectional study in the red light district of Lausanne for five nights in September of 2008, 2009 and 2010. Clients of FSW were invited to complete a questionnaire in the street assessing demographic characteristics, attitudes to HIV risk and HIV testing history. All clients interviewed were then offered anonymous finger stick rapid HIV testing in a van parked on-site. The authors interviewed 112, 127 and 79 clients in 2008, 2009 and 2010, respectively. All were men, average age 32-37 years old; 40-60% were in a stable relationship. History of unprotected sex was higher with non-commercial partners (33-50%) than with FSW (6-11%); 29-46% of clients had never undergone an HIV test. Anonymous rapid HIV testing was accepted by 45-50% of clients. Out of 109 HIV tests conducted during the three study periods, none was reactive. On-site HIV counselling and testing is acceptable among clients of FSW in this urban setting. These individuals represent an unquantified population, a proportion of which has an incomplete understanding of HIV risk in the face of high-risk behaviour, with implications for potential onward transmission to non-commercial sexual partners.

  11. International exchange training in genetic counseling: an exploration of the value in exchange experiences.

    Science.gov (United States)

    Alexander, Chelsea K A; Veach, Patricia McCarthy; Lian, Fengqin; LeRoy, Bonnie S

    2013-12-01

    International exchange training in genetic counseling is increasing, but research examining these experiences is lacking. In this study 309 genetic counseling students and genetic counselors completed an anonymous survey investigating six major research questions: (1) How prevalent are international genetic counseling experiences? (2) What types are pursued and why? (3) What supports and barriers exist? 3) What are the demographic characteristics of individuals accruing international experience? (5) Does international experience promote professional development? and (6) Do genetic counseling students and professionals perceive international experiences as beneficial? Most respondents were Caucasian females born in one of 25 countries. The most prevalent experiences involved either clinical observation or clinical training. Common motivations for pursuing international experience were personal growth, exposure to a different healthcare system, and travel opportunities. Outcomes included professionally-relevant experience and personal growth. Barriers included finances, limited availability of opportunities, and for those without international experience, family responsibilities. Additional findings, practice and training implications, and research recommendations are provided.

  12. Clients' Willingness to Incorporate Religion or Spirituality in Counseling: A Brief Report

    Science.gov (United States)

    Diallo, Abdoulaye

    2013-01-01

    A total of 84 individuals with addiction issues (e.g., drugs, sex, weight, food, and codependency) were asked about their willingness to incorporate religion or spirituality in their counseling. These respondents expressed willingness to deal with religion or spirituality in counseling if the counselor was knowledgeable about their religion or…

  13. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  14. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  15. Anonymous voting for multi-dimensional CV quantum system

    International Nuclear Information System (INIS)

    Shi Rong-Hua; Xiao Yi; Shi Jin-Jing; Guo Ying; Lee, Moon-Ho

    2016-01-01

    We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes. (paper)

  16. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  17. An Anonymous Surveying Protocol via Greenberger-Horne-Zeilinger States

    Science.gov (United States)

    Naseri, Mosayeb; Gong, Li-Hua; Houshmand, Monireh; Matin, Laleh Farhang

    2016-10-01

    A new experimentally feasible anonymous survey protocol with authentication using Greenberger-Horne-Zeilinger (GHZ) entangled states is proposed. In this protocol, a chief executive officer (CEO) of a firm or company is trying to find out the effect of a possible action. In order to prepare a fair voting, the CEO would like to make an anonymous survey and is also interested in the total action for the whole company and he doesn't want to have a partial estimate for each department. In our proposal, there are two voters, Alice and Bob, voting on a question with a response of either "yes" or "no" and a tallyman, whose responsibility is to determine whether they have cast the same vote or not. In the proposed protocol the total response of the voters is calculated without revealing the actual votes of the voters.

  18. Gamblers Anonymous as a Recovery Pathway: A Scoping Review

    OpenAIRE

    Schuler, Andr?e; Ferentzy, Peter; Turner, Nigel E.; Skinner, Wayne; McIsaac, Kathryn E.; Ziegler, Carolyn P.; Matheson, Flora I.

    2016-01-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligi...

  19. Taxonomy for and Analysis of Anonymous Communications Networks

    Science.gov (United States)

    2009-03-01

    degradation, preservation and elimination in cyberspace to enhance the security of information assets. This includes discovery/obfuscation of...a means of communication and information dissemination, concerns about Internet privacy and security are escalating. In 1980’s, Chaum began work...variety of different systems including the T9000 Transputer AFIT/DCS/ENG/09-08 - 123 - [Bar95] and a secure ecommerce system [HaC02]. Anonymity

  20. Can anonymous posters on medical forums be reidentified?

    Science.gov (United States)

    Bobicev, Victoria; Sokolova, Marina; El Emam, Khaled; Jafer, Yasser; Dewar, Brian; Jonker, Elizabeth; Matwin, Stan

    2013-10-03

    Participants in medical forums often reveal personal health information about themselves in their online postings. To feel comfortable revealing sensitive personal health information, some participants may hide their identity by posting anonymously. They can do this by using fake identities, nicknames, or pseudonyms that cannot readily be traced back to them. However, individual writing styles have unique features and it may be possible to determine the true identity of an anonymous user through author attribution analysis. Although there has been previous work on the authorship attribution problem, there has been a dearth of research on automated authorship attribution on medical forums. The focus of the paper is to demonstrate that character-based author attribution works better than word-based methods in medical forums. The goal was to build a system that accurately attributes authorship of messages posted on medical forums. The Authorship Attributor system uses text analysis techniques to crawl medical forums and automatically correlate messages written by the same authors. Authorship Attributor processes unstructured texts regardless of the document type, context, and content. The messages were labeled by nicknames of the forum participants. We evaluated the system's performance through its accuracy on 6000 messages gathered from 2 medical forums on an in vitro fertilization (IVF) support website. Given 2 lists of candidate authors (30 and 50 candidates, respectively), we obtained an F score accuracy in detecting authors of 75% to 80% on messages containing 100 to 150 words on average, and 97.9% on longer messages containing at least 300 words. Authorship can be successfully detected in short free-form messages posted on medical forums. This raises a concern about the meaningfulness of anonymous posting on such medical forums. Authorship attribution tools can be used to warn consumers wishing to post anonymously about the likelihood of their identity being

  1. Anonymity communication VPN and Tor: a comparative study

    Science.gov (United States)

    Ramadhani, E.

    2018-03-01

    VPN and Tor is a technology based on anonymity communication. These two technologies have their advantage and disadvantage. The objective of this paper is to find the difference between VPN and Tor technologies by comparing their security of communication on the public network based on the CIA triad concept. The comparative study in this paper is based on the survey method. At last, the result of this paper is a recommendation on when to use a VPN and Tor to secure communication

  2. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  3. Informed Traders as Liquidity Providers: Anonymity, Liquidity and Price Formation

    OpenAIRE

    Barbara Rindi

    2008-01-01

    The tendency to introduce anonymity into financial markets apparently runs counter to the theory supporting transparency. This paper studies the impact of pre-trade transparency on liquidity in a market where risk-averse traders accommodate the liquidity demand of noise traders. When some risk-averse investors become informed, an adverse selection problem ensues for the others, making them reluctant to supply liquidity. Hence the disclosure of traders' identities improves liquidity by mitigat...

  4. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    Science.gov (United States)

    2014-02-01

    attack is also similar to those that rely on misbehaving receivers and optimistic ACKs to bypass flow control protocol mechanisms [40]–[42]. In particular...thank the anonymous reviewers for their feedback and suggestions, Damon McCoy for discussions about misbehaving receivers and authenticated signals...ping-o-death. html. [40] S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Con- gestion Control with a Misbehaving Receiver,” ACM SIGCOMM CCR

  5. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  6. All or Nothing: The False Promise of Anonymity

    Directory of Open Access Journals (Sweden)

    Neil Walker

    2017-05-01

    Full Text Available In early 2016, the International Committee of Medical Journal Editors (ICMJE proposed that responsible sharing of de-identified individual-level data be required for clinical trials published in their affiliated journals. There would be a delay in implementing this policy to allow for the necessary informed consents to work their way through ethical review. Meanwhile, some researchers and policy makers have conflated the notions of de-identification and anonymity. The former is a process that seeks to mitigate disclosure risk though careful application of rules and statistical analysis, while the latter is an absolute state. The consequence of confusing the process and the state is profound. Extensions to the ICMJE proposal based on the presumed anonymity of data include: sharing unconsented data; sharing data without managing access, as Open Data; and proposals to sell data. This essay aims to show that anonymity (the state cannot be guaranteed by de-identification (the process, and so these extensions to the ICMJE proposal should be rejected on governance grounds, if no other. This is not as negative a position as it might seem, as other disciplines have been aware of these limitations and concomitant responsibilities for many years. The essay concludes with an example from social science of managed access strategies that could be adopted by the medical field.

  7. Enhancing physicians' use of Alcoholics Anonymous: Internet-based training.

    Science.gov (United States)

    Sellers, Brealyn; Galanter, Marc; Dermatis, Helen; Nachbar, Martin

    2005-01-01

    Alcoholics Anonymous is not yet fully employed by the medical community as a means to enhance patient outcome. The purpose of this study was to evaluate visitors' use of an Internet course on Alcoholics Anonymous, and to compare how various disciplines learned about, gained access to and participated in the course. Demographic information was collected from 414 visitors to the course. 64% of the 414 respondents received their last educational degree within the last 10 years, and had an interest in the topic of addiction prior to their accessing the site. 294 (71%) of those who accessed the course completed it, and those who accessed it learned about it from various sources other than print advertisement in professional journals. Within the 230 physician respondents, 143 (62%) were psychiatrists, 82 (78%) of whom learned about the Internet course via professional journal. Given the need for further training among physicians in the use of Alcoholics Anonymous, the Internet can be utilized to make information available to a large number of people. Because it allows the user to access information outside the traditional means, the barriers to its use are minimal, and it has the potential to effectively convey useful clinical information.

  8. The influence of anonymous peers on prosocial behavior.

    Directory of Open Access Journals (Sweden)

    Soowon Park

    Full Text Available Peer influence on students' maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged.The purpose of this study was to examine anonymous peer influence on college students' prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns via an experimental approach. The effects of indirect peer influence (IP and direct peer influence (DP on college students' prosocial behavior were examined.A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP and confederates' prosocial behavior (DP were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior.Prosocial behavior of anonymous peers (confederates exerts a profound influence on college students' participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior.This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations.

  9. Utility-preserving transaction data anonymization with low information loss.

    Science.gov (United States)

    Loukides, Grigorios; Gkoulalas-Divanis, Aris

    2012-08-01

    Transaction data record various information about individuals, including their purchases and diagnoses, and are increasingly published to support large-scale and low-cost studies in domains such as marketing and medicine. However, the dissemination of transaction data may lead to privacy breaches, as it allows an attacker to link an individual's record to their identity. Approaches that anonymize data by eliminating certain values in an individual's record or by replacing them with more general values have been proposed recently, but they often produce data of limited usefulness. This is because these approaches adopt value transformation strategies that do not guarantee data utility in intended applications and objective measures that may lead to excessive data distortion. In this paper, we propose a novel approach for anonymizing data in a way that satisfies data publishers' utility requirements and incurs low information loss. To achieve this, we introduce an accurate information loss measure and an effective anonymization algorithm that explores a large part of the problem space. An extensive experimental study, using click-stream and medical data, demonstrates that our approach permits many times more accurate query answering than the state-of-the-art methods, while it is comparable to them in terms of efficiency.

  10. k-Degree Anonymity Model for Social Network Data Publishing

    Directory of Open Access Journals (Sweden)

    MACWAN, K. R.

    2017-11-01

    Full Text Available Publicly accessible platform for social networking has gained special attraction because of its easy data sharing. Data generated on such social network is analyzed for various activities like marketing, social psychology, etc. This requires preservation of sensitive attributes before it becomes easily accessible. Simply removing the personal identities of the users before publishing data is not enough to maintain the privacy of the individuals. The structure of the social network data itself reveals much information regarding its users and their connections. To resolve this problem, k-degree anonymous method is adopted. It emphasizes on the modification of the graph to provide at least k number of nodes that contain the same degree. However, this approach is not efficient on a huge amount of social data and the modification of the original data fails to maintain data usefulness. In addition to this, the current anonymization approaches focus on a degree sequence-based graph model which leads to major modification of the graph topological properties. In this paper, we have proposed an improved k-degree anonymity model that retain the social network structural properties and also to provide privacy to the individuals. Utility measurement approach for community based graph model is used to verify the performance of the proposed technique.

  11. The influence of anonymous peers on prosocial behavior

    Science.gov (United States)

    Shin, Jongho

    2017-01-01

    Background Peer influence on students’ maladaptive behaviors has been well documented; however, the influence on positive development is less acknowledged. Purpose The purpose of this study was to examine anonymous peer influence on college students’ prosocial behavior, specifically behavior for the improvement of society (i.e., donating money or participating in social campaigns) via an experimental approach. The effects of indirect peer influence (IP) and direct peer influence (DP) on college students’ prosocial behavior were examined. Methods A total of 125 college students participated in an online survey and laboratory experiment. Self-reported helping behavior, social concern goals, and empathy were measured by the online survey. In the laboratory experiments, reading of a prosocial paragraph (IP) and confederates’ prosocial behavior (DP) were manipulated. Participation in a signature campaign and money donation for illness were observed. Furthermore, 19 participants among those who donated were asked about their reasons for participating in such prosocial behavior. Results Prosocial behavior of anonymous peers (confederates) exerts a profound influence on college students’ participation in a signature campaign and money donation, whereas the reading of a prosocial paragraph has no effect. Furthermore, no participants reported peer influence as a reason for engaging in prosocial behavior. Conclusion This finding supports and extends recent research examining the positive impacts of anonymous peers on prosocial behavior. Prosocial behavior is not only a foundational and consistent aspect of personality, as previous studies report, but is also highly malleable and unstable in response to immediate situations. PMID:29016612

  12. Anonymity and Electronics: Adapting Preparation for Radiology Resident Examination.

    Science.gov (United States)

    Chapman, Teresa; Reid, Janet R; O'Conner, Erin E

    2017-06-01

    Diagnostic radiology resident assessment has evolved from a traditional oral examination to computerized testing. Teaching faculty struggle to reconcile the differences between traditional teaching methods and residents' new preferences for computerized testing models generated by new examination styles. We aim to summarize the collective experiences of senior residents at three different teaching hospitals who participated in case review sessions using a computer-based, interactive, anonymous teaching tool, rather than the Socratic method. Feedback was collected from radiology residents following participation in a senior resident case review session using Nearpod, which allows residents to anonymously respond to the teaching material. Subjective resident feedback was uniformly enthusiastic. Ninety percent of residents favor a case-based board review incorporating multiple-choice questions, and 94% favor an anonymous response system. Nearpod allows for inclusion of multiple-choice questions while also providing direct feedback to the teaching faculty, helping to direct the instruction and clarify residents' gaps in knowledge before the Core Examination. Copyright © 2017 The Association of University Radiologists. Published by Elsevier Inc. All rights reserved.

  13. Online Counseling: Reviewing the Literature from a Counseling Psychology Framework

    Science.gov (United States)

    Mallen, Michael J.; Vogel, David L.; Rochlen, Aaron B.; Day, Susan X.

    2005-01-01

    This article reviews the online-counseling literature with an emphasis on current applications and considerations for future research. It focuses on primary themes of counseling psychology including the history of process-outcome research and multiculturalism. It explores current gaps in the literature from a counseling psychology framework,…

  14. Introduction to the Major Contribution: Counseling Psychology and Online Counseling

    Science.gov (United States)

    Mallen, Michael J.; Vogel, David L.

    2005-01-01

    This article introduces the Major Contribution, which focuses on online counseling. Several acronyms and terms are presented to familiarize the reader with distance-communication technology, including a definition of online counseling. The authors show how counseling psychology provides a framework for specific questions related to the theory,…

  15. The Ghosts of Counseling Psychology: Is Counseling Research Really Dead?

    Science.gov (United States)

    Murdock, Nancy L.

    2011-01-01

    Scheel et al. offer an interesting analysis on the publication rate of counseling-related research articles in counseling psychology's two major journals. In this reaction to their work, the author considers various aspects of their results and contemplates possible explanations for the decline of counseling-related publications. The author…

  16. Effectiveness of narcotics anonymous training programs in personality characters in substance abuse patients

    Directory of Open Access Journals (Sweden)

    Namat Sotodeh Asl

    2013-03-01

    Full Text Available Introduction: Substance abuse is one of the most common disorders that exert a high impact on the life of patients and their families. There are many treatment methods for Addiction. The purpose of the present study was to determine the effects of narcotics anonymous (NA program on personality characters in substance abuse patients.Materials and Methods: This quasi experimental design was performed on 100 patients with substance abuse disorders that they had been randomly selected from those patients who were referred to psychiatric clinics and counseling centers in Esfehan in 2008. Then, the subjects were equally divided into two groups; experimental and control. All the patients carried out Eysenk test prior to any intervention and also a demographic questionnaire were filled out by all the subjects. Then, Eysenk test was performed on all the patients following the intervention. Changing in personality character in the experimental group (before and after the intervention was compared with those of the control group. Results: The findings showed that narcotic program has significant effects on personality characters of experimental group to substance abuse in post test, but these effects are not significant in control group.Conclusion: According to the findings of this work, we suggest the effectiveness of NA program in changing personality characters of the patients with substance abuse

  17. Evaluation of a nurse-led haemophilia counselling service.

    LENUS (Irish Health Repository)

    O'Shea, Eadaoln

    2012-01-01

    Genetic counselling and testing for females with a family history of haemophilia has long been advocated. However, there is little research in regard to clients\\' satisfaction with the existing counselling models in haemophilia, and in particular with nurse-led clinics. The purpose of this study was to evaluate whether clients were satisfied with a nurse-led carrier testing clinic and counselling service. A retrospective quantitative study of clients\\' satisfaction and perceived knowledge was undertaken using an anonymous questionnaire. A sample of 42 women who had attended the clinic in the last 12 months was identified. The response rate for the study was 71% (n = 30).Two thirds of the respondents were 35 years of age or younger, 93% had a family history of haemophilia and 56% were diagnosed as carriers. Perceived understanding and knowledge increased significantly between the first and second appointments (p < 0.001). Overall, the study identified a high level of client satisfaction with the nurse-led carrier testing clinic and counselling service.

  18. Kierkegaard's Philosophy: Implications for Counseling.

    Science.gov (United States)

    Dopson, Lorraine; Gade, Eldon

    1981-01-01

    Discusses how the philosophy of Soren Kierkegaard can provide useful guidelines for the study of the counseling process. Compares Kierkegaard's philosophy with selected contributions of Freud, Skinner, Rogers, and May and with four common themes of counseling and psychotherapy. (Author)

  19. Voluntary counseling and testing for HIV among high school

    African Journals Online (AJOL)

    abp

    2012-09-24

    Sep 24, 2012 ... Page number not for citation purposes. 1. Voluntary .... cigarettes, alcohol or going to night clubs before their majority and these activities are associated with sexual activity. ... Ngwakongnwi E, Quan H. Sex differentials in the use of centres for voluntary counseling and testing for HIV in Cameroon. Afr J AIDS ...

  20. Effects Of Sexuality Counselling Education On Attitudes Of Ss1 ...

    African Journals Online (AJOL)

    This study was motivated by the increasing incidence of sexual misbehaviour among adolescents in secondary schools. It was therefore designed to examine the effects of sexuality counselling education on adolescents' attitude to sex and sexual behavivour using the pre-post test experimental design. The study examined ...

  1. Family Counseling Psychology.

    Science.gov (United States)

    Levant, Ronald F., ed.

    1983-01-01

    Describes programs for family counseling which use psychological-educational and skills training methods to remediate individual and family problems or enhance family life. The six articles discuss client-centered skills training, behavioral approaches, cognitive behavioral marital therapy, Adlerian parent education, and couple communication. (JAC)

  2. First Cycle Counselling.

    Science.gov (United States)

    Darska, Anna

    1981-01-01

    Investigations are described that were carried out by the Centre d'Information de Documentation et d'Orientation of the Rene Descartes University to find an answer to the counseling problems arising from student admission, through coursework, and upon leaving the university to start a career. (Author/MLW)

  3. Counseling and Transcendental Philosophy

    Science.gov (United States)

    Donceel, Joseph

    1971-01-01

    An acquaintance with the different philosophies of human nature is an invaluable asset for counseling. The author presents a modern Christian concept of man with emphasis on contributions of Aristotle and St. Thomas Aquinas and elements from modern philosophy. Its two main concerns are man's spirit and man's knowledge and will. (Author/CG)

  4. A Maslovian Counseling Method.

    Science.gov (United States)

    Kirkpatrick, J. Stephen

    1979-01-01

    With Maslow's hierarchy as a basis, the model provides structure for setting goals in counseling cases and overall programs. Different kinds of client concerns are identified, and suggestions are made for using these 14 categories. The article includes specific suggestions for using the model in diagnosis, evaluation, counselor education, and…

  5. Counseling Third Culture Kids.

    Science.gov (United States)

    Barringer, Carolyn Fox

    Third Culture Kids (TCKs) represent a group of youth who have lived overseas with their families for business, service, or missionary work. The implications of living in multiple cultures, especially during the developmental and formative years of youth, warrant investigation. This study informs the US counseling community about the…

  6. Do Counseling and Marketing Mix?

    Science.gov (United States)

    Fong-Beyette, Margaret L.

