WorldWideScience

Sample records for anonymous sex counselling

  1. Sex Bias in Counseling Materials

    Science.gov (United States)

    Harway, Michele

    1977-01-01

    This article reviews findings of bias in counseling materials and presents results of three original studies. Indications are that textbooks used by practitioners present the sexes in stereotypical fashion, and a greater proportion of college catalog context is devoted to men than to women. (Author)

  2. Research into the efficacy and cost-effectiveness of brief, free of charge and anonymous sex counselling to improve (mental health in youth: Design of a randomised controlled trial

    Directory of Open Access Journals (Sweden)

    Veen Evert

    2009-12-01

    Full Text Available Abstract Background The capacity to form romantic relationships and sexual health of adolescents in the Netherlands are compromised by several factors, including young age of first intercourse and adolescent depression. Several thresholds like own expenses, trust and embarrassment prevent adolescents to seek help for their sexual problems. To overcome these thresholds, brief sex counselling has been developed. It has been used since 2006 within the Rotterdam-Rijnmond Public Health Service, but there is lack of information about the (cost- effectiveness. In the current study we will evaluate the (cost- effectiveness of brief sex counselling for sexual problems in adolescents and young adults between 18 and 25 years of age. Methods In a randomised controlled trial we will compare (1 brief sex counselling with (2 intensive sexological treatment, and (3 delayed treatment (waiting list. Embedded in this RCT will be a trial-based economic evaluation, looking at the cost-effectiveness and cost-utility of brief sex counselling versus the two other interventions. Four hundred fifty adolescents (aged 18-25 with sexual problems will be recruited among the persons who visit the Public Health Service (PHS and through various websites. After a screening procedure, eligible participants will be randomly allocated to one of the three intervention groups. Primary outcome measure of the clinical evaluation is the severity of sexual problems. Other outcomes include psychological distress, especially depression. The economic evaluation will be performed from a societal perspective. Costs will be assessed continuously by a retrospective questionnaire covering the last 3 month. All outcome assessments (including those for the economic evaluation will take place via the internet at baseline, and at 3, 6, 9, and 12 months after baseline. Discussion The proposed research project will be the first study to provide preliminary data about the effect and cost

  3. Disparities in safe sex counseling & behavior among individuals with substance dependence: a cross-sectional study

    Directory of Open Access Journals (Sweden)

    D’Amore Meredith M

    2012-12-01

    Full Text Available Abstract Background Despite the vast literature examining disparities in medical care, little is known about racial/ethnic and mental health disparities in sexual health care. The objective of this study was to assess disparities in safe sex counseling and resultant behavior among a patient population at risk of negative sexual health outcomes. Methods We conducted a cross-sectional analysis among a sample of substance dependent men and women in a metropolitan area in the United States. Multiple logistic regression models were used to explore the relationship between race/ethnicity (non-Hispanic black; Hispanic; non-Hispanic white and three indicators of mental illness (moderately severe to severe depression; any manic episodes; ≥3 psychotic symptoms with two self-reported outcomes: receipt of safe sex counseling from a primary care physician and having practiced safer sex because of counseling. Results Among 275 substance-dependent adults, approximately 71% (195/275 reported ever being counseled by their regular doctor about safe sex. Among these 195 subjects, 76% (149/195 reported practicing safer sex because of this advice. Blacks (adjusted odds ratio (AOR: 2.71; 95% confidence interval (CI: 1.36,5.42 and those reporting manic episodes (AOR: 2.41; 95% CI: 1.26,4.60 had higher odds of safe sex counseling. Neither race/ethnicity nor any indicator of mental illness was significantly associated with practicing safer sex because of counseling. Conclusions Those with past manic episodes reported more safe sex counseling, which is appropriate given that hypersexuality is a known symptom of mania. Black patients reported more safe sex counseling than white patients, despite controlling for sexual risk. One potential explanation is that counseling was conducted based on assumptions about sexual risk behaviors and patient race. There were no significant disparities in self-reported safer sex practices because of counseling, suggesting that increased

  4. The Effects of Sex Education on Psychological Counselling Students in Turkey

    Science.gov (United States)

    Çuhadaroglu, Alper

    2017-01-01

    Sex education is not included in Turkey's national curriculum and is rarely referenced in school and university curricula. This is even true for those undertaking training in psychological counselling where the need may be great. Only a very few university schools of education offer an elective sex education course. A group of 64 guidance and…

  5. Client Discourses on the Process of Seeking Same-Sex Couple Counselling

    Science.gov (United States)

    Grove, Jan; Peel, Elizabeth; Owen-Pugh, Valerie

    2013-01-01

    How same-sex couples manage the process of seeking help for their relationships is an under-researched area. Twelve semi-structured interviews were conducted with 16 people who had engaged in same-sex couple counselling, and were analysed using discourse analysis. The ways in which the couples positioned themselves as part of a "minority…

  6. Marriage Equality for Same-Sex Couples: Counseling Psychologists as Social Change Agents

    Science.gov (United States)

    Rostosky, Sharon S.; Riggle, Ellen D. B.

    2011-01-01

    The denial of civil marriage rights is a specific example of minority stress that can negatively affect the psychosocial well-being of self-identified lesbian, gay, bisexual, transgender, and queer (LGBTQ) individuals in same-sex partnerships, their families, and their allies. Counseling psychologists have an important role in addressing the…

  7. Anonymous Gossiping

    CERN Document Server

    Datta, Anwitaman

    2010-01-01

    In this paper we introduce a novel gossiping primitive to support privacy preserving data analytics (PPDA). In contrast to existing computational PPDA primitives such as secure multiparty computation and data randomization based approaches, the proposed primitive `anonymous gossiping' is a communication primitive for privacy preserving personalized information aggregation complementing such traditional computational analytics. We realize this novel primitive by composing existing gossiping mechanisms for peer sampling & information aggregation and onion routing technique for establishing anonymous communication. This is more an `ideas' paper, rather than providing concrete and quantified results.

  8. Clients of sex workers in Switzerland: it makes sense to counsel and propose rapid test for HIV on the street, a preliminary report

    Directory of Open Access Journals (Sweden)

    Ansermet-Pagot Anne

    2010-03-01

    Full Text Available Abstract Background Clients of street sex workers may be at higher risk for HIV infection than the general population. Furthermore, there is a lack of knowledge regarding HIV testing of clients of sex workers in developed countries. Method This pilot study assessed the feasibility and acceptance of rapid HIV testing by the clients of street-based sex workers in Lausanne, Switzerland. For 5 evenings, clients in cars were stopped by trained field staff for face-to-face interviews focusing on sex-related HIV risk behaviors and HIV testing history. The clients were then offered a free anonymous rapid HIV test in a bus parked nearby. Rapid HIV testing and counselling were performed by experienced nurse practitioners. Clients with reactive tests were offered confirmatory testing, medical evaluation, and care in our HIV clinic. Result We intercepted 144 men, 112 (77.8% agreed to be interviewed. Among them, 50 (46.6% had never been tested for HIV. A total of 31 (27.7% rapid HIV tests were performed, 16 (51.6% in clients who had not previously been tested. None were reactive. Initially, 19 (16.9% additional clients agreed to HIV testing but later declined due to the 40-minute queue for testing. Conclusion This pilot study showed that rapid HIV testing in the red light district of Lausanne was feasible, and that the clients of sex workers accepted testing at an unexpectedly high rate. This setting seems particularly appropriate for targeted HIV screening, since more than 40% of the clients had not previously been tested for HIV even though they engaged in sex-related HIV risk behaviour.

  9. Anonymous Gossiping

    OpenAIRE

    Datta, Anwitaman

    2010-01-01

    In this paper we introduce a novel gossiping primitive to support privacy preserving data analytics (PPDA). In contrast to existing computational PPDA primitives such as secure multiparty computation and data randomization based approaches, the proposed primitive `anonymous gossiping' is a communication primitive for privacy preserving personalized information aggregation complementing such traditional computational analytics. We realize this novel primitive by composing existing gossiping me...

  10. Counseling parents before prenatal diagnosis: do we need to say more about the sex chromosome aneuploidies?

    Science.gov (United States)

    Lalatta, Faustina; Tint, G Stephen

    2013-11-01

    Sex chromosome trisomies (SCT), an extra X chromosome in females (triple X, XXX), males with an extra X chromosome (Klinefelter syndrome, XXY) or an extra Y chromosome (XYY) occur because of errors during meiosis and are relatively frequent in humans. Their identification has never been the goal of prenatal diagnosis (PD) but they almost never escape detection by any of the methods commonly in use. Despite recommendations and guide-lines which emphasize the importance of structured counseling before and after PD, most women remain unaware that testing for serious genetic abnormalities is more likely to uncover these trisomies. With the increasing use of PD more and more prospective parents receive a diagnosis of sex chromosome trisomies and are faced with the dilemma of whether to terminate the pregnancy or to carry it to term. Despite the dramatic and emotionally devastating consequences of having to make such a decision, they have little opportunity to consider in advance the possible outcomes of such a pregnancy and, rather than relying on their own feelings and judgements, are forced to depend on the advice of counseling professionals who may or may not themselves be fully aware of what having an extra sex chromosome can mean to the development of a child. We address here the principles of reproductive autonomy together with an analysis of the major issues that ought to be discussed with the parents before a PD is carried out in order to minimize detrimental effects caused by this unexpected finding.

  11. Against anonymity.

    Science.gov (United States)

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile.

  12. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  13. Group Anonymity

    CERN Document Server

    Chertov, Oleg; 10.1007/978-3-642-14058-7_61

    2010-01-01

    In recent years the amount of digital data in the world has risen immensely. But, the more information exists, the greater is the possibility of its unwanted disclosure. Thus, the data privacy protection has become a pressing problem of the present time. The task of individual privacy-preserving is being thoroughly studied nowadays. At the same time, the problem of statistical disclosure control for collective (or group) data is still open. In this paper we propose an effective and relatively simple (wavelet-based) way to provide group anonymity in collective data. We also provide a real-life example to illustrate the method.

  14. Anonymity in voting revisited

    NARCIS (Netherlands)

    Jonker, Hugo; Pieters, Wolter; Chaum, David; Jakobsson, Markus; Rivest, Ronald L.; Ryan, Peter Y.A.; Benaloh, Josh; Kutylowski, Miroslaw; Adida, Ben

    2010-01-01

    According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in

  15. An overview of anonymity and anonymous communication

    NARCIS (Netherlands)

    Koot, M.

    2008-01-01

    Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of

  16. Anonymity in Voting Revisited

    Science.gov (United States)

    Jonker, Hugo; Pieters, Wolter

    According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in e-voting. First, we identify and categorise the types of attack that can be a threat to anonymity of the voter, including different types of vote buying and coercion. This analysis leads to a categorisation of anonymity in voting in terms of a) the strength of the anonymity achieved and b) the extent of interaction between voter and attacker. Some of the combinations, including weak and strong receipt-freeness, are formalised in epistemic logic.

  17. Anonymizing Unstructured Data

    CERN Document Server

    Motwani, Rajeev

    2008-01-01

    In this paper we consider the problem of anonymizing datasets in which each individual is associated with a set of items that constitute private information about the individual. Illustrative datasets include market-basket datasets and search engine query logs. We formalize the notion of k-anonymity for set-valued data as a variant of the k-anonymity model for traditional relational datasets. We define an optimization problem that arises from this definition of anonymity and provide a constant factor approximation algorithm for the same. We evaluate our algorithms on the America Online query log dataset.