    1988-01-01

    Responds to Wittman's previous article on counseling and marketing by discussing concerns about two of Wittman's purposes for use of marketing: improved services in consumers and economic survival of counseling profession. Agrees that counseling profession needs to understand basic marketing principles used by business and health care industry;…

  7. Abraham Maslow's Legacy for Counseling.

    Science.gov (United States)

    Hoffman, Edward

    1990-01-01

    Reviews the life of Abraham Maslow, a key founder of the humanistic approach to counseling, and his contributions to the counseling field. Maintains that Maslow's innovative work was often misinterpreted by both his admirers and his critics, yet remains highly relevant to current concerns in counseling. (Author/PVV)

  8. Role Induction in Career Counseling

    Science.gov (United States)

    Fouad, Nadya A.; Kantamneni, Neeta; Chen, Yung-Lung; Novakovic, Alexandra; Guillen, Amy; Priester, Paul E.; Henry, Caroline; Terry, Sarah

    2007-01-01

    Many vocational psychologists advocate addressing career as well as personal concerns in career counseling. However, some clients may have inappropriate expectations toward career counseling and may not be prepared or want to discuss personal issues. This study examined whether perceptions of the career counseling process could be modified with…

  9. Traveling the Silk Road: A Measurement of a Large Anonymous Online Marketplace

    Science.gov (United States)

    2012-11-28

    Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather...analysis of Silk Road, an anonymous, international on- line marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We...anonymity, Silk Road needs to also preserve payment anonymity. To that effect, Silk Road only supports Bitcoin (BTC, [30]) as a trading currency

  10. Knowledge, attitudes and practices of voluntary HIV counselling and testing among rural migrants in central China: a cross-sectional study.

    Science.gov (United States)

    Zhang, Tiejun; Zhang, Jinling; Gao, Meiyang; He, Na; Detels, Roger

    2012-04-01

    To document knowledge, attitudes and practices of voluntary HIV counselling and testing (VCT) among rural migrants in central China. A cross-sectional study with face-to-face anonymous questionnaire interviews was conducted using a structured questionnaire. Among 1280 participants, 87.9% reported having had sexual intercourse during their lifetime, with 69% of singles reporting having had sexual intercourse and 49.1% having had sex in the past month. Only 21% always used condoms, 84.4% knew HIV infection was diagnosed through blood testing, 56.6% had heard of VCT, but only 3.8% perceived their own risk for HIV infection. Only 43 (2.3%) had ever been tested for HIV, and none had ever been tested at a VCT site. About two-thirds (64.5%) would be willing to use VCT services upon awareness of HIV risk. A logistic regression model showed that females, those having little knowledge of HIV/AIDS, those unwilling to work with HIV-infected individuals, never having been tested for HIV and having low awareness regarding HIV risk were less willing to use VCT. The results of this study indicated that much greater efforts are needed to improve HIV/AIDS and VCT knowledge, to promote safer sex and to improve VCT acceptance among rural migrants in central China, particularly those engaging in risky behaviours.

  11. A Comparison of Telephone Genetic Counseling and In-Person Genetic Counseling from the Genetic Counselor's Perspective.

    Science.gov (United States)

    Burgess, Kelly R; Carmany, Erin P; Trepanier, Angela M

    2016-02-01

    Growing demand for and limited geographic access to genetic counseling services is increasing the need for alternative service delivery models (SDM) like telephone genetic counseling (TGC). Little research has been done on genetic counselors' perspectives of the practice of TGC. We created an anonymous online survey to assess whether telephone genetic counselors believed the tasks identified in the ABGC (American Board of Genetic Counseling) Practice Analysis were performed similarly or differently in TGC compared to in person genetic counseling (IPGC). If there were differences noted, we sought to determine the nature of the differences and if additional training might be needed to address them. Eighty eight genetic counselors with experience in TGC completed some or all of the survey. Respondents identified differences in 13 (14.8%) of the 88 tasks studied. The tasks identified as most different in TGC were: "establishing rapport through verbal and nonverbal interactions" (60.2%; 50/83 respondents identified the task as different), "recognizing factors affecting the counseling interaction" (47.8%; 32/67), "assessing client/family emotions, support, etc." (40.1%; 27/66) and "educating clients about basic genetic concepts" (35.6%; 26/73). A slight majority (53.8%; 35/65) felt additional training was needed to communicate information without visual aids and more effectively perform psychosocial assessments. In summary, although a majority of genetic counseling tasks are performed similarly between TGC and IPGC, TGC counselors recognize that specific training in the TGC model may be needed to address the key differences.

  12. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    Science.gov (United States)

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  13. College Students' Experiences with Anonymous Social Media: Implications for Campus Racial Climate

    Science.gov (United States)

    Armstrong, Amanda; Thomas, Jaymi; Smith, Madeline

    2017-01-01

    The purpose of this exploratory case study was to gather undergraduate students' perceptions of anonymous racist messages found on Yik Yak and to better understand the implications of anonymous platforms on campus racial climate. Given the limited research surrounding students' use of anonymous social media platforms, as well as the predominant…

  14. Social Media and Higher Education: The Problem of Anonymous Electronic Threats to the Campus Community

    Science.gov (United States)

    Reynolds, Cristin Lee; Platt, R. Eric; Malone Schaffer, Lenore; Foster, Holly

    2017-01-01

    This case is for use in graduate courses pertaining to student affairs and higher education administration. It presents challenges higher education professionals face concerning anonymous social media, and specifically how threats made through anonymous social media platforms such as Yik Yak affect the entire university community. The anonymity of…

  15. De-anonymizing Genomic Databases Using Phenotypic Traits

    Directory of Open Access Journals (Sweden)

    Humbert Mathias

    2015-06-01

    Full Text Available People increasingly have their genomes sequenced and some of them share their genomic data online. They do so for various purposes, including to find relatives and to help advance genomic research. An individual’s genome carries very sensitive, private information such as its owner’s susceptibility to diseases, which could be used for discrimination. Therefore, genomic databases are often anonymized. However, an individual’s genotype is also linked to visible phenotypic traits, such as eye or hair color, which can be used to re-identify users in anonymized public genomic databases, thus raising severe privacy issues. For instance, an adversary can identify a target’s genome using known her phenotypic traits and subsequently infer her susceptibility to Alzheimer’s disease. In this paper, we quantify, based on various phenotypic traits, the extent of this threat in several scenarios by implementing de-anonymization attacks on a genomic database of OpenSNP users sequenced by 23andMe. Our experimental results show that the proportion of correct matches reaches 23% with a supervised approach in a database of 50 participants. Our approach outperforms the baseline by a factor of four, in terms of the proportion of correct matches, in most scenarios. We also evaluate the adversary’s ability to predict individuals’ predisposition to Alzheimer’s disease, and we observe that the inference error can be halved compared to the baseline. We also analyze the effect of the number of known phenotypic traits on the success rate of the attack. As progress is made in genomic research, especially for genotype-phenotype associations, the threat presented in this paper will become more serious.

  16. 20 Questions of Gamblers Anonymous: A Psychometric Study with Population of Spain.

    Science.gov (United States)

    Ursua, María Prieto; Uribelarrea, Luis Llavona

    1998-01-01

    The authors present a psychometric study of the questionnaire proposed by the Gamblers Anonymous organization for the self-assessment of problem gambling. The study was carried out in Spain with two samples: one of 127 problem gamblers (mean age: 41.67; sex: 78.7% men; mean duration of the problem: 5 years) and the other of 142 social gamblers (mean age: 38.46; sex: 60% men). The questionnaire was self-applied, in the presence of one of the investigators in case any doubts arose. The results indicate that it is a good screening instrument, with high reliability (Cronbach's alpha = 0.94), good covergent validity (the correlation with the SOGS questionnaire is high (r = 0.94; p < 0.001)), good factorial validity (the questionnaire's structure is unidimensional and coherent (just one factor explains more than 50% of the variance)), and its discriminative power is high (diagnostic efficacy = 98.88%). The study offers a comparative analysis of this instrument with other measures of problem gambling, emphasizing its extraordinary performance.

  17. Sexual behaviours of clients of sex workers reported within phone calls at HIV/AIDS/STIs Italian Helpline

    Directory of Open Access Journals (Sweden)

    Ilaria Mulieri

    2013-06-01

    Full Text Available BACKGROUND: Clients of sex workers represent a relevant target for interventions aimed at the prevention of HIV and sexually transmitted infections (STIs. Within prevention strategies, the AIDS and sexually transmitted infections helpline (Telefono Verde AIDS/ IST, TVA-IST of National Institute of Health in Italy has provided, since 1987, specific information and counselling interventions. AIM: The present study reports data on anagraphical characteristics and behaviours of clients of sex workers, anonymously reported at TVA-IST in the period 1987-2010. DISCUSSION: Among 95 149 phone calls (14% of the total considered 99.5% came from males, over 80% aged under 37 years and prevalently from Northern Italy. Among sexual behaviours, unprotected sexual intercourses were reported in the 26% of the calls. Subjects under 27 years reported a higher frequency of unprotected anal intercourse, while they used protection with oral and vaginal intercourses in a greater extent than older ones. Due to differential behaviours within clients of sex workers, specific informative strategies for this targeted population should adequately consider age-related differences.

  18. Business Information Exchange System with Security, Privacy, and Anonymity

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-01-01

    Full Text Available Business Information Exchange is an Internet Secure Portal for secure management, distribution, sharing, and use of business e-mails, documents, and messages. It has three applications supporting three major types of information exchange systems: secure e-mail, secure instant messaging, and secure sharing of business documents. In addition to standard security services for e-mail letters, which are also applied to instant messages and documents, the system provides innovative features of privacy and full anonymity of users and their locations, actions, transactions, and exchanged resources. In this paper we describe design, implementation, and use of the system.

  19. "Un-Googling” publications: The ethics and problems of anonymization

    DEFF Research Database (Denmark)

    Shklovski, Irina; Vertesi, Janet

    2013-01-01

    Digital tools of research dissemination make scholarly publications accessible to the public at large through simple search engines. As a result, the users that we study, interview, and cite may be at risk of exposure to unwelcome types of scrutiny and scholars must grapple with challenges...... to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...

  20. THINKING ABOUT REFERRALS TO ALCOHOLICS ANONYMOUS IN RELATIONAL WAYS

    Directory of Open Access Journals (Sweden)

    Christopher K. Bitten

    2010-02-01

    Full Text Available This article examines Alcoholics Anonymous (AA as a relational therapy, seen through the lens of the relational needs described by Richard Erskine. AA as a resource may be underemployed by therapists who do not realize its potential to heal the relational damage suffered and inflicted by their alcoholic clients. Common misconceptions about AA are addressed, and ways for therapists to facilitate successful referrals of clients to AA are described. The author posits that there is a synergistic benefit in combining integrative psychotherapy with the client’s involvement in AA.

  1. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  2. [Dietary counseling in obesity].

    Science.gov (United States)

    Meyer, Nathalie; Haslebacher, Yvonne; Teuscher-Sick, Patricia; Fischer, Beatrice

    2013-02-01

    Information on weight management and a healthy eating is accessible to anyone. However, recommendations are inconsistent. This often leads to confusion rather than to real changes in eating behavior. The principle of a long-term weight reduction is based on the idea of achieving negative energy balance with a healthy, balanced and slightly hypocaloric diet. The regimen is neither supposed to be rigid nor should it ban any food products or food products. Changes in eating patterns come about step by step and the counseling approach should be based on the patient's habits and capabilities. The basic requirement to successfully treat obese patients is their own motivation Therefore, the timing of launching the therapy needs to be well chosen. Apart from goals directly concerning weight loss, goals related to well-being, general health and exercise should be set and pursued. However, the main focus should be on changes of dietary behavior. Dietary counseling is preferably embedded in a multidisciplinary treatment concept.

  3. Counseling the pregnant adolescent.

    Science.gov (United States)

    Dibiasi, V; Sturgis, S H

    1980-07-01

    Approaches employed in counseling pregnant adolescents at the Crittenton Clinic in Boston are described. Concentrating on concrete issues of management of the pregnancy -- supplying information and exploring the pros and cons of various alternatives are advocated; probing into the psychological and emotional background of the pregnant adolescent is discouraged. Counseling about contraceptives and taking into account each individual situation are considered essential. Case studies are reviewed and figures representing the attitudes and contraceptive use of patients 1 year after abortion are presented. It is considered important to establish a trusting relationship with the adolescent, which will increase the likelihood that she will return for follow-up and additional help if she needs it.

  4. The Effect of Adolescent Sex Offender Abuse History on Counselor Attitudes.

    Science.gov (United States)

    Carone, Stacia S.; LaFleur, N. Kenneth

    2000-01-01

    Examines judgment of counseling students, with history of sexual or physical abuse, about their attitudes towards counseling adolescent sex offenders. Reports sexually abused counselors desired to see physically abused offenders as clients over sexually abused offenders. Presents implications for counseling, including ways in which nonabused…

  5. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  6. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  7. Counseling Services for Women in Marriage Age

    OpenAIRE

    Frischa Meivilona Yendi; Zadrian Ardi; Ifdil Ifdil

    2015-01-01

    Marriage is a bond between the outer and inner man as a husband who has not aged 25 years and women 21 years old wife is not with the purpose of achieving happiness. Marriage and family counseling is a profession that will be developed in Indonesia. Counseling emphasizes on changes contained in the family system. Stages counseling, theory and dynamics as well as the use of counseling skills in marriage and family counseling has similarities with individual counseling and group counseling.

  8. Protecting whistle-blowers: Anonymity on the internet

    International Nuclear Information System (INIS)

    Guinnessy, P.

    1997-01-01

    Even though strict legislation exists in many countries, it appears that the next few years should be a golden opportunity for groups to successfully monitor and publish the activity of the nuclear states, and human right violations through use of the Internet. The reasons for this are: 1. The Internet is becoming widespread even in repressive regimes; 2. Software is available to either hide messages from others or hide the mailers account; 3. Information from sites in other countries can be easily obtained to be read inside repressive regimes from the Internet. In this regard It is suggested the Pugwash or a similar organization should set up either an anonymous account to receive information or maybe use a more heavily protected cyperpunk remailer. Such an ability would hopefully prompt more people to notify treaty violations

  9. Anonymization of Electronic Medical Records to Support Clinical Analysis

    CERN Document Server

    Gkoulalas-Divanis, Aris

    2013-01-01

    Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for su...

  10. dCache, towards Federated Identities & Anonymized Delegation

    Science.gov (United States)

    Ashish, A.; Millar, AP; Mkrtchyan, T.; Fuhrmann, P.; Behrmann, G.; Sahakyan, M.; Adeyemi, O. S.; Starek, J.; Litvintsev, D.; Rossi, A.

    2017-10-01

    For over a decade, dCache has relied on the authentication and authorization infrastructure (AAI) offered by VOMS, Kerberos, Xrootd etc. Although the established infrastructure has worked well and provided sufficient security, the implementation of procedures and the underlying software is often seen as a burden, especially by smaller communities trying to adopt existing HEP software stacks [1]. Moreover, scientists are increasingly dependent on service portals for data access [2]. In this paper, we describe how federated identity management systems can facilitate the transition from traditional AAI infrastructure to novel solutions like OpenID Connect. We investigate the advantages offered by OpenID Connect in regards to ‘delegation of authentication’ and ‘credential delegation for offline access’. Additionally, we demonstrate how macaroons can provide a more fine-granular authorization mechanism that supports anonymized delegation.

  11. Cloud Based Data Protection in Anonymously Controlled SDN

    Directory of Open Access Journals (Sweden)

    Jian Shen

    2018-01-01

    Full Text Available Nowadays, Software Defined Network (SDN develops rapidly for its novel structure which separates the control plane and the data plane of network devices. Many researchers devoted themselves to the study of such a special network. However, some limitations restrict the development of SDN. On the one hand, the single controller in the conventional model bears all threats, and the corruption of it will result in network paralysis. On the other hand, the data will be increasing more in SDN switches in the data plane, while the storage space of these switches is limited. In order to solve the mentioned issues, we propose two corresponding protocols in this paper. Specifically, one is an anonymous protocol in the control plane, and the other is a verifiable outsourcing protocol in the data plane. The evaluation indicates that our protocol is correct, secure, and efficient.

  12. Robust anonymous authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Xie, Qi; Zhang, Jun; Dong, Na

    2013-04-01

    Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.

  13. Selfrando: Securing the Tor Browser against De-anonymization Exploits

    Directory of Open Access Journals (Sweden)

    Conti Mauro

    2016-10-01

    Full Text Available Tor is a well-known anonymous communication system used by millions of users, including journalists and civil rights activists all over the world. The Tor Browser gives non-technical users an easy way to access the Tor Network. However, many government organizations are actively trying to compromise Tor not only in regions with repressive regimes but also in the free world, as the recent FBI incidents clearly demonstrate. Exploiting software vulnerabilities in general, and browser vulnerabilities in particular, constitutes a clear and present threat to the Tor software. The Tor Browser shares a large part of its attack surface with the Firefox browser. Therefore, Firefox vulnerabilities (even patched ones are highly valuable to attackers trying to monitor users of the Tor Browser.

  14. 38 CFR 21.3102 - Required counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Required counseling. 21.... Chapter 35 Counseling § 21.3102 Required counseling. (a) Child. The VA counseling psychologist will provide counseling and assist in preparing the educational plan only if the eligible child or his or her...

  15. 38 CFR 21.7100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.7100... Bill-Active Duty) Counseling § 21.7100 Counseling. A veteran or servicemember may receive counseling from VA before beginning training and during training. (a) Purpose. The purpose of counseling is (1) To...

  16. Anonymity versus privacy: selective information sharing in online cancer communities.

    Science.gov (United States)

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  17. The Pattern of Drug Abuse in Anonymous Adidcts

    Directory of Open Access Journals (Sweden)

    Seyede Maryam Vahdat-Shariat-Panahi

    2010-04-01

    Full Text Available Objective: Having the information about pattern of substance abuse in the community and its epidemiological features is one of the most important protocols for evaluation, follow–up and control of the use of these substances. The aim of this study was to evaluate the patterns of substances abuse among narcotic anonymous (N. A. addicted patients. Materials & Methods: In this descriptive and analytical study, three hundred patients from narcotic abusers anonymous (N. A. association who were referred to a treatment center in Tehran were participated consecutively. The information about demographic characteristics, socioeconomic status, type of drug and the patterns of substance abuse of all cases were collected by researcher made questionnaire. Data were analyzed by Chi–Square test. Results: 80% of the patients were male. Almost 65. 2% of cases aged less than 40 years. More than two–third of cases had free jobs and 21. 2% of them were unemployed. Also, 32% of patients had college degrees. The most common types of abused substance were opium (88%, cigarette (76.7%, and alcohol (63% and 34% of them used substances intravenously. The use of alcohol (P=0.033, cannabis (P<0.001, cocaine (P=0.009 and ecstasy (P<0.001 was more prevalent significantly in the cases less than 40 years old than the elderly. Conclusion: It seems that the trend of substance abuse has been changed to younger population. The pattern of drug abuse in young adults is more toward psychosis drugs such as cocaine and ecstasy.

  18. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    Science.gov (United States)

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  19. Exploration of Support Behavior in Counseling Groups with Counseling Trainees

    Science.gov (United States)

    Harel, Yoni; Shechtman, Zipora; Cutrona, Carolyn

    2012-01-01

    The study explores the types of support expressed in counseling groups attended by trainee counselors. Support is a crucial factor in human life in general, and in groups in particular, yet little is known about the type of support presented in counseling groups. Type of support was categorized by means of the Social Support Behavior Code (SSBC;…

  20. Addiction Counseling Accreditation: CACREP's Role in Solidifying the Counseling Profession

    Science.gov (United States)

    Hagedorn, W. Bryce; Culbreth, Jack R.; Cashwell, Craig S.

    2012-01-01

    In this article, the authors discuss the Council for Accreditation of Counseling and Related Educational Programs' (CACREP) role in furthering the specialty of addiction counseling. After sharing a brief history and the role of counselor certification and licensure, the authors share the process whereby CACREP developed the first set of…

  1. Sex Therapy

    Science.gov (United States)

    Sex therapy Overview Sex therapy is a type of psychotherapy — a general term for treating mental health problems by talking with a mental health professional. Through sex therapy, you can address concerns about sexual function, ...

  2. Achieving sink node anonymity in tactical wireless sensor networks using a reactive routing protocol

    Science.gov (United States)

    2017-06-01

    node anonymity, base station anonymity, Wireless Sensor Networks (WSN), Mobile Ad hoc Network (MANET), Lightweight Ad hoc On-Demand – Next Generation ... Generation (LOADng) reactive-routing protocol to achieve anonymity. This modified protocol prevents an attacker from identifying the sink node without...within the constraints of WSN communication protocols, specifically IEEE 802.15.4. We use and modify the Lightweight Ad hoc On-Demand – Next Generation

  3. Nigerian Journal of Clinical and Counselling Psychology

    African Journals Online (AJOL)

    Nigerian Journal of Clinical and Counselling Psychology. ... paediatric and ethical aspects of the applied field of clinical and counselling psychology. The journal publishes contributions of research, clinical, counselling and theoretical interest.

  4. Counseling in Turkey: An Evolving Field

    Science.gov (United States)

    Stockton, Rex; Guneri, Oya Yerin

    2011-01-01

    This article provides a brief history of counseling and addresses the current issues and future trends of counseling in Turkey. Special emphasis is placed on the factors that impede the development of school counseling as a discipline.

  5. Sociolinguistics and the Counselling Process

    Science.gov (United States)

    Conville, Richard L.; Ivey, Allen E.

    1975-01-01

    Sociolinguistics is the study of language as part of culture and society. Counselling, basically a linguistic-communicative process, has too often failed to consider systematic knowledge from related fields. This article discusses basic concepts of sociolinguistics and considers their relation to the counselling process. (Author)

  6. Exercise as a Counseling Intervention.

    Science.gov (United States)

    Okonski, Verna O.

    2003-01-01

    The focus of wellness counseling is to guide individuals to live a healthy life in which body, mind, and spirit are integrated in order to experience fulfillment and happiness. The purpose of this article is to provide counselors steps to follow when using exercise as a counseling intervention and to provide techniques that will encourage exercise…

  7. Adlerian Counseling for Parent Education.

    Science.gov (United States)

    Piercy, Fred P.