  18. Anonymization of Court Orders

    DEFF Research Database (Denmark)

    Povlsen, Claus; Jongejan, Bart; Hansen, Dorte Haltrup;

    We describe an anonymization tool that was commissioned by and specified together with Schultz, a publishing company specialized in Danish law related publications. Unavailability of training data and the need to guarantee compliance with pre-existing anonymization guidelines forced us to implement...

  19. Using Meditation in Addiction Counseling

    Science.gov (United States)

    Young, Mark E.; DeLorenzi, Leigh de Armas; Cunningham, Laura

    2011-01-01

    Meditation has been studied as a way of reducing stress in counseling clients since the 1960s. Alcoholics Anonymous, Narcotics Anonymous, and new wave behavior therapies incorporate meditation techniques in their programs. This article identifies meditation's curative factors and limitations when using meditation in addiction settings.

  20. Counselling clients to follow 'the rules' of safe sex and ARV treatment

    DEFF Research Database (Denmark)

    Mubanda Rasmussen, Louise

    2013-01-01

    with counsellors. The paper illustrates how counsellors concentrate on giving general behavioural instructions, while clients tend to demonstrate their compliance to these ‘rules’ rather than sharing their more intimate thoughts. This is especially the case in the contested terrain of sexual and reproductive...... behaviour. To explore this phenomenon, the paper analyses a number of dynamics characterising HIV counselling in Uganda, including the pressures of the global bio-political project to ‘save lives’ with ART, the counsellors' working conditions in resource-constrained clinics, the professional authority...

  1. Willingness to use couples voluntary counseling and testing services among men who have sex with men in seven countries.

    Science.gov (United States)

    Stephenson, Rob; Chard, Anna; Finneran, Catherine; Sullivan, Patrick

    2014-02-01

    The willingness of male-male dyads to use couples voluntary HIV counseling and testing (CVCT) has not been previously investigated globally among men who have sex with men (MSM). Using online advertisements, data were collected from 3245 MSM in seven countries who were ≥ 18 years of age and had ≥1 male sex partner in the previous 12 months. The analysis examined associations between individual characteristics and willingness to utilize CVCT. The willingness to utilize CVCT was compellingly high, ranging from 79% in Australia and UK to 90% in Brazil. Older MSM and those who reported not knowing their sero-status reported lower odds of willingness to use CVCT. The relationship between being in a relationship and willingness to use CVCT varied across countries, perhaps reflecting varied local understandings of the nature and content of CVCT. Further work is required to examine willingness to use CVCT among a more heterogeneous population of MSM, and to examine how CVCT services are locally perceived in order to provide information vital for the development of locally appropriate messages to promote CVCT for MSM.

  2. Deniable Anonymous Group Authentication

    Science.gov (United States)

    2014-02-13

    electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24:84–88, February 1981. [16] D. Chaum. Blind signatures for...ASIACRYPT, 2004. [59] P. P. Tsang and V. K. Wei. Short linkable ring signatures for e- voting , e-cash and attestation. In ’05 ISPEC, 2005. [60] D. I...which we term anonymity, proportionality, forward anonymity, and deniability. Like ring signatures [50], DAGA allows a user to au- thenticate as an

  3. Suicidal ideation and sex differences in relation to 18 major psychiatric disorders in college and university students: anonymous web-based assessment.

    Science.gov (United States)

    Tupler, Larry A; Hong, Jennifer Y; Gibori, Ron; Blitchington, Timothy F; Krishnan, K Ranga R

    2015-04-01

    College/university students are at high risk for psychiatric disorder and suicide secondary to age, campus stressors, and social pressures. We therefore report frequencies of 18 Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision disorders and suicidal ideation (SI) acquired anonymously from a Web site receiving 113,181 visits from more than 1,500 predominantly US colleges/universities. Depression was foremost, followed by social phobia and eating disorders. Substance-related disorders were less frequent than expected. SI occurred in 47.1% of students, with women evidencing somewhat stronger findings than men. SI was more associated with substance, bipolar, and panic disorders than depression. Self-reported emotional volatility exceeded thoughts of self-harm for all disorders. The results support two subtypes of suicide risk: dysphoric premeditators and those primarily angry and/or impulsive. Clinicians and researchers should therefore consider suicide as an independent psychopathological phenomenon that includes emotional volatility as a risk factor and thoroughly evaluate psychiatric disorders potentially conferring greater suicidal propensity than depression.

  4. Anonymous Mobile Payment Solution

    Directory of Open Access Journals (Sweden)

    Alhaj Ali Jalila

    2015-09-01

    Full Text Available The evolution and increasing popularity of mobile handheld devices has led to the development of payment applications. The global acceptance of mobile payments is hindered by security and privacy concerns. One of the main problems evoked is the anonymity related with banking transactions. In this paper I propose a new secured architecture for mobile banking. Anonymity and privacy protection are the measures to be enhanced in order to satisfy people’s current needs. The banking platform must provide the highest level of security for messages exchanged between bank and the customer.

  5. Anonymous Quantum Communication

    Science.gov (United States)

    Brassard, Gilles; Broadbent, Anne; Fitzsimons, Joseph; Gambs, Sébastien; Tapp, Alain

    We introduce the first protocol for the anonymous transmission of a quantum state that is information-theoretically secure against an active adversary, without any assumption on the number of corrupt participants. The anonymity of the sender and receiver is perfectly preserved, and the privacy of the quantum state is protected except with exponentially small probability. Even though a single corrupt participant can cause the protocol to abort, the quantum state can only be destroyed with exponentially small probability: if the protocol succeeds, the state is transferred to the receiver and otherwise it remains in the hands of the sender (provided the receiver is honest).

  6. A Pilot Trial of a Sexual Health Counseling Intervention for HIV-Positive Gay and Bisexual Men Who Report Anal Sex without Condoms

    Science.gov (United States)

    Hart, Trevor A.; Stratton, Natalie; Coleman, Todd A.; Wilson, Holly A.; Simpson, Scott H.; Julien, Rick E.; Adam, Barry D.

    2016-01-01

    Background Even in the presence of promising biomedical treatment as prevention, HIV incidence among men who have sex with men has not always decreased. Counseling interventions, therefore, continue to play an important role in reducing HIV sexual transmission behaviors among gay and bisexual men and other men who have sex with men. The present study evaluated effects of a small-group counseling intervention on psychosocial outcomes and HIV sexual risk behavior. Method HIV-positive (HIV+) peer counselors administered seven 2-hour counseling sessions to groups of 5 to 8 HIV+ gay and bisexual men. The intervention employed information provision, motivational interviewing, and behavioral skills building to reduce sexual transmission risk behaviors. Results There was a significant reduction in condomless anal sex (CAS) with HIV-negative and unknown HIV-status partners, from 50.0% at baseline to 28.9% of the sample at 3-month follow-up. Findings were robust even when controlling for whether the participant had an undetectable viral load at baseline. Significant reductions were also found in the two secondary psychosocial outcomes, loneliness and sexual compulsivity. Conclusions The findings provide preliminary evidence that this intervention may offer an efficient way of concurrently reducing CAS and mental health problems, such as sexual compulsivity and loneliness, for HIV+ gay and bisexual men. Trial Registration ClinicalTrials.gov NCT02546271 PMID:27054341

  7. A Pilot Trial of a Sexual Health Counseling Intervention for HIV-Positive Gay and Bisexual Men Who Report Anal Sex without Condoms.

    Directory of Open Access Journals (Sweden)

    Trevor A Hart

    Full Text Available Even in the presence of promising biomedical treatment as prevention, HIV incidence among men who have sex with men has not always decreased. Counseling interventions, therefore, continue to play an important role in reducing HIV sexual transmission behaviors among gay and bisexual men and other men who have sex with men. The present study evaluated effects of a small-group counseling intervention on psychosocial outcomes and HIV sexual risk behavior.HIV-positive (HIV+ peer counselors administered seven 2-hour counseling sessions to groups of 5 to 8 HIV+ gay and bisexual men. The intervention employed information provision, motivational interviewing, and behavioral skills building to reduce sexual transmission risk behaviors.There was a significant reduction in condomless anal sex (CAS with HIV-negative and unknown HIV-status partners, from 50.0% at baseline to 28.9% of the sample at 3-month follow-up. Findings were robust even when controlling for whether the participant had an undetectable viral load at baseline. Significant reductions were also found in the two secondary psychosocial outcomes, loneliness and sexual compulsivity.The findings provide preliminary evidence that this intervention may offer an efficient way of concurrently reducing CAS and mental health problems, such as sexual compulsivity and loneliness, for HIV+ gay and bisexual men.ClinicalTrials.gov NCT02546271.

  8. Performance evaluation of various K- anonymity techniques

    Science.gov (United States)

    Maheshwarkar, Nidhi; Pathak, Kshitij; Chourey, Vivekanand

    2011-12-01

    Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked with the private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. This paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. This paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.

  9. 45 CFR 2555.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Activities Prohibited § 2555.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or guidance...

  10. 34 CFR 106.36 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling... Programs or Activities Prohibited § 106.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling...

  11. 32 CFR 196.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling... Programs or Activities Prohibited § 196.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling...

  12. 45 CFR 618.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Activities Prohibited § 618.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in the counseling or guidance...

  13. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  14. White Privilege and Multicultural Counseling Competence: The Influence of Field of Study, Sex, and Racial/Ethnic Exposure

    Science.gov (United States)

    Mindrup, Robert M.; Spray, Beverly J.; Lamberghini-West, Alicia

    2011-01-01

    This study explores the association between white privilege attitudes and multicultural counseling competencies among white European-American graduate students (N = 298) in clinical psychology and social work. Results revealed a significant positive association between white privilege attitudes and multicultural counseling competencies. Social…

  15. A randomized control trial of personalized cognitive counseling to reduce sexual risk among HIV-infected men who have sex with men.

    Science.gov (United States)

    Schwarcz, Sandra K; Chen, Yea-Hung; Murphy, Jessie L; Paul, Jay P; Skinta, Matthew D; Scheer, Susan; Vittinghoff, Eric; Dilley, James W

    2013-01-01

    The increased life expectancy and well-being of HIV-infected persons presents the need for effective prevention methods in this population. Personalized cognitive counseling (PCC) has been shown to reduce unprotected anal intercourse (UAI) with a partner of unknown or different serostatus among HIV-uninfected men who have sex with men (MSM). We adapted PCC for use among HIV-infected MSM and tested its efficacy against standard risk-reduction counseling in a randomized clinical trial in San Francisco. Between November 2006 and April 2010, a total of 374 HIV-infected MSM who reported UAI with two or more men of negative or unknown HIV serostatus in the previous 6 months were randomized to two sessions of PCC or standard counseling 6 months apart. The primary outcome was the number of episodes of UAI with a non-primary male partner of different or unknown serostatus in the past 90 days, measured at baseline, 6, and 12 months. Surveys assessed participant satisfaction with the counseling. The mean number of episodes of UAI at baseline did not differ between PCC and control groups (2.97 and 3.14, respectively; p=0.82). The mean number of UAI episodes declined in both groups at 6 months, declined further in the PCC group at 12 months, while increasing to baseline levels among controls; these differences were not statistically significant. Episode mean ratios were 0.76 (95% confidence interval [CI] 0.25-2.19, p=0.71) at 6 months and 0.48 (95% CI 0.12-1.84, p=0.34) at 12 months. Participants in both groups reported a high degree of satisfaction with the counseling. The findings from this randomized trial do not support the efficacy of a two-session PCC intervention at reducing UAI among HIV-infected MSM and indicate the continued need to identify and implement effective prevention methods in this population.

  16. The Metadata Anonymization Toolkit

    OpenAIRE

    2012-01-01

    This document summarizes the experience of Julien Voisin during the 2011 edition of the well-known \\emph{Google Summer of Code}. This project is a first step in the domain of metadata anonymization in Free Software. This article is articulated in three parts. First, a state of the art and a categorization of usual metadata, then the privacy policy is exposed/discussed in order to find the right balance between information lost and privacy enhancement. Finally, the specification of the Metadat...

  17. Reducing the risk of HIV transmission among men who have sex with men: A feasibility study of the motivational interviewing counseling method.

    Science.gov (United States)

    Chen, Jia; Li, Xianhong; Xiong, Yang; Fennie, Kristopher P; Wang, Honghong; Williams, Ann Bartley

    2016-09-01

    HIV prevalence among Chinese men who have sex with men has rapidly increased in recent years. In this randomized, controlled study, we tested the feasibility and efficacy of motivational interviewing to reduce high-risk sexual behaviors among this population in Changsha, China. Eighty men who have sex with men were randomly assigned to either the intervention group, in which participants received a three-session motivational interviewing intervention over 4 weeks, or the control group, in which participants received usual counseling from peer educators. High-risk behavior indicators and HIV knowledge level were evaluated at baseline and 3 months after the intervention. Motivational interviewing significantly improved consistent anal condom use. However, there was no significant change in consistent condom use for oral sex or in the number of sexual partners over time. HIV knowledge scores improved equally in both groups. This study demonstrated that an intervention using motivational interviewing is feasible and results in increased condom use during anal sex for Chinese men who have sex with men. However, further work must be done to increase the use of condoms during oral sexual encounters.

  18. 7 CFR 15a.36 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling... Education Programs and Activities Prohibited § 15a.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in...

  19. 49 CFR 25.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 25.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...

  20. 6 CFR 17.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 17.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...

  1. 10 CFR 1042.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials... on the Basis of Sex in Education Programs or Activities Prohibited § 1042.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...

  2. 22 CFR 146.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 146.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...

  3. 10 CFR 5.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials... in Education Programs or Activities Prohibited § 5.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis of sex in...

  4. 45 CFR 86.36 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 86.36 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...

  5. 22 CFR 229.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 229.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person...

  6. Mental health professionals' acceptance of online counseling

    OpenAIRE

    Lazuras, Lambros; Dokou, Anna

    2016-01-01

    The development of online counseling services has followed the advent on information and communication technologies. The present study assessed mental health professionals' perspectives of online counseling by using an extended version of the technology acceptance model. Participants completed anonymous structured questionnaires assessing technology acceptance-related variables, including perceived usefulness and ease of use, usage intentions, job relevance, social norms, attitudes, computer ...

  7. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  8. Anonymous Broadcast Messages

    Directory of Open Access Journals (Sweden)

    Dragan Lazic

    2013-01-01

    Full Text Available The Dining Cryptographer network (or DC-net is a privacy preserving communication protocol devised by David Chaum for anonymous message publication. A very attractive feature of DC-nets is the strength of its security, which is inherent in the protocol and is not dependent on other schemes, like encryption. Unfortunately the DC-net protocol has a level of complexity that causes it to suffer from exceptional communication overhead and implementation difficulty that precludes its use in many real-world use-cases. We have designed and created a DC-net implementation that uses a pure client-server model, which successfully avoids much of the complexity inherent in the DC-net protocol. We describe the theory of DC-nets and our pure client-server implementation, as well as the compromises that were made to reduce the protocol’s level of complexity. Discussion centers around the details of our implementation of DC-net.

  9. Probabilistic Anonymity and Admissible Schedulers

    CERN Document Server

    Garcia, Flavio D; Sokolova, Ana

    2007-01-01

    When studying safety properties of (formal) protocol models, it is customary to view the scheduler as an adversary: an entity trying to falsify the safety property. We show that in the context of security protocols, and in particular of anonymizing protocols, this gives the adversary too much power; for instance, the contents of encrypted messages and internal computations by the parties should be considered invisible to the adversary. We restrict the class of schedulers to a class of admissible schedulers which better model adversarial behaviour. These admissible schedulers base their decision solely on the past behaviour of the system that is visible to the adversary. Using this, we propose a definition of anonymity: for all admissible schedulers the identity of the users and the observations of the adversary are independent stochastic variables. We also develop a proof technique for typical cases that can be used to proof anonymity: a system is anonymous if it is possible to `exchange' the behaviour of two...

  10. COUNSELING PRACTICES.

    Science.gov (United States)

    WATERLOO, GLENN E.

    THE NEED FOR COUNSELING IS EMPHASIZED BY THE FACT THAT 875,000 CHILDREN IN THE UNITED STATES HAVE MENTAL AND PHYSICAL IMPEDIMENTS TO LEARNING. TYPICAL COUNSELING PRACTICES ARE PROBLEM-CENTERED COUNSELING, EXCLUSIVELY "VOCATIONAL" OR "EDUCATIONAL" COUNSELING WITH LITTLE CONCERN FOR THE WHOLE INDIVIDUAL, EXTREME DIRECTIVE OR NONDIRECTIVE COUNSELING,…

  11. The effects of early multiple-time PN counseling on newly HIV-diagnosed men who have sex with men in Taiwan.

    Science.gov (United States)

    Chiou, Piao-Yi; Lin, Li-Chan; Chen, Yi-Ming; Wu, Shiao-Chi; Lew-Ting, Chih-Yin; Yen, Han-Wen; Chuang, Ping

    2015-10-01

    Partner notification (PN) is an important method for controlling the AIDS epidemic worldwide. Here, we looked into the differences between two PN counseling modes for HIV (+) men who have sex with men in Taiwan. Using random assignment, we placed 42 of the 84 subjects into the experimental group where they received two sessions of PN counseling, while the control group (42) received only one session. All 84 subjects were single males with an average age of 28.06. The mean number of successful notified partner was 5.38 (SD = 3.44) in the experimental which was statistically significantly higher than 2.81 (SD = 1.62) in the control group (β = 0.650, p = 0.000). The notification success rate was 77.13 % in the experimental and 74.21 % in the control group (IRR 1.039, 95 % CI 0.83-1.30). In the experimental and control group, the average number of the partners accepted an HIV test was 1.86 (SD = 1.58) and 0.79 (SD = 0.66) (β = 0.601, p = 0.000), and 39.74 and 27.27 % of the tested partners were HIV positive (IRR 1.457, 95 % CI 0.69-3.06). The study results may be used to improve the policies and practices for PN and contact follow-up.

  12. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key k which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: { Introducing and formally dening...

  13. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key $k$ which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: - Introducing and formally...

  14. Movement Data Anonymity through Generalization

    Directory of Open Access Journals (Sweden)

    Anna Monreale

    2010-08-01

    Full Text Available Wireless networks and mobile devices, such as mobile phones and GPS receivers, sense and track the movements of people and vehicles, producing society-wide mobility databases. This is a challenging scenario for data analysis and mining. On the one hand, exciting opportunities arise out of discovering new knowledge about human mobile behavior, and thus fuel intelligent info-mobility applications. On other hand, new privacy concerns arise when mobility data are published. The risk is particularly high for GPS trajectories, which represent movement of a very high precision and spatio-temporal resolution: the de-identification of such trajectories (i.e., forgetting the ID of their associated owners is only a weak protection, as generally it is possible to re-identify a person by observing her routine movements. In this paper we propose a method for achieving true anonymity in a dataset of published trajectories, by defining a transformation of the original GPS trajectories based on spatial generalization and k-anonymity. The proposed method offers a formal data protection safeguard, quantified as a theoretical upper bound to the probability of re-identification. We conduct a thorough study on a real-life GPS trajectory dataset, and provide strong empirical evidence that the proposed anonymity techniques achieve the conflicting goals of data utility and data privacy. In practice, the achieved anonymity protection is much stronger than the theoretical worst case, while the quality of the cluster analysis on the trajectory data is preserved.

  15. [Comparison of human papilloma virus infection status between men who have sex with men recruited from gay bathhouses and HIV voluntary counseling and testing clinics respectively in Urumqi].

    Science.gov (United States)

    Tian, T; Cai, A J; Huang, B X; Abidan, Ainiwaer; Wang, H; Dai, J H

    2017-01-10

    Objective: To understand the human papilloma virus (HPV) infection status in men who have sex with men (MSM) recruited from gay bathhouses and HIV voluntary counseling and testing (VCT) clinics in Urumqi, Xinjiang Uygur autonomous region, and identify the associated risk factors. Methods: A total of 200 MSM aged ≥18 years were recruited by using the " snowballing" sampling method from gay bathhouses and VCT clinics in Urumqi during March-May, 2016. The MSM recruited completed questionnaires after filling in the informed consent form. The information about their demographic characteristics and sexual behaviors were collected, and anal swabs were collected from them for HPV genotyping. Results: The overall HPV infection rate was 54.0%. The HPV infection rate was 66.7%(74/111) in MSM from gay bathhouses and 38.2%(34/89) in MSM from VCT clinics and the high risk type HPV infection rate was 39.6% (44/111) in MSM from gay bathhouses and 14.6% (13/89) in MSM from VCT clinics, the differences were significant (χ(2)=16.112, Pgay bathhouse (OR=3.732, 95% CI: 1.950-7.141) and anal sexual behavior (OR=2.555, 95%CI: 1.329-4.912). Conclusion: The prevalence of HPV in MSM from gay bathhouses was higher than that in MSM from VCT clinics, indicating that close attention should be paid to the behavior intervention in MSM.

  16. Client Expectations for Counseling

    Science.gov (United States)

    Tinsley, Howard E. A.; Harris, Donna J.

    1976-01-01

    Undergraduate students (N=287) completed an 82-item questionnaire about their expectations of counseling. The respondents' strongest expectations were of seeing an experienced, genuine, expert, and accepting counselor they could trust. Expectancies that the counselor would be understanding and directive were lower. Significant sex differences were…

  17. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  18. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted attribu

  19. The future of sex counseling: The art and science of nurturing the clouds and rain%性咨询的未来:孕育云雨的艺术和科学

    Institute of Scientific and Technical Information of China (English)

    MALAN Mark Kim; 乔玉玲

    2013-01-01

    Various methods of sex counseling have existed in many cultures since antiquity.In modern times,evidence based scientific methods of sex counseling continue to be developed.There is a broad range of methods from limited to comprehensive diagnosis and treatment.The biological,psychological,social model is generally accepted as the modern standard of care.Sexologists offering comprehensive care must have a multi-disciplinary education in order to co-ordinate the multi-disciplinary treatment patients may require.Sex counseling must be patient focused and is both an art and a science.Technology offers opportunities for sex counseling via internet and by utilizing media resources.Future sex counseling must address the special social conditions of many diverse world cultures to build sexual harmony in couples.Sexually joyful individuals make healthier families and stronger nations.%自古以来在不同文化中就存在各种性咨询的方式.而在现代,性咨询的循证科学持续发展,出现了大量的专项或综合的诊疗方式.由于现代医疗实施了生物心理社会模式,性学家们在提供综合治疗时必须具有多学科的知识以满足病人多方面的治疗需求.性咨询必须以病人为中心,做到科学和艺术的结合.技术进步使得通过互联网和多媒体开展性咨询成为可能.未来的性咨询必须满足不同国家和文化的特定社会状况,以促进伴侣间的性和谐,构建健康的家庭和强大的国家.