    The helping professions must aid parents in understanding their children and in providing parents with methods to improve family relationships. Adlerian counseling is presented as one potentially useful method of reaching this goal. The basic principles and democratic philosophy of Adlerian counseling are outlined, and emphasis is placed on the…

  8. Physical Attractiveness and Counseling Skills.

    Science.gov (United States)

    Vargas, Alice M.; Borkowski, John G.

    1982-01-01

    Searched for interaction between quality of counseling skills (presence or absence of empathy, genuineness, and positive regard) and physical attractiveness as determinants of counseling effectiveness. Attractiveness influenced perceived effectiveness of counselor's skill. Analyses of expectancy data revealed that only with good skills did…

  9. Oedipal Issues in Counseling Psychology.

    Science.gov (United States)

    Thomas, Kenneth R.

    1991-01-01

    Analyzes current status of counseling psychology from perspective of Freudian, drive-structure theory. Argues that counseling psychology has committed classical response to oedipal conflict in its treatment of counselor education by identifying with aggressor (psychiatry and clinical psychology). Recommends more unified relationship between…

  10. Archives: Edo Journal of Counselling

    African Journals Online (AJOL)

    Items 1 - 6 of 6 ... Archives: Edo Journal of Counselling. Journal Home > Archives: Edo Journal of Counselling. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register · Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives. 1 - 6 of 6 Items. 2011 ...

  11. School Counseling in China Today

    Science.gov (United States)

    Thomason, Timothy C.; Qiong, Xiao

    2008-01-01

    This article provides a brief overview of the development of psychological thinking in China and social influences on the practice of school counseling today. Common problems of students are described, including anxiety due to pressure to perform well on exams, loneliness and social discomfort, and video game addiction. Counseling approaches used…

  12. Group Counseling for Navy Children.

    Science.gov (United States)

    Mitchum, Nancy Taylor

    1991-01-01

    Conducted six-session group counseling program for Navy children (n=22) enrolled in public schools whose fathers were on deployment. Pretest and posttest scores on the Coopersmith Self-Esteem Inventory suggest that participation in the group counseling unit positively affected self-esteem of Navy children whose fathers were on deployment. Found…

  13. "People Are Either Too Fake or Too Real": Opportunities and Challenges in Tie-Based Anonymity

    DEFF Research Database (Denmark)

    Ma, Xiao; Andabili, Nazanin; Barkhuus, Louise

    2017-01-01

    In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these “tie-based” anonymity services may be notably different than other social media services. We use semi-structu...... disclosure needs and social probing. Still, challenges for making such applications successful, for example the prevalence of negativity and bullying, are substantial.......In recent years, several mobile applications allowed individuals to anonymously share information with friends and contacts, without any persistent identity marker. The functions of these “tie-based” anonymity services may be notably different than other social media services. We use semi...

  14. Individualised motivational counselling to enhance adherence to antiretroviral therapy is not superior to didactic counselling in South African patients: findings of the CAPRISA 058 randomised controlled trial.

    Science.gov (United States)

    van Loggerenberg, Francois; Grant, Alison D; Naidoo, Kogieleum; Murrman, Marita; Gengiah, Santhanalakshmi; Gengiah, Tanuja N; Fielding, Katherine; Abdool Karim, Salim S

    2015-01-01

    Concerns that standard didactic adherence counselling may be inadequate to maximise antiretroviral therapy (ART) adherence led us to evaluate more intensive individualised motivational adherence counselling. We randomised 297 HIV-positive ART-naïve patients in Durban, South Africa, to receive either didactic counselling, prior to ART initiation (n = 150), or an intensive motivational adherence intervention after initiating ART (n = 147). Study arms were similar for age (mean 35.8 years), sex (43.1 % male), CD4+ cell count (median 121.5 cells/μl) and viral load (median 119,000 copies/ml). Virologic suppression at 9 months was achieved in 89.8 % of didactic and 87.9 % of motivational counselling participants (risk ratio [RR] 0.98, 95 % confidence interval [CI] 0.90-1.07, p = 0.62). 82.9 % of didactic and 79.5 % of motivational counselling participants achieved >95 % adherence by pill count at 6 months (RR 0.96, 95 % CI 0.85-1.09, p = 0.51). Participants receiving intensive motivational counselling did not achieve higher treatment adherence or virological suppression than those receiving routinely provided didactic adherence counselling. These data are reassuring that less resource intensive didactic counselling was adequate for excellent treatment outcomes in this setting.

  15. Frequency and risk factors for donor reactions in an anonymous blood donor survey.

    Science.gov (United States)

    Goldman, Mindy; Osmond, Lori; Yi, Qi-Long; Cameron-Choi, Keltie; O'Brien, Sheila F

    2013-09-01

    Adverse donor reactions can result in injury and decrease the likelihood of donor return. Reaction reports captured in the blood center's database provide an incomplete picture of reaction rates and risk factors. We performed an anonymous survey, mailed to 40,000 donors in 2008, including questions about symptoms, height, weight, sex, and donation status. Reaction rates were compared to those recorded in our database. Possible risk factors were assessed for various reactions. The response rate was 45.5%. A total of 32% of first-time and 14% of repeat donors reported having any adverse symptom, most frequently bruising (84.9 per 1000 donors) or feeling faint or weak (66.2 per 1000). Faint reactions were two to eight times higher than reported in our database, although direct comparison was difficult. Younger age, female sex, and first-time donation status were risk factors for systemic and arm symptoms. In females, low estimated blood volume (EBV) was a risk factor for systemic symptoms. Only 51% of donors who consulted an outside physician also called Canadian Blood Services. A total of 10% of first-time donors with reactions found adverse effects information inadequate. This study allowed us to collect more information about adverse reactions, including minor symptoms and delayed reactions. Based on our findings of the risk factors and frequency of adverse reactions, we are implementing more stringent EBV criteria for younger donors and providing more detailed information to donors about possible adverse effects and their management. © 2012 American Association of Blood Banks.

  16. Gamblers Anonymous as a Recovery Pathway: A Scoping Review.

    Science.gov (United States)

    Schuler, Andrée; Ferentzy, Peter; Turner, Nigel E; Skinner, Wayne; McIsaac, Kathryn E; Ziegler, Carolyn P; Matheson, Flora I

    2016-12-01

    Given the preponderance of Gamblers Anonymous (GA), there has been relatively little effort to explore the existing evidence base on its effectiveness as a recovery approach for problem gambling. To remedy this gap in the literature we conducted a scoping review of the literature on mutual aid for individuals experiencing problem gambling published between 2002 and 2015. We searched 13 databases and reviewed reference lists and websites of relevant organizations. We reviewed records for eligibility and extracted relevant data from eligible articles. Three reviewers independently assessed the methodological quality of the included studies using the Mixed Methods Appraisal Tool. We identified 17 studies in 25 publications that were eligible for inclusion. Most studies were conducted in the United States, were cross-sectional in design, and involved both male and female adult participants. Results indicate that the evidence for the effectiveness of GA either as a control condition or in conjunction with formal treatment or medication is inconsistent. An emphasis on patience, using the Serenity Prayer as a way to gain acceptance of financial matters and reality, and absolute assertion of identity as a "compulsive gambler" were identified as important aspects of GA's recovery culture. There is a need for large-scale randomized controlled trials to determine GA's effectiveness, as well as research exploring the mechanisms through which GA works, barriers to GA as a recovery approach, and the status of women in the fellowship.

  17. Delineating social network data anonymization via random edge perturbation

    KAUST Repository

    Xue, Mingqiang

    2012-01-01

    Social network data analysis raises concerns about the privacy of related entities or individuals. To address this issue, organizations can publish data after simply replacing the identities of individuals with pseudonyms, leaving the overall structure of the social network unchanged. However, it has been shown that attacks based on structural identification (e.g., a walk-based attack) enable an adversary to re-identify selected individuals in an anonymized network. In this paper we explore the capacity of techniques based on random edge perturbation to thwart such attacks. We theoretically establish that any kind of structural identification attack can effectively be prevented using random edge perturbation and show that, surprisingly, important properties of the whole network, as well as of subgraphs thereof, can be accurately calculated and hence data analysis tasks performed on the perturbed data, given that the legitimate data recipient knows the perturbation probability as well. Yet we also examine ways to enhance the walk-based attack, proposing a variant we call probabilistic attack. Nevertheless, we demonstrate that such probabilistic attacks can also be prevented under sufficient perturbation. Eventually, we conduct a thorough theoretical study of the probability of success of any}structural attack as a function of the perturbation probability. Our analysis provides a powerful tool for delineating the identification risk of perturbed social network data; our extensive experiments with synthetic and real datasets confirm our expectations. © 2012 ACM.

  18. On the Anonymity Risk of Time-Varying User Profiles

    Directory of Open Access Journals (Sweden)

    Silvia Puglisi

    2017-04-01

    Full Text Available Websites and applications use personalisation services to profile their users, collect their patterns and activities and eventually use this data to provide tailored suggestions. User preferences and social interactions are therefore aggregated and analysed. Every time a user publishes a new post or creates a link with another entity, either another user, or some online resource, new information is added to the user profile. Exposing private data does not only reveal information about single users’ preferences, increasing their privacy risk, but can expose more about their network that single actors intended. This mechanism is self-evident in social networks where users receive suggestions based on their friends’ activities. We propose an information-theoretic approach to measure the differential update of the anonymity risk of time-varying user profiles. This expresses how privacy is affected when new content is posted and how much third-party services get to know about the users when a new activity is shared. We use actual Facebook data to show how our model can be applied to a real-world scenario.

  19. RESPECTING THE CONFIDENTIALITY AND ANONYMITY IN QUALITATIVE RESEARCH IN SOCIOLOGY

    Directory of Open Access Journals (Sweden)

    Maria OPREA

    2018-06-01

    Full Text Available Ethics, a philosophical discipline, formulates a set of principles that must be followed, in respect of good and truth, fundamental values of humanity. The world of scientific research, of all kinds, also obeys moral imperatives and principles and is called upon to answer to society not only in relation to the discoveries themselves but, above all, in relation to the possible destructive effects on man or his life environment. The researcher in the sphere of social sciences is more involved in the act of responsibility, the more the topic subject of the study is the individual, the social group, the social environment. He must rigorously follow the principles and requirements of fair, honest, objective studies that do not harm the dignity of the human being. In line with the ethical rigors of scientific research, the article aims to highlight some aspects of respecting the principle of confidentiality and anonymity in qualitative research in the field of sociology, with reference to the study of vulnerable groups in Arad County.

  20. iDASH: integrating data for analysis, anonymization, and sharing

    Science.gov (United States)

    Bafna, Vineet; Boxwala, Aziz A; Chapman, Brian E; Chapman, Wendy W; Chaudhuri, Kamalika; Day, Michele E; Farcas, Claudiu; Heintzman, Nathaniel D; Jiang, Xiaoqian; Kim, Hyeoneui; Kim, Jihoon; Matheny, Michael E; Resnic, Frederic S; Vinterbo, Staal A

    2011-01-01

    iDASH (integrating data for analysis, anonymization, and sharing) is the newest National Center for Biomedical Computing funded by the NIH. It focuses on algorithms and tools for sharing data in a privacy-preserving manner. Foundational privacy technology research performed within iDASH is coupled with innovative engineering for collaborative tool development and data-sharing capabilities in a private Health Insurance Portability and Accountability Act (HIPAA)-certified cloud. Driving Biological Projects, which span different biological levels (from molecules to individuals to populations) and focus on various health conditions, help guide research and development within this Center. Furthermore, training and dissemination efforts connect the Center with its stakeholders and educate data owners and data consumers on how to share and use clinical and biological data. Through these various mechanisms, iDASH implements its goal of providing biomedical and behavioral researchers with access to data, software, and a high-performance computing environment, thus enabling them to generate and test new hypotheses. PMID:22081224

  1. Homophily in an Anonymous Online Community: Sociodemographic Versus Personality Traits.

    Science.gov (United States)

    Kang, Jeong-Han; Chung, Da Young

    2017-06-01

    In what traits do people interact with others who are similar to them in completely anonymous online communication? Can those traits contribute to greater exchange of opinion and information across the sociodemographic boundaries that often limit interaction between social strata? To answer this question concerning online homophily, we combined survey data on 7,287 users (aged 18 and above) of a Korean online dating advice platform with their behavioral data from June 2015 to August 2015 and explored whether advice exchange occurred between users with similar sociodemographic and personality traits. On this platform, two types of interactions occurred as follows: (1) responses to a randomly distributed problem submitted by an advice seeker and (2) the seeker's indication of approval of any of the responses given. The study found that (1) a receiver was more likely to respond to problems submitted by seekers of a comparable age and that (2) seekers were more likely to approve of a response if the seeker and receiver had similar educational backgrounds. By contrast, homophily based on personality traits was not observed even though some personality traits significantly affected the likelihood of both response and approval. Our findings suggest that online communication may breed sociodemographic homophily, whether based on age or education, more than expected or intended while not easily fostering alternative forms of homophily, such as personality homophily, which can potentially cut across borders dividing sociodemographic groups.

  2. Analytic neutrality, anonymity, abstinence, and elective self-disclosure.

    Science.gov (United States)

    Shill, Merton A

    2004-01-01

    Recent contributions to the psychoanalytic literature propose new ways of understanding analytic neutrality, anonymity, abstinence, and self-disclosure. They advocate elective self-disclosure by the analyst as an antidote to the allegedly game-playing quality of transference and resistance analysis. The analytic relationship, they assert, becomes unreal when attempts are made to observe the principles of neutrality and abstinence. Both are seen as ill-conceived because of the irreducible subjectivity and unwarranted authority of the analyst. These relational and interactional views are criticized because (1) they ignore the fact that transference and resistance analysis have from Freud onward been accepted as minimal criteria qualifying a clinical process as psychoanalytic; (2) elective self-disclosure carries metapsychological implications dismissing not only Freud's theory of motivation but motivation as a basic feature of human personality; (3) they do not recognize interpersonal relations as mental events and so do not consider the ego's ability to create intrapsychic representations of object relations; (4) elective self-disclosures within the empathic parameters of the analytic situation are themselves unreal compared to the reality of the patient's experience with other objects. Abstinence and neutrality as ideals facilitate maintenance of an internal holding environment or container for the analyst's countertransference.

  3. Behavior online : Does anonymous computer communication reduce gender inequality?

    NARCIS (Netherlands)

    Postmes, T; Spears, R

    Two studies examined dominance and self-stereotyping in mixed-sex groups who had online discussions. Gender differences in dominance varied as a function of several contextual variables: individuation, the accessibility of gender stereotypes, and the fit between group task and stereotype. Results of

  4. Anonymous Communication Policies for the Internet: Results and Recommendations of the AAAS Conference.

    Science.gov (United States)

    Teich, Al; Frankel, Mark S.; Kling, Rob; Lee, Yaching

    1999-01-01

    Reports the results of a conference on the Internet and anonymous communication organized by the American Association for the Advancement of Science (AAAS). Discusses how anonymous communications can be shaped by the law, education, and public awareness, and highlights the importance of involving all affected interests in policy development.…

  5. Use of WhatsApp in Higher Education: What's Up with Assessing Peers Anonymously?

    Science.gov (United States)

    Güler, Çetin

    2017-01-01

    The aim of this study is to investigate the use of WhatsApp application in anonymous peer assessment in higher education. The mobile phone application WhatsApp was used as both an anonymous and nonanonymous peer assessment tool in a classroom environment. The participants of the study were the students of two classes (sophomores and juniors), half…

  6. The Risk of a Halo Bias as a Reason to Keep Students Anonymous during Grading

    Science.gov (United States)

    Malouff, John M.; Emmerton, Ashley J.; Schutte, Nicola S.

    2013-01-01

    Experts have advocated anonymous grading as a means of eliminating actual or perceived evaluator bias in subjective student assessment. The utility of anonymity in assessment rests on whether information derived from student identity can unduly influence evaluation. The halo effect provides a conceptual background for why a bias might occur. In…

  7. A survey of anonymous peer-to-peer file-sharing

    NARCIS (Netherlands)

    Chothia, T.; Chatzikokolakis, K.; Enokido, T.; Yan, L.; Xiao, B.; Kim, D.; Dai, Y.S.; Yang, L.T.

    2005-01-01

    This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting,

  8. Nondirective counseling interventions with schizophrenics.

    Science.gov (United States)

    Gerwood, J B

    1993-12-01

    Counseling interventions with paranoid schizophrenics can be daunting. While chemical, directive, and behavioral controls often are considered important, nondirective counseling techniques used by the therapeutic staff may help schizophrenic patients explore their thoughts and feelings. Several nondirective concepts pioneered by Carl Rogers are examined. These methods, which represent basic concepts of the person-centered approach, are empathy, unconditional positive regard, and congruence. A brief illustration of an interaction with a patient diagnosed as paranoid schizophrenic is presented to suggest the effectiveness of Rogerian counseling.

  9. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    Directory of Open Access Journals (Sweden)

    Balázs Bodó

    2014-11-01

    Full Text Available This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs. Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of online political activism. Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders. Through the analysis of Wikileaks, the anonymous whistleblowing website, it describes how strong PETs enable the development of hacktivism 2.0, where the source of threat is shifted from outsiders to insiders. Insiders have access to documents with which power can be exposed, and who, by using PETs, can anonymously engage in political action. We also describe the emergence of a third generation of hacktivists who use PETs to disengage and create their own autonomous spaces rather than to engage with power through anonymous whistleblowing.

  10. A hidden service model based on HS-HS anonymous network

    Science.gov (United States)

    Meng, Yitong; Zhao, Xing; Fei, Jinlong; Zhu, Yuefei

    2017-10-01

    The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmission mechanism and link establishment protocol and Hidden Service communication process, in view of the Hidden node number too much, link building Service for too long and too redundant link problem. An improved hidden service model HS-HS is proposed that incorporating multiple transmission link and reuse, and at the same time will be important transit point for reuse protection link anonymity, through the ExperimenTor simulation environment test, verify the improved model of HS-HS can be more effective in guarantee anonymity and security, improve the overall efficiency of data transmission, to meet the needs of today's anonymous service.

  11. Culture or anonymity? Differences in proposer behaviour in Korea and Germany.

    Science.gov (United States)

    Horak, Sven

    2015-10-01

    This study explores the proposer behaviour in an ultimatum game (UG) frame under anonymous and non-anonymous conditions among a Korean and German subject pool (n = 590) in comparison. Whereas the anonymous condition is represented by the standard UG, the non-anonymous condition integrates an aggregate of the Korean cultural context variables university affiliation, regional origin and seniority. The latter, a classic Confucian context variable, is measured by age differentials. The former two are impactful components of so-called Yongo networks, a unique Korean informal institution identical to Chinese Guanxi ties. Yongo networks, yet underrepresented in research, are said to be a central context variable to explain Korean social ties and decision-making behaviour. We observe significant differences between the offer behaviours of Korean and German subjects when exposing selected cultural variables. We argue that the behavioural differences observed are in fact due to culture not anonymity. © 2015 International Union of Psychological Science.

  12. [Counselling customers with psychotropic vs. cardiovascular prescriptions: a survey among Austrian community pharmacists].

    Science.gov (United States)

    Hagmair, Gisela; Amering, Michaela; Kaiser, Gerda; Katschnig, Heinz

    2014-01-01

    Prescriptions for psychotropic drugs in general and their share of all prescriptions have substantially risen over the last decades. Thus, also counselling by pharmacists becomes more important in this area. This study focuses on how community pharmacists see their own role when counselling persons with prescriptions for psychotropic medication and how this differs from counselling persons with other types of prescriptions. Based on the Toronto Community Pharmacists' Questionnaire an online questionnaire was developed with the assistance of the Austrian Pharmacists Association. This instrument elicits pharmacists' attitudes toward and professional interactions with users of psychotropic drugs on the one hand and of cardiovascular medication on the other. After a pilot study the questionnaire - which was to be filled in anonymously - was put on a web portal for six months and Austrian community pharmacists were invited to answer it. 125 pharmacists completed the questionnaire. Overall it was reported, that new customers with psychotropic prescriptions were less often counselled than those with prescriptions for cardiovascular medication. The main reasons for this difference seem to be the lack of privacy in public pharmacies, the fear of stigmatising customers with psychotropic medication and a perceived lack of training concerning the treatment of mental disorders. In addition to improving such training, it was suggested that seminars and workshops for communication skills should be organised. The reduced frequency in counselling new customers with psychotropic medication is related to a lack of privacy in public pharmacies, fear of stigmatising customers and a perceived need for improving the training on the treatment of mental disorders.

  13. Social networks as mediators of the effect of Alcoholics Anonymous.

    Science.gov (United States)

    Kaskutas, Lee Ann; Bond, Jason; Humphreys, Keith

    2002-07-01

    This study tested the hypothesis that the relationship between Alcoholics Anonymous (AA) involvement and reduced substance use is partially explained (or 'mediated') by changes in social networks. This is a naturalistic longitudinal study of the course of alcohol problems. Study sites were the 10 largest public and private alcohol treatment programs in a northern California county. Three hundred and seventy-seven men and 277 women were recruited upon seeking treatment at study sites. At baseline and 1-year follow-up, we assessed alcohol consequences and dependence symptoms, consumption, social support for abstinence, pro-drinking social influences and AA involvement. In the structural equation model, AA involvement was a significant predictor of lower alcohol consumption and fewer related problems. The size of this effect decreased by 36% when network size and support for drinking were included as mediators. In logistic regression models predicting abstinence at follow-up, AA remained highly significant after including social network variables but was again reduced in magnitude. Thirty-day abstinence was predicted by AA involvement (OR=2.9), not having pro-drinking influences in one's network (OR=0.7) and having support for reducing consumption from people met in AA (versus no support; OR=3.4). In contrast, having support from non-AA members was not a significant predictor of abstinence. For alcohol-related outcomes other than abstinence, significant relationships were found for both AA-based and non-AA-based support. The type of social support specifically given by AA members, such as 24-hour availability, role modeling and experientially based advice for staying sober, may help to explain AA's mechanism of action. Results highlight the value of focusing on outcomes reflective of AA's goals (such as abstinence) when studying how AA works.