  20. Genetic Counseling

    Science.gov (United States)

    Genetic counseling provides information and support to people who have, or may be at risk for, genetic disorders. A ... meets with you to discuss genetic risks. The counseling may be for yourself or a family member. ...

  1. 28 CFR 54.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 54.425 Section 54.425 Judicial Administration DEPARTMENT OF JUSTICE (CONTINUED... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 54.425 Counseling and use...

  2. 44 CFR 19.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling materials. 19.425 Section 19.425 Emergency Management and Assistance FEDERAL... Basis of Sex in Education Programs or Activities Prohibited § 19.425 Counseling and use of appraisal...

  3. 40 CFR 5.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 5.425 Section 5.425 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 5.425 Counseling and use...

  4. 15 CFR 8a.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials. 8a.425 Section 8a.425 Commerce and Foreign Trade Office of the Secretary of Commerce... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 8a.425 Counseling and use...

  5. 41 CFR 101-4.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Counseling and use of appraisal and counseling materials. 101-4.425 Section 101-4.425 Public Contracts and Property Management... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 101-4.425 Counseling and...

  6. 43 CFR 41.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Counseling and use of appraisal and counseling materials. 41.425 Section 41.425 Public Lands: Interior Office of the Secretary of the Interior... Discrimination on the Basis of Sex in Education Programs or Activities Prohibited § 41.425 Counseling and use...

  7. Computing on Anonymous Quantum Network

    CERN Document Server

    Kobayashi, Hirotada; Tani, Seiichiro

    2010-01-01

    This paper considers distributed computing on an anonymous quantum network, a network in which no party has a unique identifier and quantum communication and computation are available. It is proved that the leader election problem can exactly (i.e., without error in bounded time) be solved with at most the same complexity up to a constant factor as that of exactly computing symmetric functions (without intermediate measurements for a distributed and superposed input), if the number of parties is given to every party. A corollary of this result is a more efficient quantum leader election algorithm than existing ones: the new quantum algorithm runs in O(n) rounds with bit complexity O(mn^2), on an anonymous quantum network with n parties and m communication links. Another corollary is the first quantum algorithm that exactly computes any computable Boolean function with round complexity O(n) and with smaller bit complexity than that of existing classical algorithms in the worst case over all (computable) Boolea...

  8. Octopus: A Secure and Anonymous DHT Lookup

    CERN Document Server

    Wang, Qiyan

    2012-01-01

    Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup mechanism achieving both security and anonymity, heretofore an open problem. We present Octopus, a novel DHT lookup which provides strong guarantees for both security and anonymity. Octopus uses attacker identification mechanisms to discover and remove malicious nodes, severely limiting an adversary's ability to carry out active attacks, and splits lookup queries over separate anonymous paths and introduces dummy queries to achieve high levels of anonymity. We analyze the security of Octopus by developing an event-based simulator to show that the attacker discovery mechanisms can rapidly identify malicious nodes with low error rate. We calculate the anonymity of Octopus using probabilistic modeling and show that Octopus can achieve near-optimal anonymity. We evaluate ...

  9. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  10. The cost-effectiveness in the use of HIV counselling and testing-mobile outreaches in reaching men who have sex with men (MSM in northern Nigeria

    Directory of Open Access Journals (Sweden)

    Chiedu Ifekandu

    2014-11-01

    Full Text Available Introduction: Men who have sex with men (MSM are at increased risk of HIV and other STI infections in Nigeria. This is because MSM are afraid to seek medical help because the healthcare workers in various facilities are afraid of the consequences if they provide services for MSM citing the law as a reason not to intervene. MSM in northern states of Nigeria are facing double-jeopardy because the few international partners working in MSM in Nigeria are pulling out of these volatile areas because of the fear of attacks by the Boko Haram and the Nigerian law enforcement agencies. Objectives: The intervention was conducted to promote affordable and sustainable HIV care and treatment for MSM in Nigeria. Methods: This intervention was conducted in the Boko Haram ravaged cities of Kano and Maiduguri (North-East Nigeria. Twenty MSM-key influencers from the two cities were identified and trained on HIV counselling and testing, caregivers, case managers and on initiation process for ARV treatment for new HIV+MSM as well as ethical considerations. Results: The mean age of the key influencers was 24 years +/−SD. Each of the trained 20 key influencers reached 20 MSM-peer with condom promotion, HCT, referral to identified MSM-community health centers and follow-up/caregiving within the space of one month. The project was able to reach 400 MSM in the two cities. 89% of the peers consented to HCT. HIV prevalence among the participants was at 18%. The project recorded ARV-successful referral to healthcare facilities for the respondents that tested positive. The key influencers have been following up for ARV-adherence. Conclusions: Use of community members should be promoted for sustainability and ownership. It also helps in eradicating socio-cultural barrier to HIV intervention for MSM. Moreover, this proves to be one of the safest and affordable methods of reaching MSM in Nigeria in this ugly time of legalization of homophobia in the country's constitution.

  11. HIV Risk Perception, Sexual Behavior, and HIV Prevalence among Men-Who-Have-Sex-with-Men at a Community-Based Voluntary Counseling and Testing Center in Kuala Lumpur, Malaysia

    Directory of Open Access Journals (Sweden)

    Kwee Choy Koh

    2014-01-01

    Full Text Available We describe the HIV risk perception, sexual behavior, and HIV prevalence among 423 men-who-have-sex-with-men (MSM clients who received voluntary counseling and testing (VCT services at a community-based center in Kuala Lumpur, Malaysia. The mean age was 29 years old. One hundred one (23.9% clients rated themselves as low risk, 118 (27.9% as medium risk, 36 (8.5% as high risk, and 168 (39.7% were unsure of their risk. Twenty-four (9.4% clients tested HIV positive (4 (4% low risk, 9 (7.6% medium risk, 11 (30.6% high risk, and 13 (7.7% unsure risk. We found a positive correlation between risk perception and HIV infection in this study. Clients with high HIV risk perception have 17x the odds of testing HIV positive compared to low risk clients. High HIV risk perception was significantly associated with multiple sex partners, multiple types of sex partners, alcohol use before intercourse, unprotected sex beyond 6 months, and inconsistent condom use during anal sex compared to low risk clients. There were no statistically significant differences between medium risk and unsure risk clients compared to low risk clients. Strategies should be targeted towards change in sexual practices among those who are perceived to be at high risk.

  12. HIV Risk Perception, Sexual Behavior, and HIV Prevalence among Men-Who-Have-Sex-with-Men at a Community-Based Voluntary Counseling and Testing Center in Kuala Lumpur, Malaysia.

    Science.gov (United States)

    Koh, Kwee Choy; Yong, Lit Sin

    2014-01-01

    We describe the HIV risk perception, sexual behavior, and HIV prevalence among 423 men-who-have-sex-with-men (MSM) clients who received voluntary counseling and testing (VCT) services at a community-based center in Kuala Lumpur, Malaysia. The mean age was 29 years old. One hundred one (23.9%) clients rated themselves as low risk, 118 (27.9%) as medium risk, 36 (8.5%) as high risk, and 168 (39.7%) were unsure of their risk. Twenty-four (9.4%) clients tested HIV positive (4 (4%) low risk, 9 (7.6%) medium risk, 11 (30.6%) high risk, and 13 (7.7%) unsure risk). We found a positive correlation between risk perception and HIV infection in this study. Clients with high HIV risk perception have 17x the odds of testing HIV positive compared to low risk clients. High HIV risk perception was significantly associated with multiple sex partners, multiple types of sex partners, alcohol use before intercourse, unprotected sex beyond 6 months, and inconsistent condom use during anal sex compared to low risk clients. There were no statistically significant differences between medium risk and unsure risk clients compared to low risk clients. Strategies should be targeted towards change in sexual practices among those who are perceived to be at high risk.

  13. Anonymous Web Browsing and Hosting

    Directory of Open Access Journals (Sweden)

    MANOJ KUMAR

    2013-02-01

    Full Text Available In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that how we can choose safe web hosting solutions and what the main functions are which provides more security over server data. With the browser security network security is also important which can be implemented using cryptography solutions, VPN and by implementing firewalls on the network. Hackers always try to steal our identity and data, they track our activities using the network application software’s and do harmful activities. So in this paper we described that how we can monitor them from security purposes.

  14. Evaluation of Anonymized ONS Queries

    CERN Document Server

    Garcia-Alfaro, Joaquin; Kranakis, Evangelos

    2009-01-01

    Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications). This infrastructure relies on the use of the (1) Radio Frequency Identification (RFID) technology to tag objects in motion and (2) distributed services providing information about objects via the Internet. A lookup service, called the Object Name Service (ONS) and based on the use of the Domain Name System (DNS), can be publicly accessed by EPC applications looking for information associated with tagged objects. Privacy issues may affect corporate infrastructures based on EPC technologies if their lookup service is not properly protected. A possible solution to mitigate these issues is the use of online anonymity. We present an evaluation experiment that compares the of use of Tor (The second generation Onion Router) on a global ONS/DNS setup, with respect to benefits, limitations, and latency.

  15. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterio

  16. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as does multi-casting one message to a receiver population containing the intended receive...

  17. Anonymity in Classroom Voting and Debating

    Science.gov (United States)

    Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie

    2011-01-01

    The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…

  18. Towards a Theory of Anonymous Networking

    CERN Document Server

    Ghaderi, J

    2009-01-01

    The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination nodes, and paths of information flow in the network. One way to achieve such an anonymity is to use mixers. Mixers are nodes that receive packets from multiple sources and change the timing of packets, by mixing packets at the output links, to prevent the eavesdropper from finding sources of outgoing packets. In this paper, we consider two simple but fundamental scenarios: double input-single output mixer and double input-double output mixer. For the first case, we use the information-theoretic definition of the anonymity, based on average entropy per packet, and find an optimal mixing strategy under a strict latency constraint. For the second case, perfect anonymity is considered, and a maximal throughput strategy with perfect anonymity is found that minimizes the average delay.

  19. Anonymous-address-resolution model

    Institute of Scientific and Technical Information of China (English)

    Guang-jia SONG; Zhen-zhou JI

    2016-01-01

    Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditional ARPs (address-resolution and neighbor-discovery protocols) do not consider the existence of malicious nodes, which reveals destination addresses in the resolution process. Thus, these traditional protocols allow malicious nodes to easily carry out attacks, such as man-in-the-middle attack and denial-of-service attack. To overcome these weaknesses, we propose an anonymous-address-resolution (AS-AR) protocol. AS-AR does not publicize the destination address in the address-resolution process and hides the IP and MAC addresses of the source node. The malicious node cannot obtain the addresses of the destination and the node which initiates the address resolution; thus, it cannot attack. Analyses and experiments show that AS-AR has a higher security level than existing security methods, such as secure-neighbor discovery.