  14. Anonymity In Survey Courses as Tool for More Diverse Engagement

    Science.gov (United States)

    Samson, P. J.

    2017-12-01

    It is not uncommon that students in introductory survey courses are reluctant to participate in verbal inquiry. In a survey submitted to students of CLIMATE 102, Extreme Weather, over the past four semesters about 45% of male students professed comfort in asking verbal questions in a large lecture hall but less than 25% of females and only 15% of students for whom English is not their first language. Hence, large lecture hall courses may be inadvertently dissuading the inclusion of many of the students we wish to encourage to participate in our discipline. To combat this a system was used in CLIMATE 102 wherein students could pose questions digitally and anonymously. These questions could be seen by all and answered by all. The instructor and/or teaching assistant can also participate and answer or offer corrections to others' answers. The use of this system had three important outcomes: The number of questions posed during class time rose dramatically from previous semesters when only verbal questions were entertained. The number of questions in CLIMATE 102 with this system generally exceeded 500 per semester where the number of students 200. The number of per-capita questions from female students exceeded the male students, thus differences in gender inquiry was eliminated. The number of per-capita questions from students whose first language was not English equaled the native English-speaking students. While it is the goal of higher education to encourage students to participate verbally in class discussions it is important to provide a "safe" environment in the first year(s) as many students are initially uncomfortable participating verbally in class. We hypothesize, but have not researched, that through this process students have the opportunity to see that their questions are as valid as others' in the class and will subsequently gain the confidence to participate verbally.

  15. Review of School Counseling Outcome Research

    Science.gov (United States)

    Whiston, Susan C.; Quinby, Robert F.

    2009-01-01

    This article is somewhat unique in this special issue as it focuses on the effectiveness of an array of school counseling interventions and not solely on individual and group counseling. In summarizing the school counseling outcome literature, the authors found that students who participated in school counseling interventions tended to score on…

  16. 34 CFR 685.304 - Counseling borrowers.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Counseling borrowers. 685.304 Section 685.304 Education... Direct Loan Program Schools § 685.304 Counseling borrowers. (a) Entrance counseling. (1) Except as provided in paragraph (a)(8) of this section, a school must ensure that entrance counseling is conducted...

  17. 38 CFR 21.9580 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.9580...) VOCATIONAL REHABILITATION AND EDUCATION Post-9/11 GI Bill Counseling § 21.9580 Counseling. An individual may receive counseling from VA before beginning training and during training. VA will apply the provisions of...

  18. 38 CFR 21.100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.100... Counseling § 21.100 Counseling. (a) General. A veteran requesting or being furnished assistance under Chapter 31 shall be provided professional counseling services by Vocational Rehabilitation and Employment (VR...

  19. 38 CFR 21.6100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.6100... Recipients Counseling § 21.6100 Counseling. General. A veteran requesting or being furnished assistance under this temporary program shall be provided professional counseling services by the Vocational...

  20. 38 CFR 21.7600 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.7600...) VOCATIONAL REHABILITATION AND EDUCATION Educational Assistance for Members of the Selected Reserve Counseling § 21.7600 Counseling. A reservist may receive counseling from VA before beginning training and during...

  1. 28 CFR 550.43 - Drug counseling.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Drug counseling. 550.43 Section 550.43... Drug Services (Urine Surveillance and Counseling for Sentenced Inmates in Contract CTCs) § 550.43 Drug counseling. (a) Drug counseling shall be provided to sentenced inmates in contract community treatment...

  2. 38 CFR 21.8100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.8100... Vietnam Veterans-Spina Bifida and Covered Birth Defects Counseling § 21.8100 Counseling. An eligible child requesting or receiving services and assistance under this subpart will receive professional counseling by VR...

  3. Online Counseling: New Entity, New Challenges

    Science.gov (United States)

    Barnett, Jeffrey E.

    2005-01-01

    Mallen, Vogel, and colleagues explore the developing field of online counseling from the unique perspective of counseling psychology. They examine the body of available research and relevant clinical, ethical, legal, and practical issues and make recommendations for counseling psychologists who desire to participate in online counseling. This…

  4. Marriage Counselling in Australia: An Evaluation.

    Science.gov (United States)

    Wolcott, Ilene; Glezer, Helen

    A study was conducted of the effectiveness of marriage counseling with respect to marital status and the long-term stability of relationships. Data were gathered from clients of approved Australian marriage counseling agencies (n=540) who took a pre-counseling survey during a 4-week period in October-November 1987 and a post-counseling survey 8…

  5. Courtland Lee: A Global Advocate for Counseling

    Science.gov (United States)

    Gladding, Samuel T.

    2011-01-01

    Courtland Lee is exemplary in his accomplishments nationally and internationally. His academic achievements are notable in multicultural counseling and social justice. His leadership in counseling has been outstanding with his having served as president of the American Counseling Association, the Association for Multicultural Counseling and…

  6. Between coaching and social counselling

    Directory of Open Access Journals (Sweden)

    Toni Vrana

    2012-03-01

    The basic difference between coaching and social counselling lies in a different interpretation of the client' starting situation. Social counselling understands the client' starting situation as problematic and attempts to normalize it, while coaching understands it as normal and attempts to develop it. The key similarity of the two approaches is encour- agement of the clients' own initiative. Coaching needs to be investigated within the field of developmental conceptions, since its focus on results supports, unintentionally, the dominant developmental paradigm. Focusing on solutions in coaching is questionable also within an organization, where its interests may channel the course of clients' search for their own solutions. The counselling doctrine of coaching can gain valuable insights by a reassessment of the concepts of development and normality, a domain in which it is likely to encounter social counselling.

  7. Counselling Psychology in South Africa

    Science.gov (United States)

    Bantjes, Jason; Kagee, Ashraf; Young, Charles

    2016-01-01

    The origin and development of counselling psychology in South Africa has been profoundly influenced by the country’s socio-political history and the impact of apartheid. As a result of this, counselling psychologists in the country face a number of challenges and opportunities for the future. In this paper we provide a portrait of counselling psychology in South Africa by describing the current character of the specialty and the context in which South African psychologists work. We critically discuss the challenges that the specialty faces to meet the country’s mental health care needs, contest the current Scope of Practice; affirm multiculturalism without essentializing or reifying race and ethnicity, and build an evidence base for community interventions in the country. We also consider how, in the future, counselling psychologists in South Africa may make a more meaningful contribution within public health and the country’s health care and education systems. PMID:27867261

  8. HUD Approved Housing Counseling Agencies

    Data.gov (United States)

    Department of Housing and Urban Development — HUD sponsors housing counseling agencies throughout the country that can provide advice on buying a home, renting, defaults, foreclosures, and credit issues. This...

  9. VOCATIONAL INTEREST, COUNSELLING, SOCIO- ECONOMIC ...

    African Journals Online (AJOL)

    Elizabeth

    The aim of the study was to investigate the relationship between vocational ... Modified Bakare Vocational interest inventory, the instrument on counselling, .... family influences the vocational preference of youths. .... Theories of Personality.

  10. FEATURES OF STUDENT PSYCHOLOGICAL COUNSELLING

    Directory of Open Access Journals (Sweden)

    Maria Dorina PASCA

    2013-10-01

    Full Text Available Student psychological counseling is one of the means to acknowledge student identity by employing counseling tools that allow the psychologist to make use of a set of skills essential in achieving envisaged outcomes. To act as counseling psychologist for students is to guide actions by the five wh- questions: who (the client is, why (the counselor is approached, who (the counselor talks to, what (problem the student has to tackle, how (the problem can be solved. Some of the most important features that contribute to solving student problems are the counselor’s deontology, trustworthiness and attitude that are to be relied on without impeding the client’s personality traits. Thus, developing awareness of the features underlying student psychological counseling and acting accordingly is the real test for any professional in the field. Therefore, the real challenge is not being in the lion’s den, but living with it.

  11. Counselling Psychology in South Africa.

    Science.gov (United States)

    Bantjes, Jason; Kagee, Ashraf; Young, Charles

    The origin and development of counselling psychology in South Africa has been profoundly influenced by the country's socio-political history and the impact of apartheid. As a result of this, counselling psychologists in the country face a number of challenges and opportunities for the future. In this paper we provide a portrait of counselling psychology in South Africa by describing the current character of the specialty and the context in which South African psychologists work. We critically discuss the challenges that the specialty faces to meet the country's mental health care needs, contest the current Scope of Practice; affirm multiculturalism without essentializing or reifying race and ethnicity, and build an evidence base for community interventions in the country. We also consider how, in the future, counselling psychologists in South Africa may make a more meaningful contribution within public health and the country's health care and education systems.

  12. The importance of legal counsel

    Directory of Open Access Journals (Sweden)

    Betsy Fisher

    2017-02-01

    Full Text Available At each stage of the resettlement process, the presence of counsel – legal advocates – can help refugees to present their complete cases efficiently and avoid unnecessary rejections. This provides benefits to decision makers as well.

  13. Counseling Services for Women in Marriage Age

    Directory of Open Access Journals (Sweden)

    Frischa Meivilona Yendi

    2015-11-01

    Full Text Available Marriage is a bond between the outer and inner man as a husband who has not aged 25 years and women 21 years old wife is not with the purpose of achieving happiness. Marriage and family counseling is a profession that will be developed in Indonesia. Counseling emphasizes on changes contained in the family system. Stages counseling, theory and dynamics as well as the use of counseling skills in marriage and family counseling has similarities with individual counseling and group counseling.

  14. Between coaching and social counselling

    OpenAIRE

    Toni Vrana

    2012-01-01

    Coaching appears to be another modern counselling approach, practiced initially in the business world. It can to be analyzed through a comparison with social counselling. The roots of coaching go back to Ancient Greece.. Plato used to propagate the art of aksing questions by recording the Socratic dialogue. Today coaching is in substance related to mentoring, tutoring and coaching in sport. The core of the activity - according to different coaching definitions - is discovering the hidden pote...

  15. 24 CFR 3.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling materials. 3.425 Section 3.425 Housing and Urban Development Office of the Secretary, Department... Activities Prohibited § 3.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A...

  16. 29 CFR 36.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Counseling and use of appraisal and counseling materials. 36... in Education Programs or Activities Prohibited § 36.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of...

  17. 31 CFR 28.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 28.425 Section 28.425 Money and Finance: Treasury Office of the Secretary of the....425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not...

  18. 14 CFR 1253.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials. 1253.425 Section 1253.425 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE... § 1253.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall...

  19. 38 CFR 23.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 23.425 Section 23.425 Pensions, Bonuses, and Veterans' Relief DEPARTMENT... Activities Prohibited § 23.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A...

  20. 13 CFR 113.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials. 113.425 Section 113.425 Business Credit and Assistance SMALL BUSINESS... Activities Prohibited § 113.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A...

  1. 18 CFR 1317.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling materials. 1317.425 Section 1317.425 Conservation of Power and Water Resources... Activities Prohibited § 1317.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A...

  2. Characteristics of US Health Care Providers Who Counsel Adolescents on Sports and Energy Drink Consumption

    Directory of Open Access Journals (Sweden)

    Nan Xiang

    2014-01-01

    Full Text Available Objective. To examine the proportion of health care providers who counsel adolescent patients on sports and energy drink (SED consumption and the association with provider characteristics. Methods. This is a cross-sectional analysis of a survey of providers who see patients ≤17 years old. The proportion providing regular counseling on sports drinks (SDs, energy drinks (EDs, or both was assessed. Chi-square analyses examined differences in counseling based on provider characteristics. Multivariate logistic regression calculated adjusted odds ratios (aOR for characteristics independently associated with SED counseling. Results. Overall, 34% of health care providers regularly counseled on both SEDs, with 41% regularly counseling on SDs and 55% regularly counseling on EDs. On adjusted modeling regular SED counseling was associated with the female sex (aOR: 1.44 [95% CI: 1.07–1.93], high fruit/vegetable intake (aOR: 2.05 [95% CI: 1.54–2.73], family/general practitioners (aOR: 0.58 [95% CI: 0.41–0.82] and internists (aOR: 0.37 [95% CI: 0.20–0.70] versus pediatricians, and group versus individual practices (aOR: 0.59 [95% CI: 0.42–0.84]. Modeling for SD- and ED-specific counseling found similar associations with provider characteristics. Conclusion. The prevalence of regular SED counseling is low overall and varies. Provider education on the significance of SED counseling and consumption is important.

  3. Providers perspective and geographic and institutional factors associated with family planning counseling.

    Science.gov (United States)

    de la Vara-Salazar, Elvia; Suárez-López, Leticia; Rivera, Leonor; Lazcano-Ponce, Eduardo

    2018-06-01

    Family planning (FP) counseling is an essential activity to prevent unplanned pregnancies and allow a fulfilling sex life. We defined adequate counseling in FP as the counseling given to women and men of reproductive age that provided complete information about use, application, effectiveness, side effects, and contraindications. Two objectives are proposed in this study. First, we seek to analyze geographic and institutional factors associated with FP counseling in primary and secondary healthcare facilities in Mexico. Second, we seek to identify the cultural barriers that providers perceive as a limitation of the clients so that they can come to request information related to FP and that are associated with FP counseling. This cross-sectional study uses a complex, probabilistic, stratified sampling design representative at national level by institution, region and rural-urban areas. We collected 16,829 provider questionnaires at healthcare facilities. Bivariate and logistic regression analyses were performed. Providers in rural areas had a greater possibility of offering adequate counseling (OR = 2.98; 95%CI 1.18-7.53). Providers in the northern region of the country were more likely to provide adequate counseling (OR = 5.37; 95% CI 1.91-15.12). Providers whom perceive religion as a limitation for clients to come to request information about FP are less likely to provide adequate counseling (OR = 0.37; 95% CI 0.15-0.88). Physical space exclusively for the provision of FP counseling and the availability of manuals were not associated with adequate counseling. There is a need to address the social and cultural influences on the quality of counseling in these healthcare facilities. Copyright © 2018 Elsevier B.V. All rights reserved.

  4. Sex Headaches

    Science.gov (United States)

    Sex headaches Overview Sex headaches are brought on by sexual activity — especially an orgasm. You may notice a dull ache in your head ... severe headache just before or during orgasm. Most sex headaches are nothing to worry about. But some ...

  5. Securing the anonymity of content providers in the World Wide Web

    Science.gov (United States)

    Demuth, Thomas; Rieke, Andreas

    1999-04-01

    Nowadays the World Wide Web (WWW) is an established service used by people all over the world. Most of them do not recognize the fact that they reveal plenty of information about themselves or their affiliation and computer equipment to the providers of web pages they connect to. As a result, a lot of services offer users to access web pages unrecognized or without risk of being backtracked, respectively. This kind of anonymity is called user or client anonymity. But on the other hand, an equivalent protection for content providers does not exist, although this feature is desirable for many situations in which the identity of a publisher or content provider shall be hidden. We call this property server anonymity. We will introduce the first system with the primary target to offer anonymity for providers of information in the WWW. Beside this property, it provides also client anonymity. Based on David Chaum's idea of mixes and in relation to the context of the WWW, we explain the term 'server anonymity' motivating the system JANUS which offers both client and server anonymity.

  6. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    Science.gov (United States)

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  7. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  8. A New Heuristic Anonymization Technique for Privacy Preserved Datasets Publication on Cloud Computing

    Science.gov (United States)

    Aldeen Yousra, S.; Mazleena, Salleh

    2018-05-01

    Recent advancement in Information and Communication Technologies (ICT) demanded much of cloud services to sharing users’ private data. Data from various organizations are the vital information source for analysis and research. Generally, this sensitive or private data information involves medical, census, voter registration, social network, and customer services. Primary concern of cloud service providers in data publishing is to hide the sensitive information of individuals. One of the cloud services that fulfill the confidentiality concerns is Privacy Preserving Data Mining (PPDM). The PPDM service in Cloud Computing (CC) enables data publishing with minimized distortion and absolute privacy. In this method, datasets are anonymized via generalization to accomplish the privacy requirements. However, the well-known privacy preserving data mining technique called K-anonymity suffers from several limitations. To surmount those shortcomings, I propose a new heuristic anonymization framework for preserving the privacy of sensitive datasets when publishing on cloud. The advantages of K-anonymity, L-diversity and (α, k)-anonymity methods for efficient information utilization and privacy protection are emphasized. Experimental results revealed the superiority and outperformance of the developed technique than K-anonymity, L-diversity, and (α, k)-anonymity measure.

  9. Serbs in the poetry of Theodore Prodromos and anonymous Manganeios

    Directory of Open Access Journals (Sweden)

    Stanković Vlada

    2006-01-01

    Full Text Available Numerous rhetorical writings of the Comnenian period constitute a fruitful field of research, both with respect to historical data, i.e. hard historical facts hidden, though still recognizable, behind the peculiar and somewhat abstract mode of expression of the authors of the twelfth century, and with regard to the poetics of the literary works themselves, i.e. the internal elements characteristic not only for the genre chosen, but also for each particular author. A comparative, historical and literary approach to these works renders their sense clearer and their complex allusions more readily understood. This is a matter of some importance, since allusions constitute one of the basic elements of historical rhetoric, which reached its peak at the time of Emperor Manuel Komnenos (1143-1180, especially during the first half of his reign, i.e. till the end of the fifties of the twelfth century. The poetry of Theodore Prodromes and of the somewhat younger Anonymous ('Prodromos' Manganeios is an excellent example of this intertwining of historical and literary elements, i.e. of the presentation of historical data through rhetorical patterns. One has to concentrate on individual works attempting to determine, as far as possible, the date of composition, the circumstances of writing and the purpose of a particular poem, the occasion for which it was written and the character of the expected audience, in order to better understand both the poetry written by these two rhetoricians and the individual features of the authors, as well as their respective positions in the circle around Emperor Manuel Komnenos. The poems dealt with in the present paper stand out for calling the Serbs by their real name. This naming practice was invariably employed by both rhetoricians in cases when new achievements of the basileus were to be announced and proclaimed immediately after the event, on the occasions of first reports, first celebrations of the new victories and

  10. [Teenager counselling in primary care].

    Science.gov (United States)

    Millán, Teresa; Morera, Iván; Vargas, Nelson A

    2007-04-01

    Teenager counseling to recognize risks and reinforce strengths is carried out in a primary care outpatient clinic since 2003. To describe the epidemiology and causes for consultation in this teenage counseling program. Retrospective review of the records of 116 teenagers (median age 13 years, 67% females) that received teenager counseling. Seventy percent of women and 50% of men came from nuclear families. More than two thirds were primogenital. Most adolescents were accompanied by their mother, that were the main adult raw model. Fifty percent had dysfunctional families. All were attending school regularly and 21% of women and 29% of men had repeated a school level. Sixty eight percent of women and 62% of men declared to have a life project. Twenty percent were worried about their physical appearance. Seventy seven percent of women and 62% of men considered themselves as happy. Thirty six percent of women and 14% of men smoked. The figures for alcohol consumption were 21% and 14%, respectively. The causes for consultation were obesity, overweight, unspecific symptoms, behavioral problems, bad school achievement, communication problems or pregnancy. Reasons for counseling were family dysfunction, low self esteem, bad school achievement and information about sexuality. The information obtained could help to improve the interdisciplinary work and to coordinate counseling with the family and schools.

  11. The Role of the Anonymous Voice in Post-Publication Peer Review Versus Traditional Peer Review

    Directory of Open Access Journals (Sweden)

    Jaime A. Teixeira da Silva

    2015-12-01

    Full Text Available Traditional peer review (TPR has several limitations and weaknesses. Post-publication peer review is one practical way to repair the ills of TPR and reinforce it. A literature that is marked by errors is unhealthy and should, if given the opportunity, be corrected or further improved. The anonymous voice is one source of critique and differs from the blind peer review in TPR in which the reviewer remains anonymous to the authors and/or vice versa, but the identity is known to the editor. If unregulated, the anonymous voice can pose a threat to established editorial norms in TPR, to one of the most important criteria of science publishing, i.e., transparency, and to worthwhile discussion. Yet, if the anonymous voice is not heard, then a vast and potentially valuable pool of untapped opinions may be lost, opinions that may provide valuable solutions to improving TPR.

  12. K-Anonymity Based Privacy Risk Budgeting System for Interactive Record Linkage

    Directory of Open Access Journals (Sweden)

    Hye-Chung Kum

    2017-04-01

    The k-anonymity based privacy risk budgeting system provides a mechanism where we can concretely reason about the tradeoff between the privacy risks due to information disclosed, accuracy gained, and biases reduced during interactive record linkage.

  13. Anonymous letters? DNA and fingerprints technologies combined to solve a case.

    Science.gov (United States)

    Barbaro, A; Cormaci, P; Teatino, A; La Marca, A; Barbaro, A

    2004-12-02

    Two brothers, living in two different cities, received two different anonymous letters. We performed latent prints development and DNA research on the letters and also on a glass used by a cousin suspected to be the letters' sender.

  14. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    NARCIS (Netherlands)

    Bodó, B.

    2014-01-01

    This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of

  15. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  16. Effect of didactic lectures on obesity documentation and counseling among internal medicine residents.