  20. Preserving Communities in Anonymized Social Networks

    Directory of Open Access Journals (Sweden)

    Alina Campan

    2015-04-01

    Full Text Available Social media and social networks are embedded in our society to a point that could not have been imagined only ten years ago. Facebook, LinkedIn, and Twitter are already well known social networks that have a large audience in all age groups. The amount of data that those social sites gather from their users is continually increasing and this data is very valuable for marketing, research, and various other purposes. At the same time, this data usually contain a significant amount of sensitive information which should be protected against unauthorized disclosure. To protect the privacy of individuals, this data must be anonymized such that the risk of re-identification of specific individuals is very low. In this paper we study if anonymized social networks preserve existing communities from the original social networks. To perform this study, we introduce two approaches to measure the community preservation between the initial network and its anonymized version. In the first approach we simply count how many nodes from the original communities remained in the same community after the processes of anonymization and de-anonymization. In the second approach we consider the community preservation for each node individually. Specifically, for each node, we compare the original and final communities to which the node belongs. To anonymize social networks we use two models, namely, k-anonymity for social networks and k-degree anonymity. To determine communities in social networks we use an existing community detection algorithm based on modularity quality function. Our experiments on publically available datasets show that anonymized social networks satisfactorily preserve the community structure of their original networks.

  1. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    Directory of Open Access Journals (Sweden)

    Sills Eric

    2010-08-01

    Full Text Available Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF and embryo transfer (ET where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  2. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    Science.gov (United States)

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  3. Genetic counseling

    Science.gov (United States)

    ... will want to think about your personal desires, religious beliefs, and family circumstances. Some people have a ... purpose of genetic counseling is simply to help parents make informed decisions. A genetic counselor will help ...

  4. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis

    2015-01-01

    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  5. Safety and acceptability of couples HIV testing and counseling for US men who have sex with men: a randomized prevention study.

    Science.gov (United States)

    Sullivan, Patrick S; White, Darcy; Rosenberg, Eli S; Barnes, Jasper; Jones, Jeb; Dasgupta, Sharoda; O'Hara, Brandon; Scales, Lamont; Salazar, Laura F; Wingood, Gina; DiClemente, Ralph; Wall, Kristin M; Hoff, Colleen; Gratzer, Beau; Allen, Susan; Stephenson, Rob

    2014-01-01

    We tested a couples HIV testing and counseling (CHTC) intervention with male couples in Atlanta by randomizing eligible couples to receive either CHTC or separate individual voluntary HIV counseling and testing (iVCT). To evaluate the acceptability and safety of CHTC, main outcomes were satisfaction with the intervention and the proportions of couples reporting intimate partner violence (IPV) and relationship dissolution after the service. The results indicated that the service was very acceptable to men (median 7-item index of satisfaction was 34 for CHTC and 35 for iVCT, P = .4). There was no difference in either incident IPV (22% versus 17% for CHTC and iVCT, respectively, P = .6) or relationship dissolution (42% versus 51% for CHTC and iVCT, respectively, P = .5). Based on the preliminary data, CHTC is safe for male couples, and it is equally acceptable to iVCT for men who have main partners.

  6. Whatever Happened to Counseling in Counseling Psychology?

    Science.gov (United States)

    Scheel, Michael J.; Berman, Margit; Friedlander, Myrna L.; Conoley, Collie W.; Duan, Changming; Whiston, Susan C.

    2011-01-01

    A suspected decline in published counseling-related research in "The Counseling Psychologist" ("TCP") and the "Journal of Counseling Psychology" ("JCP") was investigated through content analyses of the two journals from 1979 to 2008. A marked decline in counseling-related research may signify a shift in emphasis away from counseling as the most…

  7. A Parallelism-Based Approach to Network Anonymization

    CERN Document Server

    Margasinski, Igor

    2009-01-01

    Considering topologies of anonymous networks we used to organizing anonymous communication into hard to trace paths hiding its origin or destination. In anonymity the company is crucial, however the serial transportation imposes a costly tradeoff between a level of privacy and a speed of communication. This paper introduces a framework of a novel architecture for anonymous networks that hides initiators of communications by parallelization of anonymous links. The new approach, which is based on the grounds of the anonymous P2P network called P2Priv, does not require content forwarding via a chain of proxy nodes to assure high degree of anonymity. Contrary to P2Priv, the new architecture can be suited to anonymization of various network communications, including anonymous access to distributed as well as client-server services. In particular, it can be considered as an anonymization platform for these network applications where both privacy and low delays are required.

  8. Secure Electronic Cash Scheme with Anonymity Revocation

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2016-01-01

    Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.

  9. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  10. Is it OK to be an Anonymous?

    Directory of Open Access Journals (Sweden)

    Philip Serracino-Inglott

    2013-12-01

    Full Text Available Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between formal norm enforcement practice and Internet natives’ experience of it. Anons are more like eco-warriors than terrorists. While their actions are contentious, their force is framed in a vision of common good that is not unreasonable. Engaging with online deviants is shown to be a productive way of identifying the weaknesses in concepts underpinning moral evaluation of Internet-enabled phenomena.

  11. Authentication Without Identification using Anonymous Credential System

    CERN Document Server

    Damodaram, A

    2009-01-01

    Privacy and security are often intertwined. For example, identity theft is rampant because we have become accustomed to authentication by identification. To obtain some service, we provide enough information about our identity for an unscrupulous person to steal it (for example, we give our credit card number to Amazon.com). One of the consequences is that many people avoid e-commerce entirely due to privacy and security concerns. The solution is to perform authentication without identification. In fact, all on-line actions should be as anonymous as possible, for this is the only way to guarantee security for the overall system. A credential system is a system in which users can obtain credentials from organizations and demonstrate possession of these credentials. Such a system is anonymous when transactions carried out by the same user cannot be linked. An anonymous credential system is of significant practical relevance because it is the best means of providing privacy for users.

  12. Deterministic Leader Election Among Disoriented Anonymous Sensors

    CERN Document Server

    dieudonné, Yoann; Petit, Franck; Villain, Vincent

    2012-01-01

    We address the Leader Election (LE) problem in networks of anonymous sensors sharing no kind of common coordinate system. Leader Election is a fundamental symmetry breaking problem in distributed computing. Its goal is to assign value 1 (leader) to one of the entities and value 0 (non-leader) to all others. In this paper, assuming n > 1 disoriented anonymous sensors, we provide a complete charac- terization on the sensors positions to deterministically elect a leader, provided that all the sensors' positions are known by every sensor. More precisely, our contribution is twofold: First, assuming n anonymous sensors agreeing on a common handedness (chirality) of their own coordinate system, we provide a complete characterization on the sensors positions to deterministically elect a leader. Second, we also provide such a complete chararacterization for sensors devoided of a common handedness. Both characterizations rely on a particular object from combinatorics on words, namely the Lyndon Words.

  13. Anonymous Fingerprinting Based on Electronic Cash

    Institute of Scientific and Technical Information of China (English)

    CHENXiaofeng; ZHANGFangguo; WANGJilin; WANGYumin

    2003-01-01

    A new anonymous fingerprinting protocol based on the principle of electronic cash is proposed in this paper.Redistributing a data item is equal to doublespending electronic cash.Contrasting with the previous coin-based anonymous fingerprinting protocol,we use the real electronic cash to trace traitors instead of the "coins" which serve only as a cryptographic primitive and have no monetary value,so it is easily understood and the bank does not need key-distribution and registration to prepare the "coina".

  14. Community engagement research and dual diagnosis anonymous.

    Science.gov (United States)

    Roush, Sean; Monica, Corbett; Pavlovich, Danny; Drake, Robert E

    2015-01-01

    Community engagement research is widely discussed but rarely implemented. This article describes the implementation of a community engagement research project on Dual Diagnosis Anonymous, a rapidly spreading peer support program in Oregon for people with co-occurring mental illness and substance use disorders. After three years of discussions, overcoming barriers, and involving several institutions, this grassroots research project has been implemented and is expanding. Active participants in Dual Diagnosis Anonymous inspired and instructed policy makers, professionals, and students. Community engagement research requires frontline participants, community members, and professional collaborators to overcome multiple barriers with persistence and steadfastness. Building trust, collaboration, and structures for community engagement research takes time and a community effort.

  15. COUNSELING MULTIKULTURAL

    Directory of Open Access Journals (Sweden)

    NUZLIAH

    2016-07-01

    Full Text Available Multicutural is a term used to describe one's view of the variety of life in the world, or cultural policy emphasizing their acceptance of diversity, and a wide range of cultures (multicultural that exist in society regarding values, system, culture, customs and politics that they profess. The effectiveness of counseling depends on many factors the most important is the relation to each other, and mutual understanding between counselor and client. Cultural differences that exist in this country requires the counselor needs to understand the different cultures that exist. Importance of multicultural for counselors as a form of consciousness that the counselor and client have cultural differences. Multicultural counseling a counseling relationship with the concept that there is a counselor with a client who has a cultural background, values and different lifestyles. Building a good relationship when the counseling process takes place so that the counselor can understand the culture of its clients one of the key attitudes that exist within konsleor is empathy. Counselors who have empathy will be able to understand the way the world through the perspective of the client.

  16. Outplacement Counseling.

    Science.gov (United States)

    Papalia, Anthony S.; Dai, Sheila

    Rapid changes in technology and the economy have led to major staff reductions in the workplace, and have increased the need to assist displaced employees with outplacement counseling that is responsive, cost-effective, humane, and on-going. College counselors have the basic skills to effectively expand their role in this field in ways that…

  17. Outplacement Counseling.

    Science.gov (United States)

    Knowdell, Richard L.; And Others

    This monographs discusses outplacement counseling (the process of helping a terminated employee secure new employment) in business and industry and in higher education. The first section, outplacement in business and industry, describes the emergence of outplacement services and discusses benefits and problems associated with the service. The…

  18. Probabilistic Adaptive Anonymous Authentication in Vehicular Networks

    Institute of Scientific and Technical Information of China (English)

    Yong Xi; Ke-Wei Sha; Wei-Song Shi; Loren Schwiebert; Tao Zhang

    2008-01-01

    Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on designing the media access and physical layer protocols.Privacy issues in vehicular systems have not been well addressed. We argue that privacy is a user-specific concept, and a good privacy protection mechanism should allow users to select the levels of privacy they wish to have. To address this requirement, we propose an adaptive anonymous authentication mechanism that can trade off the anonymity level with computational and communication overheads (resource usage). This mechanism, to our knowledge, is the first effort on adaptive anonymous authentication. The resources used by our protocol are few. A high traffic volume of 2000 vehicles per hour consumes about 60kbps bandwidth, which is less than one percent of the bandwidth of DSRC (Dedicated Short Range Communications). By using adaptive anonymity, the protocol response time can further be improved 2~4 times with lessthan 20% bandwidth overheads.

  19. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  20. Altruism and Anonymity: A Behavioral Analysis

    Science.gov (United States)

    Locey, Matthew L.; Rachlin, Howard

    2015-01-01

    The effect of anonymity on altruism was examined in a social discounting task with hypothetical rewards. Social discounting – the rate at which increases in social distance decrease value to the participant – was compared across three groups. Participants in the Anonymous group were told that recipients would not know who they were. Participants in the Observed group were asked to imagine that each of their choices was being observed by the recipient. Participants in the Standard group were given no special instructions with respect to anonymity or identity. Social discounting was measured at each of 7 social distances ranging from first closest friend or relative to the 100th closest. Social discount rates for all three groups were well described by hyperbolic functions. Participants in the Observed group were willing to forgo more money for the benefit of others (were more altruistic) than were those in the other two groups. Although participants in the Anonymous group, with no prospect of reciprocation, were willing to forgo less money for the sake of others than were those in the Observed group, they did express willingness to forgo significant amounts. This is some evidence that individual altruistic acts cannot be explained wholly by the possibility of reciprocation. PMID:26051191

  1. Dissent in Numbers: Making Strong Anonymity Scale

    Science.gov (United States)

    2012-10-01

    transmit anonymously in each bit-time with- out colliding and yielding garbled output, an arbitration or scheduling mechanism is needed. Second, any misbe...http://www.nytimes.com/2010/05/ 14/technology/personaltech/14talk.html. [62] J. Wright, T. de Souza, and I. Brown. Fine-grained censorship mapping information sources, legality and ethics . In FOCI, Aug. 2011. 14

  2. Genomic counseling: next generation counseling.

    Science.gov (United States)

    Mills, Rachel; Haga, Susanne B

    2014-08-01

    Personalized medicine continues to expand with the development and increasing use of genome-based testing. While these advances present new opportunities for diagnosis and risk assessment, they also present challenges to clinical delivery. Genetic counselors will play an important role in ushering in this new era of testing; however, it will warrant a shift from traditional genetic counseling to "genomic counseling." This shift will be marked by a move from reactive genetic testing for diagnosis of primarily single-gene diseases to proactive genome-based testing for multiple complex diseases for the purpose of disease prevention. It will also require discussion of risk information for a number of diseases, some of which may have low relative risks or weak associations, and thus, may not substantially impact clinical care. Additionally, genomic counselors will expand their roles, particularly in the area of health promotion to reduce disease risk. This additional role will require a style of counseling that is more directive than traditional counseling and require greater knowledge about risk reducing behaviors and disease screening.

  3. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity.

    Science.gov (United States)

    Pang, Liaojun; Yan, Xuxia; Zhao, Huiyang; Hu, Yufei; Li, Huixian

    2016-01-01

    Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.

  4. COUNSELING MULTIKULTURAL

    OpenAIRE

    NUZLIAH

    2016-01-01

    Multicutural is a term used to describe one's view of the variety of life in the world, or cultural policy emphasizing their acceptance of diversity, and a wide range of cultures (multicultural) that exist in society regarding values, system, culture, customs and politics that they profess. The effectiveness of counseling depends on many factors the most important is the relation to each other, and mutual understanding between counselor and client. Cultural differences that exist in this coun...

  5. Yahtzee: An Anonymized Group Level Matching Procedure

    CERN Document Server

    Jones, Jason J; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam; Marlow, Cameron; Fowler, James H

    2011-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources in order to conduct their research. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects evermore important. However, strict privacy procedures can make joining diverse sources of data that contain information about specific individual behaviors difficult. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as expected theoretically when we apply it to data from Facebook and public voter records.

  6. An Internet Based Anonymous Electronic Cash System

    Directory of Open Access Journals (Sweden)

    Israt Jahan

    2015-04-01

    Full Text Available There is an increase activity in research to improve the current electronic payment system which is parallel with the progress of internet. Electronic cash system is a cryptographic payment system which offers anonymity during withdrawal and purchase. Electronic cash displays serial numbers which can be recorded to allow further tracing. Contrary to their physical counterparts, e-cash have an inherent limitation; they are easy to copy and reuse (double-spending. An observer is a tamper-resistant device, issued by the Internet bank, which is incorporated with the Internet user’s computer that prevents double-spending physically, i.e., the user has no access to her e-cash and therefore he cannot copy them. In this paper, we shall present an anonymous electronic cash scheme on the internet which incorporates tamper-resistant device with user-module.

  7. Anonymity And Accountability In Web Based Transactions

    Directory of Open Access Journals (Sweden)

    H.Jayasree

    2012-04-01

    Full Text Available Decreased privacy is an unavoidable consequence in the drive to make the world a more secure, safer place, according to some analysts. In the on-line world, the conflict between privacy and security manifests itself in a debate between anonymity and accountability. Balance between Anonymity and Accountability is a major concern in web based transactions. The protection of users’ privacy when performing web-based transactions is an important factor in the acceptance and use of Internet and web services. There is a tremendous improvement in the automation of the way we pay for goods and services by the variety and growth of electronic banking services available to the consumers. Hence there is a need for the ultimate structure of the new electronic transaction system that has a substantial impact on the personal privacy as well as on the nature and extent of criminal use of E- transactions. This paper presents an approach for such structure.

  8. Structure Preserving Anonymization of Router Configuration Data

    Science.gov (United States)

    2009-04-01

    2009 IEEE Authorized licensed use limited to: Naval Postgraduate School. Downloaded on December 18, 2009 at 13:53 from IEEE Xplore . Restrictions apply... IEEE Xplore . Restrictions apply. MALTZ et al.: STRUCTURE PRESERVING ANONYMIZATION OF ROUTER CONFIGURATION DATA 351 1 hostname cr1.lax.foo.com 2 ! 3... IEEE Xplore . Restrictions apply. 352 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 3, APRIL 2009 lines 14 and 30 (255.255.255.252

  9. Remote Electronic Voting with Revocable Anonymity

    Science.gov (United States)

    Smart, Matt; Ritter, Eike

    We present a new remote, coercion-free electronic voting protocol which satisfies a number of properties previously considered contradictory. We introduce (and justify) the idea of revocable anonymity in electronic voting, on the grounds of it being a legal requirement in the United Kingdom, and show a method of proving the validity of a ballot to a verifier in zero knowledge, by extension of known two-candidate proofs.

  10. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  11. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    LENUS (Irish Health Repository)

    Sills, Eric Scott

    2010-08-11

    Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p < 0.001). Infertility duration was ≥3 yrs for couples enrolling in dual gamete donation, and each had ≥2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5\\/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  12. Universally composable anonymous Hash certification model

    Institute of Scientific and Technical Information of China (English)

    ZHANG Fan; MA JianFeng; SangJae MOON

    2007-01-01

    Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore,inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives.

  13. Sister-sister incest: data from an anonymous computerized survey.

    Science.gov (United States)

    Stroebel, Sandra S; O'Keefe, Stephen L; Griffee, Karen; Kuo, Shih-Ya; Beard, Keith W; Kommor, Martin J

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using a computer-assisted self-interview. Thirty-one participants were victims of sister-sister incest, 40 were victims of brother-sister incest, 19 were victims of father-daughter incest, 8 were victims of sexual abuse by an adult female (including one mother), and 232 were victims of sexual abuse by an adult male other than their father before reaching 18 years of age. The rest (1,203) served as controls. The victims of sister-sister incest had significantly more problematic outcomes than controls on many measures as adults. Victims of sister-sister incest were more depressed and more likely than controls to be distant from the perpetrator-sister and to have traded sex for money, experienced an unplanned pregnancy, engaged in four different types of masturbation, and engaged in 13 different same-sex behaviors. Our findings were consistent with other reports of early eroticization and persistent hypereroticization of incest victims.

  14. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    Science.gov (United States)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  15. On the Anonymity of Identity-Based Encryption

    Directory of Open Access Journals (Sweden)

    Song Luo

    2013-01-01

    Full Text Available Anonymity of identity-based encryption (IBE means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems. We found that the current definition of anonymity is obscure to describe some IBE systems, such as Gentry IBE system. Furthermore, current definition cannot express the degree of anonymity. So we divide the degree of anonymity into weak anonymity and strong anonymity based on indistinguishability between different games. For weakly anonymous IBE systems, the target identity in a ciphertext cannot be distinguished from a random identity. For strongly anonymous IBE systems, the whole ciphertext cannot be distinguished from a random tuple. We also discuss the type of anonymity and divide it into two types. Type 1 means that a random tuple can be seen as a valid ciphertext, while type 2 cannot. Based on our new definitions, we show that three famous IBE systems, Gentry IBE system, Boyen-Waters IBE system, and Lewko IBE system, have strong but different types of anonymity.

  16. Counseling Psychology and Professional School Counseling

    Science.gov (United States)

    Pope, Mark

    2004-01-01

    This article provides a historical, political, and organizational analysis regarding counseling psychology's involvement in professional school counseling. Issues discussed include collaboration, curriculum and training, and professional identity, as well as the commonalities that bind counselor education/professional school counseling and…

  17. Factors for Personal Counseling among Counseling Trainees

    Science.gov (United States)

    Byrne, J. Stephen; Shufelt, Brett

    2014-01-01

    The present study explored the use of counseling among counselor trainees and the characteristics of consumers and nonconsumers. Approximately 61% of those surveyed (n = 85) reported that they had received counseling, with the majority being mental health counseling trainees. Nonconsumers (n = 54) indicated that they coped with problems in other…

  18. Ethical attitudes of German specialists in reproductive medicine and legal regulation of preimplantation sex selection in Germany.

    Directory of Open Access Journals (Sweden)

    Miriam Wilhelm

    Full Text Available BACKGROUND: Because of its ethical and social implications, preimplantation sex selection is frequently the subject of debates. METHODS: In 2006, we surveyed specialists in reproductive medicine in Germany using an anonymous questionnaire, including sociodemographic data and questions regarding ethical problems occurring in the practice of reproductive medicine. Most questions focused on preimplantation sex selection, including 10 case vignettes, since these enabled us to describe the most difficult and ethically controversial situations. This is the first survey among specialists in reproductive medicine regarding this topic in Germany. RESULTS: 114 specialists in reproductive medicine participated, 72 males (63% and 42 females (37%, average age was 48 years (age range 29-67 years. The majority of respondents (79% favoured a regulation that limits the use of preimplantation sex selection only for medical reasons, such as X-linked diseases (including 18%: summoning an ethics commission for every case. A minority of 18% approved of the use of sex selection for non-medical reasons (4% generally and further 14% for family balancing. 90% had received obvious requests from patients. The highest approval (46% got the counselling guideline against a preimplantation sex selection and advising a normal pregnancy, if preimplantation sex selection would be allowed in Germany. The majority (67% was opposed the personal use of preimplantation sex selection for non-medical reasons, but would think about it in medical cases. In opposite to woman, 14% of the men were in favour of personal use for non-medical reasons (p=0,043. 25% of specialists in reproductive medicine feared that an allowance of preimplantation sex selection would cause a shift in the sex ratio. CONCLUSIONS: The majority of German specialists in reproductive medicine opposes preimplantation sex selection for non-medical reasons while recommending preimplantation sex selection for medical

  19. Genetic counseling for sex chromosome anomalies (SCAs) in Israel and Germany: assessing medical risks according to the importance of fertility in two cultures.

    Science.gov (United States)

    Hashiloni-Dolev, Yael

    2006-12-01

    In this article, I report findings from a comparative study of Israeli and German genetic counselors. Specifically, it concerns counselors' attitudes and risk assessments relating to prenatal diagnosis of sex chromosome anomalies (SCAs) such as Klinefelter and Turner syndromes. Data collected through in-depth interviews with counselors in both countries (N = 32) are presented, and the types of claims experts deploy in their personal and professional estimation of the risks involved in SCAs are analyzed. The article concludes by suggesting that the counselors rhetoric concerning SCAs, whose major manifestation is the future infertility of the unborn child as well as their estimations of the related risks, should be situated in a broader cultural context, that of local Israeli and German understandings of the importance of fertility, and not in their professional nondirective ethos. Hence, to understand the practice of genetic counselors in two late-modern societies, one must understand the unique relationship between the individual bodies of pregnant women and the body politics of their nations, a relationship mediated by the counselors, who are the bearers of knowledge and expertise in this field.