    Science.gov (United States)

    Ren, Vicky; Ellison, Kathleen; Miller, Jonathan; Busireddy, Kiran; Vickery, Erin; Panda, Mukta; Qayyum, Rehan

    2016-01-01

    Screening adult patients for obesity and offering appropriate counseling and treatment for weight loss is recommended. However, many healthcare providers feel ill-equipped to address this topic. We examined whether didactic presentations lead to increased obesity documentation and counseling among internal medicine (IM) residents. We reviewed medical records of patients seen at the IM Resident Continuity Clinic during April 2015. Residents were provided feedback at two didactic presentations during May 2015. To examine the effect of this intervention, we repeated medical record review during June 2015. For both reviews, we abstracted patient-specific (i.e., age, body mass index [BMI], race, sex, and number of comorbid diagnoses) and resident-specific (i.e., sex and training level) data as well as evidence of obesity documentation and counseling. We used logistic regression models to examine the effect of intervention on obesity documentation and counseling, adjusting for patient- and resident-specific variables. Of the 278 patients with BMI≥30 kg/m(2), 139 were seen before and 139 after the intervention. Intervention had no effect on obesity documentation or counseling with or without adjustment for confounding variables (both P>0.05). In adjusted post-hoc analyses, each additional comorbidity increased the odds of obesity documentation by 8% (OR=1.08; 95% CI=1.05-1.11; Pdidactic presentations were unable to increase obesity documentation or weight loss counseling. Future research to identify effective interventions is needed.

  17. Impact of Anonymity and Identity Deception on Social Media eWOM

    OpenAIRE

    Kapoor , Payal ,; Gunta , Srinivas

    2016-01-01

    Part 4: Information Sharing on Social Media; International audience; Brand-related consumer to consumer communication, eWOM, is taking place in many forms across the social media space. Rules that governed credibility assessment of brand-related communication, WOM, in the Face to Face context may vary on social media, specifically because of anonymity that is afforded on different social media sites. The current study looks closely on the impact of anonymity in typical eWOM behaviour context ...

  18. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    OpenAIRE

    Feng Tao; Zhao Ming-Tao

    2017-01-01

    Tor (The Second Onion Router) is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was use...

  19. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    Science.gov (United States)

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  20. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    Directory of Open Access Journals (Sweden)

    Tomas A. Lipinski

    2002-01-01

    Full Text Available This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has altered the traditional legal paradigm of responsibility and as a result creates potential problems for the future of anonymous speech on the Internet.  As a result plaintiffs are no longer pursuing litigation against service providers but taking their dispute directly to the anonymous speaker. Second, several cases have arisen in the United States where plaintiffs have requested that the identity of an anonymous Internet speaker be revealed.  These cases are surveyed.  Third, the cases are analyzed in order to determine the factors that courts require to be present before the identity of an anonymous speaker will be revealed.  The release is typically accomplished by the enforcement of a discovery subpoena instigated by the party seeking the identity of the anonymous speaker. The factors courts have used are as follows: jurisdiction, good faith (both internal and external, necessity (basic and sometimes absolute, and at times proprietary interest. Finally, these factors are applied in three scenarios--e-commerce, education, and employment--to guide institutions when adopting policies that regulate when the identity of an anonymous speaker--a customer, a student or an employee--would be released as part of an internal initiative, but would nonetheless be consistent with developing legal standards.

  1. Effectiveness of Anonymization Methods in Preserving Patients' Privacy: A Systematic Literature Review.

    Science.gov (United States)

    Langarizadeh, Mostafa; Orooji, Azam; Sheikhtaheri, Abbas

    2018-01-01

    An ever growing for application of electronic health records (EHRs) has improved healthcare providers' communications, access to data for secondary use and promoted the quality of services. Patient's privacy has been changed to a great issue today since there are large loads of critical information in EHRs. Therefore, many privacy preservation techniques have been proposed and anonymization is a common one. This study aimed to investigate the effectiveness of anonymization in preserving patients' privacy. The articles published in the 2005-2016 were included. Pubmed, Cochrane, IEEE and ScienceDirect were searched with a variety of related keywords. Finally, 18 articles were included. In the present study, the relevant anonymization issues were investigated in four categories: secondary use of anonymized data, re-identification risk, anonymization effect on information extraction and inadequacy of current methods for different document types. The results revealed that though anonymization cannot reduce the risk of re-identification to zero, if implemented correctly, can manage to help preserve patient's privacy.

  2. Sex ratios

    OpenAIRE

    West, Stuart A; Reece, S E; Sheldon, Ben C

    2002-01-01

    Sex ratio theory attempts to explain variation at all levels (species, population, individual, brood) in the proportion of offspring that are male (the sex ratio). In many cases this work has been extremely successful, providing qualitative and even quantitative explanations of sex ratio variation. However, this is not always the situation, and one of the greatest remaining problems is explaining broad taxonomic patterns. Specifically, why do different organisms show so ...

  3. Marriage Counseling: A Christian Approach to Counseling Couples.

    Science.gov (United States)

    Worthington, Everett L., Jr.

    1990-01-01

    Describes approach to marriage counseling based on cognitive behavioral therapy and structural and strategic marital therapies aimed at Christian couples. Uses shared Christian values between counselor and clients to promote increased marital commitment, marital satisfaction, and personal spiritual growth. Maintains marital satisfaction might be…

  4. Counseling as an Art: The Creative Arts in Counseling.

    Science.gov (United States)

    Gladding, Samuel T.

    In this book counseling approaches with a variety of populations are examined using these creative arts: music; dance/movement; imagery; visual arts; literature; drama; and play and humor. It is noted that all of these arts are process-oriented, emotionally sensitive, socially directed, and awareness-focused. Chapter 1 discusses the history,…

  5. Continuum of Counseling Goals: A Framework for Differentiating Counseling Strategies.

    Science.gov (United States)

    Bruce, Paul

    1984-01-01

    Presents counseling goals in a developmental continuum similar in concept to Maslow's hierarchy of needs. Discusses ego development goals, socialization goals, developmental goals, self-esteem goals, and self-realization goals and describes characteristics and implications of the continuum. (JAC)

  6. Effect of screening and lifestyle counselling on incidence of ischaemic heart disease in general population

    DEFF Research Database (Denmark)

    Jørgensen, Torben; Jacobsen, Rikke Kart; Toft, Ulla

    2014-01-01

    of Copenhagen, Denmark PARTICIPANTS: 59 616 people aged 30-60 years randomised with different age and sex randomisation ratios to an intervention group (n=11 629) and a control group (n=47 987). INTERVENTION: The intervention group was invited for screening, risk assessment, and lifestyle counselling up to four...... of group based lifestyle counselling on smoking cessation, diet, and physical activity. After five years all were invited for a final counselling session. Participants were referred to their general practitioner for medical treatment, if relevant. The control group was not invited for screening. MAIN......OBJECTIVE: To investigate the effect of systematic screening for risk factors for ischaemic heart disease followed by repeated lifestyle counselling on the 10 year development of ischaemic heart disease at a population level. DESIGN: Randomised controlled community based trial. SETTING: Suburbs...

  7. Effect of screening and lifestyle counselling on incidence of ischaemic heart disease in general population

    DEFF Research Database (Denmark)

    Jørgensen, Torben; Jacobsen, Rikke Kart; Toft, Ulla

    2014-01-01

    of Copenhagen, Denmark. PARTICIPANTS: 59,616 people aged 30-60 years randomised with different age and sex randomisation ratios to an intervention group (n = 11,629) and a control group (n = 47,987). INTERVENTION: The intervention group was invited for screening, risk assessment, and lifestyle counselling up...... sessions of group based lifestyle counselling on smoking cessation, diet, and physical activity. After five years all were invited for a final counselling session. Participants were referred to their general practitioner for medical treatment, if relevant. The control group was not invited for screening......OBJECTIVE: To investigate the effect of systematic screening for risk factors for ischaemic heart disease followed by repeated lifestyle counselling on the 10 year development of ischaemic heart disease at a population level. DESIGN: Randomised controlled community based trial. SETTING: Suburbs...

  8. Sex education in Cyprus.

    Science.gov (United States)

    Patsalides, N

    1991-05-01

    The objective of educating people on family planning and sexuality issues has been carried forth by the Family Planning Association of Cyprus (FPAC) since 1971. The promotion of sex education in schools has generated respect for their expertise. Sex education has reached the agenda of the General Assembly of Parliament only to be postponed due to the April 1991 end of term dismissal. A newly elected Parliament are not expected to act immediately. The Ministry of Education Committee on Health Education has been actively counseled since 1974, and most recently in their examination of the possibilities of school sex education and training of high school teachers. The Ministry of Education has authority over primary and secondary education, which is compulsory up to 3 years of secondary education. The approach of FPAC has been to work with parents first in education lectures at various well publicized locations. The agenda was to inform about FPAC, explain the purpose and meaning of sex education, and show the Merry-Go-Round educational film followed by a question and answer session. Eventually, presentations involved children with parent observation. In 1977, authorization from the Ministry of Education gave official approval to FPAC, but not on school premises. FPAC went directly to headmasters and gained support in primary schools to organize sessions on school premises, which successfully involved many primary schools even in the much needed rural areas. Home Economics and Child Care, offered in the 5th and 6th grades was the only vehicle for gaining permission to enter secondary schools. In Larnaca, secondary school headmasters at the 3rd and 6th grade levels permitted invitations which requested parental permission. Lecture topics on human reproduction, sex roles, and disease and contraception were also provided in a follow-up letter. Higher education levels were involved through youth clubs and evening lectures. In 1988, FPAC urged the Director General of the

  9. Patient and Physician Characteristics Associated with the Provision of Weight Loss Counseling in Primary Care

    Science.gov (United States)

    Dutton, Gareth R.; Herman, Katharine G.; Tan, Fei; Goble, Mary; Dancer-Brown, Melissa; Van Vessem, Nancy; Ard, Jamy D.

    2013-01-01

    Background A variety of physician and patient characteristics may influence whether weight loss counseling occurs in primary care encounters. Objectives This study utilized a cross-sectional survey of primary care patients, which examined patient characteristics, physician characteristics, and characteristics of the physician-patient relationship associated with weight loss counseling and recommendations provided by physicians. Participants Participants (N=143, mean age=46.8 years, mean BMI=36.9 kg/m2, 65% Caucasian) were overweight and obese primary care patients participating in a managed care weight loss program. Measures Participants completed self-report surveys in the clinic prior to the initial weight loss session. Surveys included items assessing demographic/background characteristics, weight, height, and a health care questionnaire evaluating whether their physician had recommended weight loss, the frequency of their physicians’ weight loss counseling, and whether their physician had referred them for obesity treatment. Results Patient BMI and physician sex were most consistently associated with physicians’ weight loss counseling practices. Patients seen by female physicians were more likely to be told that they should lose weight, received more frequent obesity counseling, and were more likely to have been referred for obesity treatment by their physician. Length and frequency of physician-patient contacts were unrelated to the likelihood of counseling. Conclusions These findings add to previous evidence suggesting possible differences in the weight loss counseling practices of male and female physicians, although further research is needed to understand this potential difference between physicians. PMID:24743007

  10. Feasibility and acceptability of couple counselling and pelvic floor muscle training after operation for prostate cancer

    DEFF Research Database (Denmark)

    Karlsen, Randi V; E Bidstrup, Pernille; Hvarness, Helle

    2017-01-01

    Can intervention, which consists of up to six couple counselling sessions, group instruction in pelvic floor muscle training (PFMT), up to three individual PFMT sessions and a DVD home training program. We examined its feasibility on the basis of the recruitment rate, adherence to and acceptability...... of the intervention, the response rate and changes in erectile and sexual functioning measured on the International Index of Erectile Function at baseline and at eight and 12 months. RESULTS: The recruitment rate was 14%. One couple withdrew, six couples attended 1-4 counselling sessions, and all patients attended...... PFMT until continence was achieved. The response rate on outcomes was 85% for patients and 71% for partners. The couples reported that counselling improved their sex life but it did not improve their ability to talk openly about sex. Most patients found that the physiotherapist improved...

  11. Genetic Counseling Supervisors' Self-Efficacy for Select Clinical Supervision Competencies.

    Science.gov (United States)

    Finley, Sabra Ledare; Veach, Pat McCarthy; MacFarlane, Ian M; LeRoy, Bonnie S; Callanan, Nancy

    2016-04-01

    Supervision is a primary instructional vehicle for genetic counseling student clinical training. Approximately two-thirds of genetic counselors report teaching and education roles, which include supervisory roles. Recently, Eubanks Higgins and colleagues published the first comprehensive list of empirically-derived genetic counseling supervisor competencies. Studies have yet to evaluate whether supervisors possess these competencies and whether their competencies differ as a function of experience. This study investigated three research questions: (1) What are genetic counselor supervisors' perceptions of their capabilities (self-efficacy) for a select group of supervisor competencies?, (2) Are there differences in self-efficacy as a function of their supervision experience or their genetic counseling experience, and 3) What training methods do they use and prefer to develop supervision skills? One-hundred thirty-one genetic counselor supervisors completed an anonymous online survey assessing demographics, self-efficacy (self-perceived capability) for 12 goal setting and 16 feedback competencies (Scale: 0-100), competencies that are personally challenging, and supervision training experiences and preferences (open-ended). A MANOVA revealed significant positive effects of supervision experience but not genetic counseling experience on participants' self-efficacy. Although mean self-efficacy ratings were high (>83.7), participant comments revealed several challenging competencies (e.g., incorporating student's report of feedback from previous supervisors into goal setting, and providing feedback about student behavior rather than personal traits). Commonly preferred supervision training methods included consultation with colleagues, peer discussion, and workshops/seminars.

  12. Initial counselling for cleft lip and palate: parents' evaluation, needs and expectations.

    Science.gov (United States)

    Kuttenberger, J; Ohmer, J N; Polska, E

    2010-03-01

    During the first counselling after the birth of a child with cleft lip and palate (CLP) information about the malformation should be delivered and a long-standing relationship between the cleft team and the affected family must be established. The present study was conducted to evaluate the parents' experiences, needs and expectations with this first consultation. A questionnaire was sent to 105 parents at the cleft clinic, which could be answered anonymously. It collected demographic data, data on the parents' pre-existing level of information and the parents' assessment of the counselling at the cleft centre. Seventy percent of the questionnaires were returned. In 16% the clefts were diagnosed prenatally, in 32% there were relatives with clefts. Seventy-one percent of the parents received detailed counselling, 89% of which occurred in the first week. The parents requested that information about surgery (80%), feeding the child (63%) and the aetiology of clefts (44%) should be given. The quality of the consultation was rated very good or good by 87% of families. This study confirms the importance of initial counselling for CLP. The exceptional psychological situation of the family has to be considered and a close collaboration between cleft centre and maternity hospitals is mandatory.

  13. Genetic Counseling for Congenital Heart Defects

    Science.gov (United States)

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More Genetic Counseling for Congenital Heart Defects Updated:Jan 19,2018 ... with congenital heart disease considers having children. Genetic counseling can help answer these questions and address your ...

  14. Heidbreder to head Office of Legal Counsel

    OpenAIRE

    Hincker, Lawrence

    2006-01-01

    Kay Heidbreder of Blacksburg, has been appointed University Counsel by the Virginia Attorney General and will head the university's legal office. Heidbreder, who holds the position of assistant attorney general, has been associate general counsel at Virginia Tech since 1985.

  15. Verbal Venting in the Social Web: Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments

    Directory of Open Access Journals (Sweden)

    Leonie Rösner

    2016-08-01

    Full Text Available Scholars often blame the occurrence of aggressive behavior in online discussions on the anonymity of the Internet; however, even on today’s less anonymous platforms, such as social networking sites, users write plenty of aggressive comments, which can elicit a whole wave of negative remarks. Drawing on the social identity and deindividuation effects (SIDE model, this research conducts a laboratory experiment with a 2 (anonymity vs. no anonymity × 2 (aggressive norm vs. non-aggressive norm between-subjects design in order to disentangle the effects of anonymity, social group norms, and their interactions on aggressive language use in online comments. Results reveal that participants used more aggressive expressions in their comments when peer comments on a blog included aggressive wording (i.e., the social group norm was aggressive. Anonymity had no direct effect; however, we found a tendency that users’ conformity to an aggressive social norm of commenting is stronger in an anonymous environment.

  16. Adjustment and Self-Esteem of Users and Nonusers of a University Counselling Service.

    Science.gov (United States)

    Poirier, Pierre-Paul; And Others

    1979-01-01

    A version of the Tennessee Self Concept Scale was used to measure self-esteem and adjustment in groups of users and nonusers of the counseling center at a French Canadian University. Users were found to have significantly lower self-esteem scores than nonusers. Sex seemed unrelated. (Author)

  17. Creating Sex

    DEFF Research Database (Denmark)

    Cahana, Jonathan

    2016-01-01

    Thomas Laqueur’s influential yet controversial study Making Sex has, in many ways, revolutionized our understanding of sexuality in antiquity. Yet, most of Laqueur’s critics and supporters stressed the one-sex body, while the crux of his argument is the primacy of gender. Moreover, a systematic...

  18. Sex determination

    Indian Academy of Sciences (India)

    The sex-determining system differs considerably among organisms. Even among insect species, the genetic system for sex-determination is highly diversified. In Drosophila melanogaster, somatic sexual differentiation is regulated by a well characterized genetic hierarchy X : A > Sxl > tra/tra2 > dsx and fru. This cascade ...

  19. 36 CFR 1211.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 1211.425 Section 1211.425 Parks, Forests, and Public Property NATIONAL... Education Programs or Activities Prohibited § 1211.425 Counseling and use of appraisal and counseling...

  20. Counseling Ethics Education Experience: An Interpretive Case Study of the First Year Master's Level Counseling Students

    Science.gov (United States)

    Zakaria, Noor Syamilah

    2013-01-01

    Counseling ethics competency is an important part of counselor identity development as required by the counseling profession training standards, and counseling ethics education is one major component of knowledge acquisition in counseling profession. Counselor educators and counselor education training programs have a core responsibility to…

  1. Declining Counseling Research in Counseling Psychology Journals: Is the Sky Falling?

    Science.gov (United States)

    Lichtenberg, James W.

    2011-01-01

    Scheel et al. note a rather precipitous decline over the past 30 years in the number and proportion of counseling-related research articles appearing in "Journal of Counseling Psychology" ("JCP") and "The Counseling Psychologist" ("TCP"). Certainly, counseling psychology as a field has changed over its 65-year history, and a great deal of that…

  2. Group Counseling in the Schools

    Science.gov (United States)

    Perusse, Rachelle; Goodnough, Gary E.; Lee, Vivian V.

    2009-01-01

    Group counseling is an effective intervention when working in a school setting. In this article, the authors discuss the different kinds of groups offered in schools, types of group interventions, strategies to use in forming groups, and how to collaborate with others in the school. Because leading groups in schools is a specialized skill, the…

  3. Board Certification in Counseling Psychology

    Science.gov (United States)

    Crowley, Susan L.; Lichtenberg, James W.; Pollard, Jeffrey W.

    2012-01-01

    Although specialty board certification by the American Board of Professional Psychology (ABPP) has been a valued standard for decades, the vast majority of counseling psychologists do not pursue board certification in the specialty. The present article provides a brief history of board certification in general and some historical information about…

  4. Counseling Adolescents with Problem Pregnancies.

    Science.gov (United States)

    Marecek, Jeanne

    1987-01-01

    Discusses the psychosocial context of unintended teenage pregnancies, including emotional and cognitive development during adolescence, family and peer relations, and norms for gender-appropriate sexual expression. The main goal in counseling is helping clients reach and implement an informed and fulled integrated decision about the pregnancy.…

  5. Counseling Intervention in Cancer Therapy.

    Science.gov (United States)

    Pusateri-Vlach, Nancy F.; Moracco, John C.

    1981-01-01

    Recounts the history of cancer treatment to illustrate the long-standing tradition of a holistic approach to the investigation and treatment of cancer, discusses the growing emphasis on holistic cancer treatment and the importance of counseling in such treatment. (Author)

  6. INTRODUCING OVER THE COUNTER COUNSELING

    Directory of Open Access Journals (Sweden)

    Nataša Bakić-Mirić

    2009-01-01

    Full Text Available A pharmacist in today’s world has a great responsibility – to help and educate patients about diverse ways for effective self-treatment. Whereas self-care is becoming increasingly popular among patients today the availability of over-the-counter medications makes it possible for patients to treat numerous conditions on their own but still under the supervision of a healthcare provider. During the pharmacist-patient encounter, the pharmacist’s obligation is to evaluate the patient’s medical condition, provide proper advice and counsel the patient on the proper course of treatment to be taken. Also by employing effective over the counter (OTC counseling as the most proper means in a pharmacist/patient communication process and, accordingly, rapport building in the OTC area, the pharmacist needs to demonstrate high energy, enthusiasm, respect, empathy, know-how of sensitive intercultural issues alongside personal appearance, body language, eye contact that all together make his/her personal “signature”. Accordingly, apart from patient education, the primary objective of OTC counseling becomes to educate pharmacists on basic principles used in assisting patients in the selection of over-the-counter (OTC products, provide examples of proper communication techniques for effective patient counseling concerning the OTC products (i.e. dosage, administration technique, storage, food and beverage interaction, monitoring etc where the pharmacist plays the key role in helping patients maximize their pharmaceutical care.

  7. 24 CFR 214.300 - Counseling services.

    Science.gov (United States)

    2010-04-01

    ... to provide specified types of counseling nationally. (6) All participating agencies that offer group educational sessions must also offer individual counseling on the same topics covered in the group educational... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Counseling services. 214.300...

  8. 75 FR 32496 - Housing Counseling Outcomes Study

    Science.gov (United States)

    2010-06-08

    ... counseling agencies seeking assistance to either purchase a home (pre-purchase clients) or to resolve or... months following the recipt of counseling to complete a survey about their conseling experience and their...-funded housing counseling agencies seeking assistance to either purchase a home (pre-purchase clients) or...