  20. Evaluation of a nurse-led haemophilia counselling service.

    Science.gov (United States)

    O'Shea, Eadaoln; Coughlan, Michael; Corrigan, Helen; McKee, Gabrielle

    Genetic counselling and testing for females with a family history of haemophilia has long been advocated. However, there is little research in regard to clients' satisfaction with the existing counselling models in haemophilia, and in particular with nurse-led clinics. The purpose of this study was to evaluate whether clients were satisfied with a nurse-led carrier testing clinic and counselling service. A retrospective quantitative study of clients' satisfaction and perceived knowledge was undertaken using an anonymous questionnaire. A sample of 42 women who had attended the clinic in the last 12 months was identified. The response rate for the study was 71% (n = 30).Two thirds of the respondents were 35 years of age or younger, 93% had a family history of haemophilia and 56% were diagnosed as carriers. Perceived understanding and knowledge increased significantly between the first and second appointments (p nurse-led carrier testing clinic and counselling service.

  1. The Choreography of Counseling.

    Science.gov (United States)

    Gerber, Sterling K.; Purkey, William W.

    1997-01-01

    Compares counseling to the choreography of dance. Reviews other counseling structures, such as the scientific process, and then introduces the "choreography of counseling." Claims that counseling, as in a dance performance, involves an introduction, exploration, exposition, and resolution. Offers principles and techniques for success in each of…

  2. Complete Bipartite Anonymity for Location Privacy

    Institute of Scientific and Technical Information of China (English)

    董恺; 顾涛; 陶先平; 吕建

    2014-01-01

    Users are vulnerable to privacy risks when providing their location information to location-based services (LBS). Existing work sacrifices the quality of LBS by degrading spatial and temporal accuracy for ensuring user privacy. In this paper, we propose a novel approach, Complete Bipartite Anonymity (CBA), aiming to achieve both user privacy and quality of service. The theoretical basis of CBA is that: if the bipartite graph of k nearby users’ paths can be transformed into a complete bipartite graph, then these users achieve k-anonymity since the set of “end points connecting to a specific start point in a graph”is an equivalence class. To achieve CBA, we design a Collaborative Path Confusion (CPC) protocol which enables nearby users to discover and authenticate each other without knowing their real identities or accurate locations, predict the encounter location using users’ moving pattern information, and generate fake traces obfuscating the real ones. We evaluate CBA using a real-world dataset, and compare its privacy performance with existing path confusion approach. The results show that CBA enhances location privacy by increasing the chance for a user confusing his/her path with others by 4 to 16 times in low user density areas. We also demonstrate that CBA is secure under the trace identification attack.

  3. Yahtzee: an anonymized group level matching procedure.

    Directory of Open Access Journals (Sweden)

    Jason J Jones

    Full Text Available Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  4. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  5. How To Break Anonymity of the Netflix Prize Dataset

    OpenAIRE

    Narayanan, Arvind; Shmatikov, Vitaly

    2006-01-01

    We present a new class of statistical de-anonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on. Our techniques are robust to perturbation in the data and tolerate some mistakes in the adversary's background knowledge. We apply our de-anonymization methodology to the Netflix Prize dataset, which contains anonymous movie ratings of 500,000 subscribers of Netflix, the world's largest online movie rental service. ...

  6. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...... bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...

  7. An Examination of the Counsellor's Skills When Counselling Clients With Sexual Problems

    Science.gov (United States)

    McConnell, Lawrence G.

    1976-01-01

    The study examined the counsellor's competence in counselling clients with sexual problems. The notion of competence was operationally defined in terms of empathy, anxiety, and sex knowledge. The results demonstrate the need to have specific training in sex counselling incorporated into the counsellor trainee's curriculum. (Author)

  8. Gregory Bateson, Alcoholics Anonymous, and stoicism.

    Science.gov (United States)

    Brundage, V

    1985-02-01

    In 1971 Gregory Bateson put forward an "entirely new epistemology," or view of the world, that he described as cybernetic. In a very influential article, which appeared in this journal, Bateson claimed that his cybernetic epistemology "coincides closely" with the epistemology of Alcoholics Anonymous (AA), for which he claimed "the only outstanding record of success" in the treatment of alcoholism (1971, p. 310). However, Bateson's discussion of AA dealt with only four of the Twelve Steps of AA's program. Although the epistemology of cybernetics and AA congrue in some respects, they contradict each other in many others. Common ground is found in the ancient philosophical tradition of Stoicism. In Stoicism the contradictions between the two are sources for an ethics and psychology of great power. Stoicism offers the cybernetic epistemologist a solid base for theory. It offers the clinician who deals with chemical dependency practical insights into the process of recovery.

  9. Classification via Clustering for Anonymization Data

    Directory of Open Access Journals (Sweden)

    Sridhar Mandapati

    2014-02-01

    Full Text Available Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data Mining (PPDM techniques aim at protecting the sensitive data and mining results. In this study, the different Clustering techniques via classification with and without anonymization data using mining tool WEKA is presented. The aim of this study is to investigate the performance of different clustering methods for the diabetic data set and to compare the efficiency of privacy preserving mining. The accuracy of classification via clustering is evaluated using K-means, Expectation-Maximization (EM and Density based clustering methods.

  10. Design of Anonymous Attribute Authentication Mechanism

    Science.gov (United States)

    Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki

    Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication.In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.

  11. Prenatal Genetic Counseling (For Parents)

    Science.gov (United States)

    ... Your 1- to 2-Year-Old Prenatal Genetic Counseling KidsHealth > For Parents > Prenatal Genetic Counseling Print A ... can they help your family? What Is Genetic Counseling? Genetic counseling is the process of: evaluating family ...

  12. An Applet-based Anonymous Distributed Computing System.

    Science.gov (United States)

    Finkel, David; Wills, Craig E.; Ciaraldi, Michael J.; Amorin, Kevin; Covati, Adam; Lee, Michael

    2001-01-01

    Defines anonymous distributed computing systems and focuses on the specifics of a Java, applet-based approach for large-scale, anonymous, distributed computing on the Internet. Explains the possibility of a large number of computers participating in a single computation and describes a test of the functionality of the system. (Author/LRW)

  13. Benefits of Required Counseling for Counseling Students

    Science.gov (United States)

    Prosek, Elizabeth A.; Holm, Jessica M.; Daly, Cynthia M.

    2013-01-01

    Graduate students experience mental health distress. The authors investigated the benefits of required counseling services at a training clinic for students enrolled in counseling courses. Results indicated that after receiving services, students ("N" = 55) reported decreases in overall problems, depressive symptoms, and anxiety…

  14. On the Utility of Anonymized Flow Traces for Anomaly Detection

    CERN Document Server

    Burkhart, Martin; May, Martin

    2008-01-01

    The sharing of network traces is an important prerequisite for the development and evaluation of efficient anomaly detection mechanisms. Unfortunately, privacy concerns and data protection laws prevent network operators from sharing these data. Anonymization is a promising solution in this context; however, it is unclear if the sanitization of data preserves the traffic characteristics or introduces artifacts that may falsify traffic analysis results. In this paper, we examine the utility of anonymized flow traces for anomaly detection. We quantitatively evaluate the impact of IP address anonymization, namely variations of permutation and truncation, on the detectability of large-scale anomalies. Specifically, we analyze three weeks of un-sampled and non-anonymized network traces from a medium-sized backbone network. We find that all anonymization techniques, except prefix-preserving permutation, degrade the utility of data for anomaly detection. We show that the degree of degradation depends to a large exten...

  15. High Tech Counseling: Revisited

    Science.gov (United States)

    Layne, Christina Mann; Hohenshil, Thomas H.

    2005-01-01

    This article includes a discussion of technology's use in counseling. It contains reviews and implications of 4 articles that appeared in the Journal of Technology in Counseling (JTC) and provides a discussion of the future of technology in the counseling profession.

  16. Outplacement as Transition Counseling.

    Science.gov (United States)

    Mirabile, Richard J.

    1985-01-01

    Describes outplacement counseling as a process that enables management to deal with the problem of the employee who must be released or the staff that must be reduced. Discusses the process of outplacement counseling, the stages of transition counseling, and techniques to be implemented. (BH)

  17. [Assessment and sex counseling in libido disorders].

    Science.gov (United States)

    Gnirss, R

    2002-08-14

    Individual problems, difficulties in the partnership, handicaps of the body and the influence of society contribute to sexual problems. In this article a definition of hypoactive sexual desire disorders (HSDD) is given. Then the author tries to show the many different reasons of disturbed sexual desire to help to see the problem from different points of view. Often it is very important for the patients to understand why they are unable to feel sexual wishes. In clarifying the personal reasons change begins and the couple can find out which next steps may be useful to solve the problem of not wanting to want.

  18. “We are Anonymous.” Anonymity in the Public Sphere – Challenges of Free and Open Communication

    Directory of Open Access Journals (Sweden)

    Saskia Sell

    2013-05-01

    Full Text Available Anonymity, the stealth mode of public communication, challenges different actors who deal with freedom of communication issues in their day to day life – be it professional journalists, information and communication scientists, technicians or political activists. This article aims to deliver theoretical background on the concept of anonymity on the macro-level, as well as to shed light on how different communicators deal with anonymity on the micro-level. Based on the example of the Anonymous movement, communicative actions are put in relation to media technological artifacts and their surrounding media environment with a focus on journalistic practice and public response to the phenomenon. The analysis concludes with the need for a preservation of options for anonymous public communication as a dimension of freedom of communication after carefully considering both the advantages and the potential risks connected to that mode of private-public communication.

  19. Primer on genetic counseling.

    Science.gov (United States)

    Hahn, Susan Estabrooks

    2011-04-01

    Once limited to rare mendelian disorders, genetic counseling is playing an ever-increasing role in the multidisciplinary approach to predicting, diagnosing, and managing neurologic disease. However, genetic counseling services may not be optimized because of lack of availability and lack of knowledge regarding when it is appropriate to refer, what occurs in genetic counseling, and how genetic counseling can affect care. These issues are addressed in this article, along with corresponding clinical scenarios. Websites to find genetic counseling services and resources are also provided.

  20. Survey on Anonymity in Unstructured Peer-to-Peer Systems

    Institute of Scientific and Technical Information of China (English)

    Ren-Yi Xiao

    2008-01-01

    Although anonymizing Peer-to-Peer (P2P) networks often means extra cost in terms of transfer efficiency, many systems try to mask the identities of their users for privacy consideration. By comparison and analysis of existing approaches,we investigate the properties of unstructured P2P anonymity, and summarize current attack models on these designs. Most of these approaches are path-based, which require peers to pre-construct anonymous paths before transmission, thus suffering significant overhead and poor reliability. We also discuss the open problems in this field and propose several future research directions.

  1. Constructions for Anonymous Secret Sharing Schemes Using Combinatorial Designs

    Institute of Scientific and Technical Information of China (English)

    Ying-pu Deng; Li-feng Guo; Mu-lan Liu

    2007-01-01

    In an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In this paper some constructions of anonymous secret sharing schemes with 2 thresholds by using combinatorial designs are given. Let υ(t, ω, q) denote the minimum size of the set of shares of a perfect anonymous (t, ω) threshold secret sharing scheme with q secrets. In this paper we prove that υ(t, ω, q) = Θ(q) if t and ω are fixed and that the lower bound of the size of the set of shares in [4] is not optimal under certain condition.

  2. A NEW ANONYMITY CONTROLLED E-CASH SCHEME

    Institute of Scientific and Technical Information of China (English)

    Zhang Fangguo; Wang Changjie; Wang Yumin

    2002-01-01

    E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented.