  9. Professional Counseling in Taiwan: Past to Future

    Science.gov (United States)

    Guo, Yuh-Jen; Wang, Shu-Ching; Combs, Don C.; Lin, Yi-Chun; Johnson, Veronica

    2013-01-01

    Because of the recent introduction of a licensure law, professional counseling has grown rapidly in Taiwan after decades of slow development. The authors provide a historical review of the development of professional counseling in Taiwan and discuss the current status and future trajectory of professional counseling in Taiwan.

  10. 24 CFR 206.41 - Counseling.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Counseling. 206.41 Section 206.41... CONVERSION MORTGAGE INSURANCE Eligibility; Endorsement Eligible Mortgagors § 206.41 Counseling. (a) List... receive counseling. (b) Information to be provided. A counselor must discuss with the mortgagor: (1) The...

  11. 20 CFR 638.517 - Counseling.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Counseling. 638.517 Section 638.517 Employees... THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.517 Counseling. The center operator shall establish and conduct an ongoing structured counseling program in accordance with procedures issued by the...

  12. Identifying Role Diffusion in School Counseling

    Science.gov (United States)

    Astramovich, Randall L.; Hoskins, Wendy J.; Gutierrez, Antonio P.; Bartlett, Kerry A.

    2013-01-01

    Role ambiguity in professional school counseling is an ongoing concern despite recent advances with comprehensive school counseling models. The study outlined in this article examined role diffusion as a possible factor contributing to ongoing role ambiguity in school counseling. Participants included 109 graduate students enrolled in a…

  13. 28 CFR 551.113 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Counseling. 551.113 Section 551.113... Pretrial Inmates § 551.113 Counseling. (a) When consistent with institution security and good order, pretrial inmates may be allowed the opportunity to receive counseling services with convicted inmates. (b...

  14. Marriage Counselling in Multicultural Society, Nigerian Experience ...

    African Journals Online (AJOL)

    This paper discusses marriage counselling in Multicultural society: Nigerian experience. The researcher sees Multicultural Counselling as a helping relationship, which involves two or more persons with different culture, beliefs and environment. The paper discusses how multicultural counselling can be applied in marriage ...

  15. Guiding the Family: Practical Counseling Techniques.

    Science.gov (United States)

    Grunwald, Bernice Bronia; McAbee, Harold V.

    This book, intended as a text for therapists and counselors in family counseling, is based on principles of Adlerian psychology. The first chapter examines Adlerian theory and family counseling. Basic principles of individual psychology are applied to family counseling, and the goals of children with disturbing behavior are discussed. Reasons why…

  16. Understanding Philosophical Counseling | Sivil | South African ...

    African Journals Online (AJOL)

    philosophical counseling by exploring its points of convergence to and deviation from its complimentary parts – philosophy and counseling. The practical and applied orientation of philosophical counseling seems worlds apart from what many consider to exemplify philosophy – theoretical, intellectual and abstract concern ...

  17. 249 Marriage Counselling in Multicultural Society, Nigerian ...

    African Journals Online (AJOL)

    User

    2012-01-24

    Jan 24, 2012 ... The researcher sees Multicultural Counselling as a helping relationship, which involves two or more ... pastors and elders in the counselling profession. Some recommendations were made as ... Multicultural counselling is a helping relationship which involves two or more persons with different culture, ...

  18. Outcomes of Career Counseling with Women.

    Science.gov (United States)

    Seligman, Linda

    1981-01-01

    Describes a career counseling program for adult females. Reports questionnaire results used to assess the effectiveness of that program. Male as well as female clients seemed to derive both attitudinal and occupational benefits from career counseling and expressed positive views of the career counseling process. (Author)

  19. Counseling in the Elementary Feeder Schools.

    Science.gov (United States)

    Dunham, Virginia

    This brief paper presents the concept of transition counseling between a junior high school and its feeder school(s), designed to make the change from elementary into junior high less traumatic. Aside from routine sixth grade counseling, the counselors expanded their base of counseling to include all types of problems as well as all grade levels.…

  20. Globalization and Counseling: Professional Issues for Counselors

    Science.gov (United States)

    Lorelle, Sonya; Byrd, Rebekah; Crockett, Stephanie

    2012-01-01

    Scholars have examined globalization for many years in terms of its impact on individuals, but it remains a concept not often discussed in the counseling literature. As counseling transforms from a Western-based practice to a global phenomenon, it is important to understand professional counseling within an international and multicultural context.…

  1. A Framework for Chaos Theory Career Counselling

    Science.gov (United States)

    Pryor, Robert G. L.

    2010-01-01

    Theory in career development counselling provides a map that counsellors can use to understand and structure the career counselling process. It also provides a means to communicate this understanding and structuring to their clients as part of the counselling intervention. The chaos theory of careers draws attention to the complexity,…

  2. Psychological counselling and indigenous African knowledge ...

    African Journals Online (AJOL)

    Psychological counselling relates to basic humanity and universal values such as the regard for human dignity, healthy socialisation, and emotional health. Counselling individuals who experience emotional or relational problems is a function of the helping and health care professions. Effective counselling should provide ...

  3. Counseling in Switzerland: Past, Present, and Future

    Science.gov (United States)

    Thomas, Roslyn; Henning, Stacy

    2012-01-01

    The authors review counseling in Switzerland and compare it with counseling in the United States. They evaluate the role of professional associations and programs and argue that the evolution of counseling is situated within the history and economic, social, and political systems of Switzerland. Findings suggest that Swiss counselors are ready to…

  4. Infusing Counseling Skills in Test Interpretation.

    Science.gov (United States)

    Rawlins, Melanie E.; And Others

    1991-01-01

    Presents an instructional model based on Neurolinguistic Programming that links counseling student course work in measurement and test interpretation with counseling techniques and theory. A process incorporating Neurolinguistic Programming patterns is outlined for teaching graduate students the counseling skills helpful in test interpretation.…

  5. Biblical counselling regarding inner change

    Directory of Open Access Journals (Sweden)

    Y. Campbell-Lane

    2005-07-01

    Full Text Available The concept of inner change is not only the ultimate goal of counselling; it is also a central concept of the gospel. Biblical counselling entails a Scriptural understanding of the nature of change and aims at helping the counsellee change his/her inner life under the guidance of the Holy Spirit. Change is the essence of the process of sanctification, entailing “putting off” (laying off sinful ways of life, renewing the mind, and ”putting on” (“clothing” oneself with godly ways of life (Eph. 4:22 ff.; Col. 3:8 ff.; Rom. 12:1-2. Although believers have a new identity in Christ, they still suffer from the effect of sin and have to grow in sanctification. Often the believer has not been instructed about changing previous irrational and unbiblical beliefs, behaviour, and habits, and he/she thus still integrates these negative results of sin into his/her new life. Unless old patterns are replaced with new ones, the counsellee can revert to sinful habits, unbiblical beliefs and behavioural patterns. A pastoral counsellor thus needs to teach the counsellee that God has made provision for him/her to change. A worldly anthropology-psychology is entirely opposed to the Biblical doctrines of sin and sanctification. Effective Biblical counselling depends on a Biblical anthropology and world view. A Biblical counsellor should promote holiness and a lifestyle in accordance with Biblical guidelines, thus shaping the counsellee to the likeness of Jesus Christ. When a Biblical counsellor ministers the Word of God in a life-transforming way, then God himself changes the counsellee from the inside out. A counsellor may not ignore sin and its effect as it will limit the effectiveness of counselling in facilitating lasting change in the life of a counsellee. It is important that a Biblical counseller understands the nature of change and is equipped with knowledge about, and the character of change.

  6. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

    Science.gov (United States)

    Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-11-21

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  7. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ling Xiong

    2017-11-01

    Full Text Available Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  8. BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-12-01

    Full Text Available With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication. To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates. “BIX” is an abbreviation for “Blockchain Information Exchange.” Their purpose is equivalent to X.509 certificates: to support security services for users and transactions, but also enhanced with anonymity. This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use. The BIX Certification Infrastructure (BCI as a distributed public ledger is also briefly described.

  9. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  10. HIV-related behaviors, social support and health-related quality of life among men who have sex with men and women (MSMW: a cross-sectional study in Chongqing, China.

    Directory of Open Access Journals (Sweden)

    Jiang-Peng Chen

    Full Text Available Health-related quality of life (HRQOL has become commonly used both as a concept and as a field of research. However, little is known about the HRQOL of men who have sex with men and women (MSMW. The aim of this study was to examine HIV-related behaviors, social support, and HRQOL status and explore its predictors among MSMW.An anonymous cross-sectional study was conducted by snowball sampling method in 2013. A total of 563 Chinese MSM completed a structured questionnaire. The HRQOL and social support were measured with the Chinese version of the World Health Organization Quality of Life Scale (WHOQOL-BRFE and the Social Support Rating Scale (SSRS, respectively.Of the 563 MSM analyzed, 77 (13.68% were MSMW who had a higher proportion of in-marriage and preference for an insertive role as compared with the men who have sex with men only (MSMO (P<0.05. As high as 70.13% of MSMW had no regular sex partners and 72.73% of MSMW reported engaging in unprotected anal sex in the last six months. 36.36% had tested for HIV, while only 12.99% had accepted HIV voluntary counseling and testing (VCT services. The scores of objective support and subjective support in MSMW were significantly higher than that of MSMO (P<0.05. No statistically significant difference was found in scores of all the four domains of the HRQOL between MSMW and MSMO. When comparing the HRQOL scores of MSMW with the Chinese general population reference group, the scores of MSMW were significantly lower in physical health domain. In a multivariate regression model, age, monthly income, sexual role, VCT acceptability, subjective support were associated with variability in HRQOL.To improve the HRQOL among MSMW, more attention needs to be paid to those with low social support, low-income, the old and those prefer a receptive role during anal sex populations.

  11. Oral sex.

    Science.gov (United States)

    1996-04-05

    The Gay and Lesbian Medical Association urges HIV prevention specialists to regard male-to-male oral-genital sex as a low-risk activity and concentrate instead on the danger of unprotected anal intercourse. According to the association, the confusion and mixed messages surrounding oral sex are harming efforts to encourage gay men to make rational choices about truly risky behavior. The recommendations appear in the association's position paper issued March 19, 1996.

  12. Why Sex?

    DEFF Research Database (Denmark)

    Nielsen, Rasmus

    2006-01-01

    It is assumed that most organisms have sex because the resulting genetic recombination allows Darwinian selection to work better. It is now shown that in water fleas, recombination does lead to fewer deleterious mutations.......It is assumed that most organisms have sex because the resulting genetic recombination allows Darwinian selection to work better. It is now shown that in water fleas, recombination does lead to fewer deleterious mutations....

  13. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  14. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  15. Surgical patient selection and counseling.

    Science.gov (United States)

    Ziegelmann, Matt; Köhler, Tobias S; Bailey, George C; Miest, Tanner; Alom, Manaf; Trost, Landon

    2017-08-01

    The objectives of patient selection and counseling are ultimately to enhance successful outcomes. However, the definition for success is often narrowly defined in published literature (ability to complete surgery, complications, satisfaction) and fails to account for patient desires and expectations, temporal changes, natural history of underlying diseases, or independent validation. Factors associated with satisfaction and dissatisfaction are often surgery-specific, although correlation with pre-operative expectations, revisions, and complications are common with most procedures. The process of appropriate patient selection is determined by the integration of patient and surgeon factors, including psychological capacity to handle unsatisfactory results, baseline expectations, complexity of case, and surgeon volume and experience. Using this model, a high-risk scenario includes one in which a low-volume surgeon performs a complex case in a patient with limited psychological capacity and high expectations. In contrast, a high-volume surgeon performing a routine case in a male with low expectations and abundant psychiatric reserve is more likely to achieve a successful outcome. To further help identify patients who are at high risk for dissatisfaction, a previously published mnemonic is recommended: CURSED Patient (compulsive/obsessive, unrealistic, revision, surgeon shopping, entitled, denial, and psychiatric). Appropriate patient counseling includes setting appropriate expectations, reviewing the potential and anticipated risks of surgery, post-operative instruction to limit complications, and long-term follow-up. As thorough counseling is often a time-consuming endeavor, busy practices may elect to utilize various resources including educational materials, advanced practice providers, or group visits, among others. The consequences for poor patient selection and counseling may range from poor surgical outcomes and patient dissatisfaction to lawsuits, loss of

  16. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    Directory of Open Access Journals (Sweden)

    Salma Umme

    2011-04-01

    Full Text Available Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004/23/EC. To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225 in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004/23/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  17. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    LENUS (Irish Health Repository)

    Walsh, Anthony PH

    2011-04-20

    Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004\\/23\\/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004\\/23\\/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  18. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  19. Intersectionality research in counseling psychology.

    Science.gov (United States)

    Grzanka, Patrick R; Santos, Carlos E; Moradi, Bonnie

    2017-10-01

    This article introduces the special section on intersectionality research in counseling psychology. Across the 4 manuscripts that constitute this special section, a clear theme emerges: a need to return to the roots and politics of intersectionality. Importantly, the 2 empirical articles in this special section (Jerald, Cole, Ward, & Avery, 2017; Lewis, Williams, Peppers, & Gadson, 2017) are studies of Black women's experiences: a return, so to speak, to the subject positions and social locations from which intersectionality emanates. Shin et al. (2017) explore why this focus on Black feminist thought and social justice is so important by highlighting the persistent weaknesses in how much research published in leading counseling psychology journals has tended to use intersectionality as a way to talk about multiple identities, rather than as a framework for critiquing systemic, intersecting forms of oppression and privilege. Shin and colleagues also point to the possibilities intersectionality affords us when scholars realize the transformative potential of this critical framework. Answers to this call for transformative practices are foregrounded in Moradi and Grzanka's (2017) contribution, which surveys the interdisciplinary literature on intersectionality and presents a series of guidelines for using intersectionality responsibly. We close with a discussion of issues concerning the applications of intersectionality to counseling psychology research that spans beyond the contributions of each manuscript in this special section. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  20. Counselling for burnout in Norwegian doctors: one year cohort study.

    Science.gov (United States)

    Rø, Karin E Isaksson; Gude, Tore; Tyssen, Reidar; Aasland, Olaf G

    2008-11-11

    To investigate levels and predictors of change in dimensions of burnout after an intervention for stressed doctors. Cohort study followed by self reported assessment at one year. Norwegian resource centre. 227 doctors participating in counselling intervention, 2003-5. Counselling (lasting one day (individual) or one week (group based)) aimed at motivating reflection on and acknowledgement of the doctors' situation and personal needs. Levels of burnout (Maslach burnout inventory) and predictors of reduction in emotional exhaustion investigated by linear regression. 185 doctors (81%, 88 men, 97 women) completed one year follow-up. The mean level of emotional exhaustion (scale 1-5) was significantly reduced from 3.00 (SD 0.94) to 2.53 (SD 0.76) (t=6.76, Ppsychotherapy, from 20% (36/182) to 53% (97/182). In the whole cohort, reduction in emotional exhaustion was independently associated with reduced number of work hours/week (beta=0.17, P=0.03), adjusted for sex, age, and personality dimensions. Among men "satisfaction with the intervention" (beta=0.25, P=0.04) independently predicted reduction in emotional exhaustion. A short term counselling intervention could contribute to reduction in emotional exhaustion in doctors. This was associated with reduced working hours for the whole cohort and, in men, was predicted by satisfaction with the intervention.

  1. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  2. Darknet and bitcoin, the obscure and anonymous side of the internet in healthcare.

    Science.gov (United States)

    Masoni, Marco; Guelfi, Maria Renza; Gensini, Gian Franco

    2016-11-14

    Illegal activities prosecutable by law in the real life can be committed on the internet alike. In the healthcare domain, we refer mainly to selling of illegal and counterfeit drugs, exchange of pedo-pornographic material and marketing of stolen medical records. These illegal activities are made easier by recent developments of the Internet that medical community must be aware of: darknet and bitcoin. The first allows anonymous surfing and the last anonymous financial transactions. After discussing which healthcare areas are affected by these technological developments of the Internet and the deriving consequences, then the Authors express their opinion on what actions can be taken to protect internet community.

  3. [Does really sex addiction exist?].

    Science.gov (United States)

    Echeburúa, Enrique

    2012-01-01

    Hypersexual Disorder has been proposed as a new psychiatric disorder for DSM-V, characterized by an increased frequency and intensity of sexually motivated fantasies, arousal, urges, and enacted behavior in association with an impulsivity component. Excessive appetitive and consummatory behaviors, including hypersexuality, can become a non-chemical addiction. Sexual addiction afflicts people having paraphilic or nonparaphilic behaviors associated with progressive risk-taking sexual behaviors, escalation or progression of sexual behaviors (tolerance), loss of control and significant adverse psychosocial consequences, such as unplanned pregnancy, pair-bond dysfunction, marital separation, financial problems and sexually transmitted diseases including HIV. The most common behaviors involved in sexual addiction are fantasy sex, compulsive masturbation, pornography, cybersex, voyeuristic sex, anonymous sex and multiple sexual partners. These behaviors are intended to reduce anxiety and other dysphoric affects (e.g., shame and depression). Axis I psychiatric diagnosis, especially mood disorders, psychoactive substance abuse disorders and attention deficit hyperactivity disorders, are common comorbid disorders with sexual addiction. There are significant gaps in the current scientific knowledge base regarding the clinical course, development risk factors and family history and data on women with sexual addiction are lacking.

  4. Teaching Genetic Counseling Skills: Incorporating a Genetic Counseling Adaptation Continuum Model to Address Psychosocial Complexity.

    Science.gov (United States)

    Shugar, Andrea

    2017-04-01

    Genetic counselors are trained health care professionals who effectively integrate both psychosocial counseling and information-giving into their practice. Preparing genetic counseling students for clinical practice is a challenging task, particularly when helping them develop effective and active counseling skills. Resistance to incorporating these skills may stem from decreased confidence, fear of causing harm or a lack of clarity of psycho-social goals. The author reflects on the personal challenges experienced in teaching genetic counselling students to work with psychological and social complexity, and proposes a Genetic Counseling Adaptation Continuum model and methodology to guide students in the use of advanced counseling skills.

  5. Sun protection counseling by pediatricians has little effect on parent and child sun protection behavior.

    Science.gov (United States)

    Cohen, Liza; Brown, Judith; Haukness, Heather; Walsh, Lori; Robinson, June K

    2013-02-01

    To compare counseling concerning sun protection and outdoor exercise with the parent's report of the behavior of a child aged 9-16 years old. Structured interviews of medical personnel in 3 Chicago area practices elicited information about counseling methods and recommendations. In each practice, a convenience sample of parents completed a self-reported survey of their and their child's behavior. Sun protection counseling occurred more frequently than exercise counseling in all practices (P = .014). Sun protection counseling was associated with parental prompting (P = .004), performing a summer camp physical (P = .002), and the child having a sunburn (P = .003). After controlling for the child's age, sex, and skin tone, sun protection counseling was not associated with the child's use of sun protection. In multivariate analysis of the child's sun protection behavior, parental sunburns, indoor tanning in the last 12 months, perception of skin cancer risk, and sun protection self-efficacy were significant (P = .02). Children who pursued outdoor sports were twice as likely to use inadequate sun protection and sustain sunburns (CI 1.3-1.7). The child's sun protection behavior was influenced by parental sun protection, parental perception of skin cancer risk, and parental sun protection self-efficacy; therefore, sun protection for children needs to be aimed at parents as well as children. Communication with parents in a way that incorporates the principles of motivational interviewing may be more effective in promoting behavioral change than admonitions to use sunscreen. Copyright © 2013 Mosby, Inc. All rights reserved.

  6. Counseling of children and adolescents in community pharmacies: Results from a 14-day observational study.

    Science.gov (United States)

    Carpenter, Delesha M; Abraham, Olufunmilola; Alexander, Dayna S; Horowitz, Katherine

    2016-01-01

    To characterize community pharmacists' interactions with children and their caregivers. This observational study was conducted over a 14-day period in 3 community pharmacies. Trained researchers used an observation guide to document information about prescriptions that were picked up for children 7 to 17 years of age. Research assistants recorded: 1) when the prescription was picked up; 2) who picked up the prescription; 3) who was counseled by the pharmacist; 4) which pharmacy staff members interacted with the family; 5) pick-up location; 6) wait time; 7) how many questions the child or caregiver asked pharmacy staff; and 8) caregiver gender. Additional details such as the child's age, sex, and medication information were obtained from the prescription. One hundred sixteen prescriptions were dispensed to 97 families. Most families picked up prescriptions on weekdays (84%) and after school (53%). Fifty-four percent of prescriptions were refills, and most (38%) were for mental health conditions. Only 28 children (29%) accompanied their caregivers to pick up their prescription. Nineteen caregivers (20%) received counseling; children were never counseled separately by pharmacists. Families with younger children were more likely to receive counseling than older children (β = -0.28; P = 0.01). Children infrequently accompany their parents to pick up their prescriptions, which limits pharmacists' opportunities to counsel children about their medications. Even when children are present, they rarely receive counseling from pharmacists. Copyright © 2016 American Pharmacists Association®. Published by Elsevier Inc. All rights reserved.

  7. The practice of OTC counseling by community pharmacists in Parana, Brazil

    Directory of Open Access Journals (Sweden)

    Halila GC

    2015-12-01

    Full Text Available Background: In order to provide appropriate advice to the patient at the time of dispensing and over-the-counter (OTC medication counseling, community pharmacists need access to current and reliable information about medicines. Brazilian pharmacists have assumed new functions such as prescribing medication, in a dependent model, based in protocols. Objective: To examine the practice of community pharmacists in a Brazilian State, focusing on OTC recommendation. Method: A cross-sectional survey of community pharmacists in a state of Brazil was conducted from October 2013 to January 2014, with data collection through a pre-piloted self-administered anonymous survey via Survey Monkey® platform. Following ethical approval, the online instrument was sent to 8,885 pharmacists registered in Parana State, Brazil, focusing on professionals working in community pharmacies. The questionnaire assessed the community pharmacy setting, the search for information, the knowledge of the evidence-based practice, the important factors to consider when recommending an OTC medicine, and the pharmacist prescribing. Responses were imported into SPSS® (version 22.0 for analysis. Nonparametric tests were used to assess the association between responses and demographic information with a significance level less than 5% (p<0.05. Results: Of the pharmacists, 97.4% dispensed medications and counseled patients for a median of six hours per day. Product's efficacy (97% and adverse effects (62.3% were the most important factors taken into account when counseling a nonprescription medicine. Few pharmacists knew the meaning of terms related to evidence-based health. Most respondents agreed that pharmacists have the necessary training to prescribe. Conclusion: Over-the-counter medication counseling is a daily practice among Brazilian pharmacists. Learning needs exist for community pharmacists in relation to evidence-based practice. Thus, sources of information with good evidence

  8. Knowledge, attitude and practice of family physicians regarding smoking cessation counseling in family practice centers, suez canal university, egypt.

    Science.gov (United States)

    Eldein, Hebatallah Nour; Mansour, Nadia M; Mohamed, Samar F

    2013-04-01

    Family physicians are the first point of medical contact for most patients, and they come into contact with a large number of smokers. Also, they are well suited to offer effective counseling to people, because family physicians already have some knowledge of patients and their social environments. The present study was conducted to assess family physicians' knowledge, attitude and practice of smoking cessation counseling aiming to improve quality of smoking cessation counseling among family physicians. The study was descriptive analytic cross sectional study. It was conducted within family medicine centers. Sample was comprehensive. it included 75 family physicians. They were asked to fill previously validated anonymous questionnaire to collect data about their personal characteristics, knowledge, attitude and practice of smoking cessation counseling, barriers and recommendations of physicians. Equal or above the mean scores were used as cut off point of the best scores for knowledge, attitude and practice. SPSS version 18 was used for data entry and statistical analysis. The best knowledge, attitude and practice scores among family physicians in the study sample were (45.3 %, 93.3% and 44% respectively). Age (P = 0.039) and qualification of family physicians (P = 0.04) were significant variables regarding knowledge scores while no statistically significance between personal characteristics of family physicians and their attitude or practice scores regarding smoking cessation counseling. More than half of the family physicians recommended training to improve their smoking cessation counseling. Favorable attitude scores of family physicians exceed passing knowledge scores or practice scores. Need for knowledge and training are stimulus to design an educational intervention to improve quality of smoking cessation counseling.

  9. The Comparison of Attention Biases to Opiates in Substance Dependent and Treated Clients of Therapeutic Clinics and Narcotics Anonymous Memberships

    Directory of Open Access Journals (Sweden)

    Javad Enayat

    2012-11-01

    Full Text Available Aim: The purpose of this study was to compare the attention bias about tempting incentives related to opium materials in treated, addicted and normal people. Duration of consumption and treating were also considered. Method: In this causal-comparative study population was all addicted people who were referred to the rehabilitation offices, addiction treatment clinic, rebirthing centers and Narcotics Anonymous of East Azerbaijan. This study consisted of five groups of men, including addicted to opium materials which are divided into two groups namely: long consumption period and people with short consumption period, also, treated people including long term treated and short term treated, and a normal control group. Altogether, 103 selected people were studied. Sample groups were similar in terms of age, education, and sex. For measuring attention bias towards tempting stimuli related opiates, a words recognition test was used. This test included three subtests and one recognition test. The recognition scores for the three categories of words were measured. Results: The findings indicated that there was a difference in attention against opium material incentives between control group and the mild and severe consumers groups. Also there were significant differences between treated people with the short time distance and control group, and control group had less temptation and biases in comparison to the other groups. Finally, those who have mild consumption are threatened more in comparison with the control group. Conclusion: The findings have applied implications.

  10. A Multimodal Counseling-Based Adolescent Physical Activity Intervention.

    Science.gov (United States)

    Oreskovic, Nicolas M; Winickoff, Jonathan P; Perrin, James M; Robinson, Alyssa I; Goodman, Elizabeth

    2016-09-01

    National guidelines recommend adolescents achieve 60 minutes of moderate-to-vigorous physical activity (MVPA)/day, yet few adolescents meet these guidelines. We piloted a novel quasi-randomized physical activity intervention to promote adolescent's use of their surrounding built environment among 30 intervention and 30 control overweight/obese adolescents aged 10-16 years living in greater Boston from 2013 to 2015. Location-specific MPVA was measured by accelerometry and global positioning system for three one-week periods (Time 1 [T1], Time 2 [T2], and Time 3 [T3]). One month after T1, intervention participants received individualized counseling on how to use their surrounding built environment to increase MVPA, and control participants received standard-of-care lifestyle modification counseling; both groups received their T1 physical activity data. T2 assessment occurred the week after the counseling visit and T3 assessment 3-4 months later. The main outcome was change in average daily minutes of MVPA; the secondary outcome was meeting national MVPA guidelines. Multivariable modeling accounted for covariates (baseline MVPA, body mass index, age, sex, race/ethnicity) and clustering by study group and town. Among the 60 adolescents recruited, 55 (92%) completed data collection. Short-term (T2) intervention effects included increased average MVPA of +13.9 minutes intervention versus -.6 minutes control (p group; p = .0006). The proportion of adolescents in the intervention group who achieved 60 minutes/day of MVPA increased from 11% (T1) to 21% (T2), whereas declining (7%-0%) among controls. Individualized counseling about the built environment can help increase MVPA among overweight and obese adolescents. Copyright © 2016 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  11. Medical Relabeling in Gamblers Anonymous: The Construction of an Ideal Member.

    Science.gov (United States)

    Turner, David N.; Saunders, Danny

    1990-01-01

    Observed 2 Gamblers Anonymous (GA) groups in South Wales over a 12-month period. Determined 2 broad consequences arose from encountering fellow sufferers: acceptance of diagnosis and commitment to recovery and to will of GA, or rejection of the diagnosis with the knowledge that they are returning to the outside world with a reconstituted…

  12. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...

  13. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

    Directory of Open Access Journals (Sweden)

    Kai Chain

    2016-11-01

    Full Text Available Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity.

  14. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  15. Social influence in computer-mediated communication : The effects of anonymity on group behavior

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Sakhel, K; de Groot, D

    2001-01-01

    Two studies examined hypotheses derived from a Social Identity model of Deindividuation Effects (SIDE) as applied to social influence in computer-mediated communication (CMC) in groups. This model predicts that anonymity can increase social influence if a common group identity is salient. In a first

  16. Anonymity and informed consent in artificial procreation: a report from Denmark

    DEFF Research Database (Denmark)

    Lebech, Anne Mette

    1997-01-01

    a problem concerning its application when dealing with people having a serious mental, social or even physical disability. Within the field of artificial procreation there are even more problems. Informed written consent is often demanded from anonymous donors of gametes in order to ensure their consent...

  17. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  18. Bayesian modeling of consumer behavior in the presence of anonymous visits

    Science.gov (United States)

    Novak, Julie Esther

    Tailoring content to consumers has become a hallmark of marketing and digital media, particularly as it has become easier to identify customers across usage or purchase occasions. However, across a wide variety of contexts, companies find that customers do not consistently identify themselves, leaving a substantial fraction of anonymous visits. We develop a Bayesian hierarchical model that allows us to probabilistically assign anonymous sessions to users. These probabilistic assignments take into account a customer's demographic information, frequency of visitation, activities taken when visiting, and times of arrival. We present two studies, one with synthetic and one with real data, where we demonstrate improved performance over two popular practices (nearest-neighbor matching and deleting the anonymous visits) due to increased efficiency and reduced bias driven by the non-ignorability of which types of events are more likely to be anonymous. Using our proposed model, we avoid potential bias in understanding the effect of a firm's marketing on its customers, improve inference about the total number of customers in the dataset, and provide more precise targeted marketing to both previously observed and unobserved customers.

  19. HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

    Directory of Open Access Journals (Sweden)

    Campos Javier

    2011-01-01

    Full Text Available Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, we propose and implement HOP, a novel solution based on cryptographic Host Identity Protocol (HIP that offers security and user-level anonymity in MANET environments while maintaining good performance levels. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT relationship anonymity, along with source/destination HIT anonymity when combined with multihoming. Afterward we detail how we integrate our improved version of HIP with the OLSR routing protocol to achieve efficient support for pseudonyms. We implemented our proposal in an experimental testbed, and the results obtained show that performance levels achieved are quite good, and that the integration with OLSR is achieved with a low overhead.

  20. Counseling activity in single-session online counseling with adolescents: an adherence study.

    Science.gov (United States)

    Chardon, Lydia; Bagraith, Karl S; King, Robert John

    2011-09-01

    While online counseling is increasingly utilized, little is known about what counseling work takes place in the online environment. The aim of this study was to quantify online counseling activity by determining counselors' adherence to the widely used model in which they had been trained. Transcripts (n=85) of online counseling with adolescents were evaluated, using a standardized and psychometrically sound instrument. We found that, while counseling in 53% of transcripts progressed through each of the key stages of counseling, the focus of most sessions was information gathering; and goal exploration and action planning were typically superficial and often absent. Possible reasons for low counseling depth are discussed and recommendations made for the further development of online counseling.

  1. Counseling on Sun Protection and Indoor Tanning.

    Science.gov (United States)

    Balk, Sophie J; Gottschlich, Elizabeth A; Holman, Dawn M; Watson, Meg

    2017-12-01

    The US Preventive Services Task Force recommends clinical counseling for individuals ages 10 to 24 years to decrease skin cancer risk. A national, random sample of US American Academy of Pediatrics members practicing primary care in 2002 (response rate 55%) and 2015 (response rate 43%). Surveys explored attitudes and experiences regarding sun protection counseling; indoor tanning questions were added in 2015. χ 2 tests compared demographics and counseling responses across years, and multivariable logistic regression models examined counseling predictors. More pediatricians in 2015 (34%) than in 2002 (23%) reported discussing sun protection during recent summer months with ≥75% of patients. This pattern held across all patient age groups (each P tanning at least once with 10 to 13 year-old patients; approximately half discussed this with older adolescents. Most (70%) did not know if their states had laws on minors' indoor tanning access; those stating they knew whether a law existed counseled more. Although improved, sun protection counseling rates remain low. Indoor tanning counseling can be improved. Because early-life exposure to UV radiation increases risk and clinician counseling can positively impact prevention behaviors, pediatricians have an important role in skin cancer prevention; counseling may save lives. Time constraints remain a barrier. Copyright © 2017 by the American Academy of Pediatrics.

  2. Genetic Counseling: MedlinePlus Health Topic

    Science.gov (United States)

    ... Craniosynostosis as a clinical and diagnostic problem: molecular pathology and... Article: GENETICS IN ENDOCRINOLOGY: Genetic counseling for congenital ... March of Dimes Birth Defects Foundation Also in Spanish ...

  3. Confidentiality, anonymity and amnesty for midwives in distress seeking online support - Ethical?

    Science.gov (United States)

    Pezaro, Sally; Clyne, Wendy; Gerada, Clare

    2018-06-01

    Midwife health is intrinsically linked to the quality of safe patient care. To ensure safe patient care, there is a need to deliver emotional support to midwives. One option that midwives may turn to may be a confidential online intervention, instead of localised, face-to-face support. Following the Realist And MEta-narrative Evidence Syntheses: Evolving Standards publication standards, this realist synthesis approach explores the ethical considerations in permitting confidentiality, anonymity and amnesty in online interventions to support midwives in work-related psychological distress. An iterative search methodology was used to select nine papers for review. To assimilate information, papers were examined for ideas relating to ethical dimensions of online interventions to support midwives in work-related psychological distress. This review takes a narrative approach. Online interventions can support the development of insight, help seeking and open discussion. Additionally, Internet support groups can become morally persuasive in nature. Anonymity and confidentiality are both effective and therapeutic features of online interventions when used in collaboration with effective online moderation. Yet, ethical dilemmas remain where users cannot be identified. Confidentiality and anonymity remain key components of successful online interventions. However, sanctioning the corollary component of amnesty may provoke moral discomfort for those seeking immediate accountability. For others, amnesty is seen as essential for open disclosure and help seeking. Ultimately, the needs of midwives must be balanced with the requirement to protect the public and the professional reputation of midwifery. In supporting midwives online, the principles of anonymity, confidentiality and amnesty may evoke some resistance on ethical grounds. However, without offering identity protection, it may not be possible to create effective online support services for midwives. The authors of this

  4. [Online Counselling: The prospect of a therapeutic connection].

    Science.gov (United States)

    Giotakos, O; Papadomarkaki, E

    2016-01-01

    Over the last few years, Internet has become an integral part of daily life. An abundant source of information and a principal gateway of communication between individuals, Internet has been continuously gaining considerable ground as a tool of awareness and intervention in the area of public health. With regard to the field of mental health, Internet exhibits a credible potential in facilitating dialogue not only between experts and their beneficiaries but also between stakeholders. Moreover and with regard to various aspects of public concern, it can serve as a circulation portal of educational material between students and teachers. The advent of remote support services dates back in the decade of 1970-1980. In the present time, they consist of informative guides and self-help groups or online counselling. The latter is defined as the process in which both parties, namely the therapist and the client, are involved in an oral or written conciliation through means of an internet connection, videoconferencing, live chat or e-mail exchange. The benefits of this practice - accessibility, relocation, convenience, anonymity, facilitation of face-to-face psychotherapy and low cost - could make online counseling, in specific cases, the treatment of choice. While the usage of the World Wide Web seems promising for the rectification of mental health disorders, there is some debate among experts regarding the ethical aspect of practicing psychotherapy in an interactive digital environment. Issues such as technical expertise and the tackling of related problems, difficulties in the diagnostic process, interchange of verbal and nonverbal cues, crisis management, safeguarding the therapeutic alliance, protection of personal data, age restriction, keeping boundaries in relation to the setting, the time and the dynamics of the therapeutic relationship and, finally, training and supervisory process of online therapist, are some subjects of disagreement. Relevant research reveals

  5. General Counsel`s office FY 1995 site support program plan WBS 6.10.5

    Energy Technology Data Exchange (ETDEWEB)

    Moreno, S.R.

    1994-09-01

    The General Counsel`s office provides legal counsel to all levels of WHC management; administers the intellectual property program; coordinates all WHC investigative activity and supports WHC activities to ensure compliance with all applicable federal, state, and local laws, DOE directives, contractual provisions, and other requirements. In so doing, the Office of General Counsel supports the Hanford site mission of transforming the Hanford site into an environmentally attractive and economically sustainable community. This document briefs the FY95 site support plan.

  6. A national benchmarking survey of student counselling centres/units ...

    African Journals Online (AJOL)

    The present study further found that the majority of counselling centres/units had one or more staff members with specialised training in areas such as HIV/AIDS counselling, sexual abuse counselling and multicultural counselling. In 2007, these counselling centres/units saw on average 18 per cent of enrolled students as ...

  7. 15 CFR 0.735-38 - Availability for counseling.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Availability for counseling. 0.735-38... AND CONDUCT Administration § 0.735-38 Availability for counseling. (a) The General Counsel of the... part; and (3) Coordinate the counseling services provided under this part and assure that counseling...

  8. Current Institutional Trends in Research Productivity in Counseling Psychology Journals

    Science.gov (United States)

    Diegelman, Nathan M.; Uffelman, Rachel A.; Wagner, Kimberly S.; Diegelman, Sally A.

    2005-01-01

    This study investigated institutional publication activity in counseling psychology journals for the 10-year period from 1993 to 2002. Four journals reported by counseling psychology training directors as prime publication outlets for the field of counseling psychology were used: "Journal of Counseling Psychology," "The Counseling Psychologist,"…

  9. The Process and Experience of Online Group Counseling for Masters-Level Counseling Students

    Science.gov (United States)

    Lopresti, Jason Michael

    2010-01-01

    The present study explored the process and experience of online group counseling using a text-based synchronous program, particularly addressing how the process compares to face-to-face group counseling. Six students in a masters-level group counseling class voluntarily chose to participate for eight sixty minute online sessions on a weekly basis,…

  10. Religion and Spirituality in Group Counseling: Beliefs and Practices of University Counseling Center Counselors

    Science.gov (United States)

    Post, Brian C.; Cornish, Marilyn A.; Wade, Nathaniel G.; Tucker, Jeritt R.

    2013-01-01

    Fifty-four counselors at 9 university counseling centers participated in a study regarding religion and spirituality (R/S) in group counseling. The majority indicated that R/S is an appropriate topic for group counseling and that some religious and spiritual interventions are appropriate to use. However, counselors rarely use these interventions.…

  11. Adventure Counseling as an Adjunct to Group Counseling in Hospital and Clinical Settings

    Science.gov (United States)

    Gillen, Mark C.; Balkin, Richard S.

    2006-01-01

    Adventure counseling has been thought of as a highly specialized application of group counseling skills in a wilderness environment. In fact, adventure counseling is based on a developmental theory of group, can be useful for a variety of clients, and can be thoughtfully integrated into clinical and hospital settings. This article describes the…

  12. Trainees versus Staff: Exploring Counseling Outcomes in a College Counseling Center

    Science.gov (United States)

    Ilagan, Guy; Vinson, Mike; Sharp, Julia L.; Havice, Pamela; Ilagan, Jill

    2014-01-01

    Investigators compared counseling outcomes among nonpaid graduate-level trainees and professional staff at a college counseling center. Counseling outcomes for 331 college student participants were measured using the Outcome Questionnaire 45.2 (OQ45.2), employing a pretest--posttest design. The two groups of service providers did not differ…

  13. Counseling through Images: Using Photography to Guide the Counseling Process and Achieve Treatment Goals

    Science.gov (United States)

    Ginicola, Misty M.; Smith, Cheri; Trzaska, Jessica

    2012-01-01

    Creative approaches to counseling help counselors to meet the needs of diverse populations. The utility of photography in counseling has been demonstrated through several case studies; however, clear implications of how photography relates to the counseling process have not been well delineated. The existing literature on phototherapy is reviewed…

  14. Working Alliance as a Mediator and Moderator between Expectations for Counseling Success and Counseling Outcome among Korean Clients

    Science.gov (United States)

    Yoo, Sung-Kyung; Hong, Sehee; Sohn, Nanhee; O'Brien, Karen M.

    2014-01-01

    The study examined client's perceptions of working alliance as a mediator and moderator between client expectations of counseling success and counseling outcome. Participants were 284 adult clients in counseling in university or community counseling centers or private practices in South Korea. Level of functioning at the start of counseling was…

  15. Alcoholics Anonymous

    Science.gov (United States)

    ... Arab Emirates United Kingdom United States Uruguay Venezuela Virgin Islands Zimbabwe INFORMATION ABOUT A.A. What Is ... Young People's Animation Video On the Beach A Group of People Just Like Me Full-Length Videos ...

  16. Applying quranic contemplation in counseling

    Directory of Open Access Journals (Sweden)

    Daris Tamin

    2016-12-01

    Full Text Available The intent of this research project was to explore the use of Quranic contemplation practices in counseling. In Islamic terminology that mean Quranic contemplation known as Tadabbur Al-Quran. Referring to this objective, this research is on the continuum between basic research and applied research. The research method that has been applied mix method beetwen quantitative and qualitative approaches. Integrating the two methods were considered appropriate for pragmatism paradigm adopted in this research. Based on the results of the research found that: Quranic Contemplation in Counseling that applicable on four general phases, namely: Exploration, Reading Scripture, Developing, and Supplication. In particular, at each session consists of seven steps, namely: (1 build engagement counselee to open his/her heart to accept the Quran as a heart medicine, the instructions for the peace of mind and happiness in life; (2 exposing the problems of the counselee; (3 identify the norms adopted counselee; (4 guiding the counselee for contemplations with Quran in the order: recited, guiding understand the meaning of the verse, raised the focus on words related to the problem, the main message conveyed paragraph, reflecting the message of verses in everyday life; and expand the discussion; (5 made a commitment to change the behavior of current and future; (6 invited to join in the spiritual community; and (7 guided prayer.

  17. Active targeted HIV testing and linkage to care among men who have sex with men attending a gay sauna in Thailand.

    Science.gov (United States)

    Khawcharoenporn, Thana; Apisarnthanarak, Anucha; Phanuphak, Nittaya

    2017-03-01

    Existing data on the feasibility of human immunodeficiency virus (HIV) testing and counseling (HTC) and linkage to care among men who have sex with men (MSM) in hotspots are currently limited. A prospective study on active targeted HTC and linkage to care among MSM (≥18 years old) was conducted at a gay sauna in Thailand from November 2013 to October 2015. HIV risks and risk perception were evaluated through an anonymous survey. HIV testing with result notification and care appointment arrangement were provided on-site. Of the 358 participants; median age was 30 years; 206/358(58%) were at high risk for HIV acquisition; 148/358(41%) accepted HTC, all of whom either had prior negative HIV tests [98/148 (66%)] or had not known their HIV status [50/148 (34%)]. The three most common reasons for declining HTC were prior HIV testing within 6 months (48%), not ready (19%) and perceiving self as no risk (11%). Of the 262 moderate- and high-risk participants, 172 (66%) had false perception of low HIV risk which was significantly associated with declining HTC. Among the 148 participants undergoing HTC, 25 (17%) were HIV-infected. Having false perception of low risk (P = 0.004) and age antiretroviral therapy. The active targeted HTC and facilitating care establishment was feasible among MSM attending the gay sauna but required strategies to improve accuracy of HIV-risk perception and linkage to care.

  18. The Knowledge, Attitude and Behavior of HIV/AIDS Patients’ Family toward Their Patients before and after Counseling

    Directory of Open Access Journals (Sweden)

    Behnam Honarvar

    2010-12-01

    Full Text Available Background: Acquired immunodeficiency may impose considerableconsequences on patients’ family behaviors towardthem. The objective of the present study was to investigatewhether a counseling program at Behavioral Counseling Centerin the city of Shiraz, Iran could change the attitude, knowledgeand behavior of patients' family members.Methods: 125 HIV/AIDS patients’ family members were interviewed,using a valid and reliable questionnaire before andafter performing counseling sessions at Behavioral CounselingCenter. The findings were analyzed using nonparametric tests.Results: The age of the participants was 40±13 years. Sixty fivepercent were female, 63% married and 79% educated. Forty fourpercent of participants had spousal relationships with their patients.Their knowledge about the main routes of HIV transmissionwere 9.76 ± 2.59 and10.64±0.88 before and after counseling,respectively (P=0.028. Supportive behaviors of families towardtheir patients reached to 79% after counseling compared with 44% before that (P=0.004. Belief to isolate the patients and thepractice of this approach at home dropped from 71% to 15% andfrom 29% to 7% after counseling, respectively (P0.05.Conclusion: Ongoing counseling for HIV/AIDS patients’ familiesat Behavioral Counseling Center of Shiraz did advance theirknowledge about AIDS and improved their attitude and behaviortoward their patients However, the counseling program didnot show remarkable success in some aspects such as the removalof fear about HIV spread in the family or the change ofthe patients’ wives attitude to have protected sex with their HIVinfected husbands.Iran J Med Sci 2010; 35(4: 287-292.

  19. Correlates of sexual risk behaviors among young Black MSM: implications for clinic-based counseling programs

    Science.gov (United States)

    Crosby, Richard A.; Mena, Leandro; Ricks, JaNelle

    2018-01-01

    This study applied an 8-item index of recent sexual risk behaviors to young Black men who have sex with men (YBMSM) and evaluated the distribution for normality. The distribution was tested for associations with possible antecedents of sexual risk. YBMSM (N=600), ages 16–29 years, were recruited from an STI clinic, located in the Southern United States. Men completed an extensive audio-computer assisted self-interview. Thirteen possible antecedents of sexual risk, as assessed by the index, were selected for analyses. The 8-item index formed a normal distribution with a mean of 4.77 (sd=1.77). In adjusted analyses, not having completed education beyond high school was associated with less risk, as was having sex with females. Conversely, meeting sex partners online was associated with greater risk, as was reporting that sex partners were drunk during sex. The obtained normal distribution of sexual risk behaviors suggests a corresponding need to “target and tailor” clinic-based counseling and prevention services for YBMSM. Avoiding sex when partners are intoxicated may be an especially valuable goal of counseling sessions. PMID:27875903

  20. Reducing Barriers to Sex Education for Adults with Mental Retardation.

    Science.gov (United States)

    Huntley, Cristy F.; Benner, Susan M.

    1993-01-01

    Opinions of professionals from 16 agencies were obtained to identify techniques that agencies serving adults or adolescents with mental retardation could utilize to provide systematic sex education and counseling. Recommendations are offered in five areas: self-advocacy and self-determination, individual design, staff training and support,…

  1. Smoking cessation counseling in Qatar: community pharmacists' attitudes, role perceptions and practices.

    Science.gov (United States)

    El Hajj, Maguy Saffouh; Al Nakeeb, Reem Raad; Al-Qudah, Raja'a Ali

    2012-08-01

    Smoking is a major public health problem in Qatar. The potential for community pharmacists to offer smoking cessation counseling in this country can be high. To determine the current smoking cessation practices of community pharmacists in Qatar, to examine their attitudes about tobacco use and smoking cessation, to evaluate their perceptions about performing professional roles with respect to smoking cessation and to assess their perceived barriers for smoking cessation counseling in the pharmacy setting in Qatar. Community pharmacies in Qatar. The objectives were addressed in a cross sectional survey of community pharmacists in Qatar from June 2010 to October 2010. A phone call was made to all community pharmacists in Qatar (318 pharmacists) inviting them to participate. Consenting pharmacists anonymously completed the survey either online or as paper using fax. Data was analyzed using Statistical Package of Social Sciences (SPSS®) Version 18. Qatar community pharmacists' smoking cessation practices, their attitudes toward tobacco use, smoking cessation and smoking cessation counseling and their perceived barriers for smoking cessation counseling. Over 5 months, we collected 127 surveys (40 % response rate). Only 21 % of respondents reported that they always or most of the time asked their patients if they smoke. When the patients' smoking status was identified, advising quitting and assessing readiness to quit were always or most of the time performed by 66 and 52 % of respondents respectively. Only 15 % always or most of the time arranged follow-up with smokers and 22 % always or most of the time made smoking cessation referrals. Most respondents (>80 %) agreed that smoking could cause adverse health effects and that smoking cessation could decrease the risk of these effects. In addition, the majority (>80 %) believed that smoking cessation counseling was an important activity and was an efficient use of their time. The top two perceived barriers for smoking

  2. Sex and Relationships Education in Schools: The Views and Experiences of Young People

    Science.gov (United States)

    Selwyn, Neil; Powell, Eryl

    2007-01-01

    Purpose: The purpose of the paper is to investigate how young people are using school-based sources of sex and relationships education (SRE) to obtain information and advice. Design/methodology/approach: The paper shows how anonymous self-completion questionnaires were administered to young people aged between 12 and 19 years in three secondary…

  3. Use of the Encouragement Process in Adlerian Counseling

    Science.gov (United States)

    Dinkmeyer, Don C.

    1972-01-01

    Encouragement in all facets of the counseling interview is a critical ingredient in the counseling process. This article sets forth the theory and specific applications of the encouragement process in counseling, as viewed in the socio-teleological model. (Author)

  4. Restating a Client-Centered Approach to Career Counseling.

    Science.gov (United States)

    Miller, Mark J.

    1988-01-01

    Asserts career counseling too often is associated with objective test scores and rational decision making. Reiterates the importance of considering the client's developing self-concept in career counseling. Provides sample client centered career counseling session. (Author/ABL)

  5. The Use of Dream Discussions in Counseling.

    Science.gov (United States)

    Miller, Mark J.; And Others

    1982-01-01

    Reviews the historical underpinnings of dream theories and suggests that discussions of dreams in counseling can aid in setting up and maintaining therapeutic contact with clients. A number of theoretical positions on the function of dreams are discussed. Specific dream counseling techniques are also delineated. (JAC)

  6. Three Dimensions of a Counseling Relationship.

    Science.gov (United States)

    Nystul, Michael S.

    1979-01-01

    Attempts to adjust the counseling relationship to accommodate the actual or emerging needs of the client can become a frustrating experience for the counselor. This article attempts to provide some guidelines by describing the client's characteristics and the counselor's role within three dimensions of a counseling relationship. (Author)

  7. Mindfulness-Based Interventions in Counseling

    Science.gov (United States)

    Brown, Amanda P.; Marquis, Andre; Guiffrida, Douglas A.

    2013-01-01

    Mindfulness is a relatively new construct in counseling that is rapidly gaining interest as it is applied to people struggling with a myriad of problems. Research has consistently demonstrated that counseling interventions using mindfulness improve well-being and reduce psychopathology. This article provides a detailed definition of mindfulness,…

  8. Qualitative Research in Counseling Psychology: Conceptual Foundations

    Science.gov (United States)

    Morrow, Susan L.

    2007-01-01

    Beginning with calls for methodological diversity in counseling psychology, this article addresses the history and current state of qualitative research in counseling psychology. It identifies the historical and disciplinary origins as well as basic assumptions and underpinnings of qualitative research in general, as well as within counseling…

  9. Narrative Counseling for Professional School Counselors

    Science.gov (United States)

    Nafziger, Jacinta; DeKruyf, Lorraine

    2013-01-01

    This article introduces narrative counseling concepts and techniques for professional school counselors. The authors provide a case study of narrative school counseling with an elementary student struggling with selective mutism. Examples also demonstrate how a narrative approach could be used at elementary, middle, and high school levels within…

  10. Venezuelan Counseling: Advancement and Current Challenges

    Science.gov (United States)

    Vera, George Davy

    2011-01-01

    In the worldwide community it is not well known that counseling and guidance professional practices have a long tradition in Venezuela. Therefore, this contribution's main purpose is to inform the international audience about past and contemporary counseling in Venezuela. Geographic, demographic, and cultural facts about Venezuela are provided.…

  11. Online Counselling: Learning from Writing Therapy.

    Science.gov (United States)

    Wright, Jeannie

    2002-01-01

    This article aims to extend an earlier review of some of the research into writing therapy and to indicate how it could be applied to online counseling. It also refers to some of the literature on online counseling, which, together with the writing therapy research, informed the decision to offer an online service to staff in a university setting.…

  12. College and Career Counseling Training Initiative

    Science.gov (United States)

    Southern Regional Education Board (SREB), 2014

    2014-01-01

    The Southern Regional Education Board's (SREB) College and Career Counseling Training Initiative works to increase the knowledge and skills of counselors who advise students on their postsecondary aspirations. Membership in the initiative provides access to Strategies in College and Career Counseling, a series of online training modules that can…

  13. Career Counseling and Occupational Preferences Among ...

    African Journals Online (AJOL)

    Career Counseling and Occupational Preferences Among Secondary School Students in Cross River State, Nigeria. ... Annals of Modern Education ... senatorial district of Cross River State, Nigeria to investigate the implication of career counseling on the occupational preferences of senior secondary school students.

  14. Counselling strategies for students learning and career ...

    African Journals Online (AJOL)

    The aim of this paper was to identify counselling strategies applicable in classroom where teaching and learning take place. The concepts guidance and counselling were defined to show meaning and relevance towards promoting learning and career development of students in secondary school. This paper also ...

  15. Workplace Counselling: Implications For Enhanced Productivity ...

    African Journals Online (AJOL)

    It further presents a model of workplace counseling and concludes that increase in work related trauma and stress, accidents at the workplace, harassment and bullying, absenteeism, low productivity/poor performance and labour turnover will be nipped in the bud if counseling service is provided at the workplace.

  16. A Case for Standards of Counseling Practice.

    Science.gov (United States)

    Anderson, Donald

    1992-01-01

    A mature counseling profession has entered the decade of the 1990s. Several factors including professionalism, accountability, health care consumerism, credentialism, and public demands for quality mental health care indicate a need for more definitive statements on standards of practice in counseling. In response to this need, an eight-point…

  17. Counseling in Brazil: Past, Present, and Future

    Science.gov (United States)

    Hutz-Midgett, Aida; Hutz, Claudio Simon

    2012-01-01

    This article describes counseling in Brazil, which is rooted in career and vocational guidance. Although considered a distinct discipline, counseling falls under the umbrella of psychology. The multicultural movement is gaining momentum in Brazil, and counselors are pioneers working with socioracial minority college students. This is an emerging…

  18. 33 CFR 1.07-40 - Counsel.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Counsel. 1.07-40 Section 1.07-40 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL GENERAL PROVISIONS Enforcement; Civil and Criminal Penalty Proceedings § 1.07-40 Counsel. A party has the right to be represented...

  19. Social Constructionism and Ethics: Implications for Counseling

    Science.gov (United States)

    Guterman, Jeffrey T.; Rudes, James

    2008-01-01

    Social constructionism is set forth as an epistemological framework from which to establish an ethical base for the field of counseling. The development of the social constructionist movement in counseling is described. Implications of a social constructionist position are considered in relation to ethics. A case example is provided to illustrate…

  20. Counseling Psychology in the Justice System.

    Science.gov (United States)

    Binder, Arnold; Binder, Virginia L.

    1983-01-01

    Presents an overview of pscyhological counseling for offenders. The 12 articles of this special issue deal with counseling before trial, in prison, and after release and also crisis intervention for police officers. Other topics include the juvenile justice system, juvenile diversion, ethics, and the economics of service delivery. (JAC)

  1. Workplace Counselling in Nigeria: Problems and Prospects ...

    African Journals Online (AJOL)

    Issues discussed included conflict of values, counsellor competency problem, workplace counselling as a victimization tool, management of client information, workplace counselling as an excuse or avoidance route, making workplaces mental-health friendly, display of care, preventive mechanism, a risk management tool, ...

  2. Counseling, Artificial Intelligence, and Expert Systems.

    Science.gov (United States)

    Illovsky, Michael E.

    1994-01-01

    Considers the use of artificial intelligence and expert systems in counseling. Limitations are explored; candidates for counseling versus those for expert systems are discussed; programming considerations are reviewed; and techniques for dealing with rational, nonrational, and irrational thoughts and feelings are described. (Contains 46…

  3. Cross-Cultural Contact in Counseling Training.

    Science.gov (United States)

    Diaz-Lazaro, Carlos M.; Cohen, B. Beth

    2001-01-01

    Reports on the importance of cross-cultural contact in the development of multicultural counseling competencies (MCCs). Results reveal that the greater the prior cross-cultural life experience, the higher were students' MCCs measured at the beginning of a multicultural counseling course. MCCs measured at the end of the course were significantly…

  4. Legal Counsel | IDRC - International Development Research Centre

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Legal Counsel assists the Corporate Secretary and General Counsel in advising, and providing support to, Centre management and the Board of Governors on ... This involves providing strategic and tactical advice to, and working as an integral member of, IDRC negotiating teams on particular transactions towards:.

  5. Gestalt Therapy Interventions for Group Counseling

    Science.gov (United States)

    Passons, William R.

    1972-01-01

    The author offers a brief introduction to some of the basic tenets of Gestalt therapy, noting goals that are similar to those in counseling theories. He also suggests several interventions from Gestalt therapy to be considered for group counseling and discusses their applications. (Author)

  6. Counselling and Career Planning: Symposium V A.

    Science.gov (United States)

    Awang, Amir; And Others

    Focusing generally on counseling and career planning, this symposium provides (1) a review and critique of guidance and counseling in Malaysian schools, by Amir Awang and Latiff Mirasa; (2) a discussion of the needs of Malaysian youth, by Mohd. Yunus Mohd. Noor; and (3) an abstract of the findings of a study of some aspects of student development…

  7. Relative Influence of Professional Counseling Journals

    Science.gov (United States)

    Fernando, Delini M.; Barrio Minton, Casey A.

    2011-01-01

    The authors used social network analysis of citation data to study the flow of information and relative influence of 17 professional counseling journals. Although the "Journal of Counseling & Development" ranked very highly in all measures of journal influence, several division journals emerged as key players in the flow of information within the…

  8. Formal and Applied Counseling in Israel

    Science.gov (United States)

    Israelashvili, Moshe; Wegman-Rozi, Orit

    2012-01-01

    Living in Israel is intensive and demanding but also meaningful and exciting. This article addresses the gap between the narrowly defined formal status of counseling in Israel and the widespread occurrence of counseling in various settings. It is argued that several recent changes, especially in the definition of treatment, along with the…

  9. Critical Counseling Behavior in Rehabilitation Settings.

    Science.gov (United States)

    Jaques, Marceline E.

    This study investigates rehabilitation counseling to determine critical job requirements, training needs, and differences in counselor perception of critical incidents as a function of academic preparation. A questionnaire requesting one effective and one ineffective counseling incident was distributed to 404 counselors and supervisors from…

  10. Genetic counseling and testing for gynecological cancers ...

    African Journals Online (AJOL)

    undergraduates of universities in Ibadan to genetic counseling and testing (GCT) for ... questionnaire, information on their understanding of GCT, perception of implications, and ... by genetic counseling from suitably trained health-care providers and genetic testing of selected high-risk individuals ..... Multiple sexual partners.

  11. The Ethics of Prayer in Counseling

    Science.gov (United States)

    Weld, Chet; Eriksen, Karen

    2007-01-01

    Spirituality has become increasingly important in counseling, with prayer being the spiritual intervention of choice for Christian counselors. The controversial nature of including prayer in counseling requires careful consideration of ethical issues. This article addresses the intersection of spiritual interventions, particularly prayer, with…

  12. Artificial Intelligence, Counseling, and Cognitive Psychology.

    Science.gov (United States)

    Brack, Greg; And Others

    With the exception of a few key writers, counselors largely ignore the benefits that Artificial Intelligence (AI) and Cognitive Psychology (CP) can bring to counseling. It is demonstrated that AI and CP can be integrated into the counseling literature. How AI and CP can offer new perspectives on information processing, cognition, and helping is…

  13. Sex. Dev.

    OpenAIRE

    Jakubiczka, S.; Schröder, C.; Ullmann, R.; Volleth, M.; Ledig, S.; Gilberg, E.; Kroisel, P.; P. Wieacker, P.

    2010-01-01

    Campomelic dysplasia (MIM 114290) is a severe malformation syndrome frequently accompanied by male-to-female sex reversal. Causative are mutations within the SOX9 gene on 17q24.3 as well as chromosomal aberrations (translocations, inversions or deletions) in the vicinity of SOX9 . Here, we report on a patient with muscular hypotonia, craniofacial dysmorphism, cleft palate, brachydactyly, malformations of thoracic spine, and gonadal dysgenesis with female external genitalia and müllerian duct ...

  14. Combating human trafficking in the sex trade: can sex workers do it better?

    Science.gov (United States)

    Jana, Smarajit; Dey, Bharati; Reza-Paul, Sushena; Steen, Richard

    2014-12-01

    The dominant anti-trafficking paradigm conflates trafficking and sex work, denying evidence that most sex workers choose their profession and justifying police actions that disrupt communities, drive sex workers underground and increase vulnerability. We review an alternative response to combating human trafficking and child prostitution in the sex trade, the self-regulatory board (SRB) developed by Durbar Mahila Samanwaya Committee (DMSC, Sonagachi). DMSC-led interventions to remove minors and unwilling women from sex work account for over 80% of successful 'rescues' reported in West Bengal. From 2009 through 2011, 2195 women and girls were screened by SRBs: 170 (7.7%) minors and 45 (2.1%) unwilling adult women were assisted and followed up. The remaining 90.2% received counselling, health care and the option to join savings schemes and other community programmes designed to reduce sex worker vulnerability. Between 1992 and 2011 the proportion of minors in sex work in Sonagachi declined from 25 to 2%. With its universal surveillance of sex workers entering the profession, attention to rapid and confidential intervention and case management, and primary prevention of trafficking-including microcredit and educational programmes for children of sex workers-the SRB approach stands as a new model of success in anti-trafficking work. © The Author 2013. Published by Oxford University Press on behalf of Faculty of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  15. Trauma Symptoms, Sexual Behaviors, and Substance Abuse: Correlates of Childhood Sexual Abuse and HIV Risks among Men Who Have Sex with Men

    Science.gov (United States)

    Kalichman, Seth C.; Gore-Felton, Cheryl; Benotsch, Eric; Cage, Marjorie; Rompa, David

    2004-01-01

    Childhood sexual abuse is associated with high-risk sexual behavior in men who have sex with men. This study examined psychological and behavioral correlates of HIV risk behavior associated with childhood sexual abuse in a sample of men who have sex with men. Men attending a large gay pride event (N = 647) completed anonymous surveys that assessed…

  16. Particularities and tools of counseling process in further professional education

    OpenAIRE

    Shershun, Kristina

    2016-01-01

    Following bachelor's thesis is devoted to methodological aspects of the career counseling. It deals with the terminological discussion of counseling-related concepts and its areas of application in the context of adult education. The thesis is focused on a counseling process, structure, tools and specifics in career counseling. It provides an analysis of wide range of counseling tools from basic counseling techniques to specific digital and complex means. Practical implementation of the tools...

  17. [Effectiveness of integrative psychotherapeutic counseling for students].

    Science.gov (United States)

    Sperth, Michael; Hofmann, Frank-Hagen; Holm-Hadulla, Rainer Mathias

    2014-06-01

    In this first effectiveness study of psychotherapeutic counseling for students in German-speaking countries, the effectiveness of an integrative model of counseling was evaluated based on a sample of 151 clients. Effectiveness of integrative counseling according to the ABCDE-model was found to be high in comparison to other international studies in this area. Pre-post differences on measures of mental distress and satisfaction were significant and effect sizes were mostly moderate to high. A high percentage of clients improved statistically and clinically significant. Counselors' expert rating and diagnostics according to ICD-10 that have been included in contrast to previous effectiveness studies showed that clients suitable for the counseling setting get treated in the counseling center while more severely disturbed clients in terms of psychopathology or diagnosis get referred to outpatient treatment, drop out or object to provide post-data. © Georg Thieme Verlag KG Stuttgart · New York.

  18. Counselling adults who experience a first seizure.

    Science.gov (United States)

    Legg, Karen T; Newton, Mark

    2017-07-01

    A first seizure can result in significant uncertainty, fear and apprehension. One of the key roles of the clinician in the setting of first seizure is to provide accurate, timely information and counselling. We review the numerous components to be considered when counselling an adult patient after a first seizure. We provide a framework and manner to provide that counselling. We focus on an individualized approach and provide recommendations and information on issues of diagnosis, etiology, prognosis, the role and importance of medical testing, lifestyle considerations, driving, medication and other key counselling considerations. Accurate, timely counselling can allay fears and anxieties, remove misconceptions and reduce the risk for injury in seizure recurrence. Copyright © 2016 British Epilepsy Association. Published by Elsevier Ltd. All rights reserved.

  19. An Anonymous Mutual Authenticated Key Agreement Scheme for Wearable Sensors in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Chien-Ming Chen

    2018-07-01

    Full Text Available The advancement of Wireless Body Area Networks (WBAN have led to significant progress in medical and health care systems. However, such networks still suffer from major security and privacy threats, especially for the data collected in medical or health care applications. Lack of security and existence of anonymous communication in WBAN brings about the operation failure of these networks. Recently, Li et al. proposed a lightweight protocol for wearable sensors in wireless body area networks. In their paper, the authors claimed that the protocol may provide anonymous mutual authentication and resist against various types of attacks. This study shows that such a protocol is still vulnerable to three types of attacks, i.e., the offline identity guessing attack, the sensor node impersonation attack and the hub node spoofing attack. We then present a secure scheme that addresses these problems, and retains similar efficiency in wireless sensors nodes and mobile phones.

  20. Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Nikooghadam, Morteza

    2014-12-01

    Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.