  3. Design and analysis of two-layer anonymous communication system

    Institute of Scientific and Technical Information of China (English)

    WANG Wei-ping; WANG Jian-xin

    2007-01-01

    A new architecture for scalable anonymous communication system(SACS) was proposed. The users were divided into several subgroups managed by different sub-blenders, and all sub-blenders were managed by the main-blender using two layers management scheme. The identity information of members are distributed on different sub-blenders, which makes each member keep much less information and network overload greatly reduce. The anonymity and the overhead of the new scheme were analyzed and compared with that of Crowds, which shows the cost of storage and network overhead for the new scheme largely decreases while the anonymity is little degraded. The experiment results also show that the new system architecture is well scalable. The ratio of management cost of SACS to that of Crowds is about 1:25 while the value of P(I|H1+) only increases by 0.001-0.020, which shows that SACS keeps almost the same anonymity with Crowds.

  4. Measuring Perceived Anonymity: The Development of a Context Independent Instrument

    Directory of Open Access Journals (Sweden)

    Dwight M. Hite

    2014-09-01

    Full Text Available In order to assess relationships between perceptions of anonymity and behaviors, a context independent instrument is required for measuring the perceptions of anonymity held by individuals.  To date, no such measurement instrument exists that has been shown to be reliable and valid.  The authors employ a rigorous design methodology to develop, test, and substantiate a reliable and valid instrument for measuring perceptions of anonymity across different contexts. The PA measure presented is a five item Likert scale designed to measure perceptions of anonymity across multiple contexts. Results from two separate EFA pilot tests (n=61 and n=60, a test-retest, and a CFA final test (n=292 indicate that the PA measure has good internal consistency reliability (a=.82, test-retest reliability, factorial validity, and a single factor structure. DOI: 10.2458/azu_jmmss.v5i1.18305

  5. Anonymity and verifiability in multi-attribute reverse auction

    CERN Document Server

    Srinath, T R; Pais, Alwyn Roshan; 10.5121/ijitcs.2011.1401

    2011-01-01

    The use of e-Auction services has been increasing in recent years. Security requirements in conducting e-Auctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with asymmetric models in which the commercial entity of an auction issuer or registration manager is assumed in addition to the auctioneer. Multi-attribute reverse auctions promise higher market efficiency and effective information exchange. This work extends and uses the existing schemes. This scheme uses scoring function, winner determination in multi-attribute auctions to implement public verifiability. Anonymity is achieved through bidder side pseudonym generation. By results and analysis we say this is very simple and effective scheme. This scheme ensures public verifiability and anonymity in multi-attribute auctions w...

  6. Theoretical Results on De-Anonymization via Linkage Attacks

    Directory of Open Access Journals (Sweden)

    Martin M. Merener

    2012-08-01

    Full Text Available Consider a database D with records containing history of individuals' transactions, that has been de-identified, i.e., the variables that uniquely associate records with individuals have been removed from the data. An adversary de-anonymizes D via a linkage attack if using some auxiliary information about a certain individual in the database, it can determine which record of D corresponds to such individual. One example of this is given in the article Robust De-anonymization of Large Sparse Datasets, by Narayanan and Shmatikov [19], which shows that an anonymized database containing records with ratings of different movies rented by customers of Netflix, could in fact be de-anonymized using very little auxiliary information, even with errors. Besides the heuristic de-anonymization of the Netflix database, Narayanan and Shmatikov provide interesting theoretical results about database de-anonymization that an adversary can produce under general conditions. In this article we revisit these theoretical results, and work them further. Our first contribution is to exhibit different simple cases in which the algorithm Scoreboard, meant to produce the theoretical de-anonymization in [19], fails to do so. By requiring 1-sim to be a pseudo-metric, and that the algorithm producing the de-anonymization outputs a record with minimum support among the candidates, we obtain and prove deanonymization results similar to those described in [19]. We then consider a new hypothesis, motivated by the fact (observed in heuristic de-anonymizations that when the auxiliary information contains values corresponding to rare attributes, the de-anonymization achieved is stronger. We formalize this using the notion on long tail [4], and give new theorems expressing the level of de-anonymization in terms of the parameters of the tail of the database D. The improvement in the deanonymization is reflected in the fact that when at least one value in the auxiliary information

  7. Prospective parents' intentions regarding disclosure following the removal of donor anonymity.

    Science.gov (United States)

    Crawshaw, Marilyn

    2008-06-01

    This short survey of UK infertility counsellors was designed to determine whether the removal of donor anonymity resulted in noticeable changes in prospective parents' stated intentions regarding disclosure of their origins to any children conceived through donor conception. Members of the British Infertility Counselling Association working in Human Fertilisation and Embryology Authority (HFEA) -- licensed centres, before and after the legal changes, were sent a short questionnaire that included space for free comments (take-up: 62%). Three-quarters reported changes. Of these, two-thirds said prospective parents were more likely to say they would disclose, while less than a tenth said prospective parents were less likely do so. Where no changes were noted, this was primarily because the majority of prospective parents had stated their intention to be open even prior to the legal changes. Possible influences on intentions included: the culture within the centre, moves towards openness within the wider society, and parents' lack of confidence regarding how to go about disclosure. Follow-up studies are needed to improve understanding of whether influences on decision making carry through to patterns of actual disclosure; whether involvement in counselling affects outcomes; and whether access to professional assistance at the time of planned disclosure is helpful.

  8. Security Analysis of Accountable Anonymous Group Communication in Dissent

    Science.gov (United States)

    2013-01-31

    providing stronger anonymity, such as mix-networks (Chaum 1981; Adida 2006), onion rout - ing (Goldschlag, Reed, and Syverson 1999; Dingledine, Mathewson...every member knows when another should send a message, and thus gossip techniques such as those used in PeerReview (Haeberlen, Kouznetsov, and Druschel...onion routing (Goldschlag, Reed, and Syverson 1999; Dingledine, Mathewson, and Syverson 2004), a well-known and practical approach to general anonymous

  9. Unraveling an Old Cloak: k-anonymity for Location Privacy

    OpenAIRE

    Shokri, Reza; Troncoso, Carmela; Diaz, Claudia; Freudiger, Julien; Hubaux, Jean-Pierre

    2010-01-01

    There is a rich collection of literature that aims at protecting the privacy of users querying location-based services. One of the most popular location privacy techniques consists in cloaking users' locations such that k users appear as potential senders of a query, thus achieving k-anonymity. This paper analyzes the effectiveness of k-anonymity approaches for protecting location privacy in the presence of various types of adversaries. The unraveling of the scheme unfolds the inconsistency b...

  10. An Anonymous Payment Protocol with Mobile Agents in Hostile Environments

    Institute of Scientific and Technical Information of China (English)

    LIU Yi; XIANG Ming-sen; WANG Yu-min

    2005-01-01

    By using Pedersen' s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous payment protocol which have following features:protecting the confidentiality of sensitive payment information from spying by malicious hosts; using a trusted third party in a minimal way; verifying the validity of the share by the merchant; allowing agent to verify that the product which it is about to receive is the one it is paying for; keeping the customer anonymous.

  11. Alcohol & drug abuse: Dual Diagnosis Anonymous of Oregon.

    Science.gov (United States)

    Monica, Corbett; Nikkel, Robert E; Drake, Robert E

    2010-08-01

    Many people with addictions report that support from peer groups fosters recovery. For people with co-occurring mental illnesses, dual-diagnosis peer support groups are considered helpful, but they are often unavailable. Recently, Dual Diagnosis Anonymous peer support groups have spread widely throughout Oregon as a complement to integrated dual diagnosis treatments. This column describes Dual Diagnosis Anonymous and its rapid implementation in Oregon.

  12. Towards a respondent-preferred ki-anonymity model

    Institute of Scientific and Technical Information of China (English)

    Kok-Seng WONG; Myung Ho KIM

    2015-01-01

    Recently, privacy concerns about data collection have received an increasing amount of attention. In data collection process, a data collector (an agency) assumed that all respondents would be comfortable with submitting their data if the published data was anonymous. We believe that this assumption is not realistic because the increase in privacy concerns causes some re-spondents to refuse participation or to submit inaccurate data to such agencies. If respondents submit inaccurate data, then the usefulness of the results from analysis of the collected data cannot be guaranteed. Furthermore, we note that the level of anonymity (i.e., k-anonymity) guaranteed by an agency cannot be verified by respondents since they generally do not have access to all of the data that is released. Therefore, we introduce the notion of ki-anonymity, where ki is the level of anonymity preferred by each respondent i. Instead of placing full trust in an agency, our solution increases respondent confidence by allowing each to decide the preferred level of protection. As such, our protocol ensures that respondents achieve their preferred ki-anonymity during data collection and guarantees that the collected records are genuine and useful for data analysis.

  13. Virginia Tech's Cook Counseling Center receives international counseling accreditation

    OpenAIRE

    DeLauder, Rachel

    2010-01-01

    The Virginia Tech Thomas E. Cook Counseling Center has been accredited by the International Association of Counseling Services, Inc., an organization of United States, Canadian, and Australian counseling agencies based in Alexandria, Va.

  14. Effective School Counseling Teams

    OpenAIRE

    Lilley, Stacey Custer

    2007-01-01

    Despite much attention given to effective teams in the workplace, school counseling teams have been neglected in the research. The primary purpose of this mixed methods study was to learn what characteristics secondary counselors perceive contribute to an effective school counseling team. The first research phase conducted six team interviews; themes emerging from the interviews yielded the development of the Effective School Counseling Team Questionnaire (ESCTQ). The following research quest...

  15. The 'reformation' of counselling

    Directory of Open Access Journals (Sweden)

    G.A. Lotter

    2001-08-01

    Full Text Available Although the Reformation took place some four hundred years ago, one area in which reformation is really needed today is the counselling of people. Since Wilhelm Wundt started the “study of the mind” in 1879, William James and Sigmund Freud followed and secular psychology gradually has developed to take the “front seat”; hence moving Biblical counselling, which has been practised since the times of the New Testament, to the “back burner”. This development had been going on for the greater part of the 20th century, up to the publication of Competent to Counsel by Jay E. Adams in 1970. In the model for counselling suggested by Adams, the principles of the Reformation of the sixteenth century, Soli Deo Gloria, Soli Scriptura, Soli Fidei, Sola Gratia, etc. were again implemented in assisting and counselling people with personal and interpersonal problems. The epistomological and anthropological approach of secular psychology differs radically from that of Biblical principles, thus necessitating a new “reformation” of counselling. Within this new form counselling, inter alia, implies the following: the Word of God has its rightful place, sin has to be taken seriously and the work of the Holy Spirit should be recognised. In this article it is proposed that the “reformation” of counselling was started by scholars with a Biblical Reformational approach and that this method of counselling followed the parameters of the Reformation of the sixteenth century. This “reformation” developed into a new direction in counselling and still continues today with fascinating new frontiers opening up for Biblical counselling.

  16. Crisis Counseling: An Overview

    Science.gov (United States)

    Sandoval, Jonathan; Scott, Amy Nicole; Padilla, Irene

    2009-01-01

    Psychologists working in schools are often the first contacts for children experiencing a potentially traumatizing event or change in status. This article reviews basic concepts in crisis counseling and describes the components of psychological first aid. This form of counseling must be developmentally and culturally appropriate as well as…

  17. Islamic approach in counseling.

    Science.gov (United States)

    Hanin Hamjah, Salasiah; Mat Akhir, Noor Shakirah

    2014-02-01

    A religious approach is one of the matters emphasized in counseling today. Many researchers find that there is a need to apply the religious element in counseling because religion is important in a client's life. The purpose of this research is to identify aspects of the Islamic approach applied in counseling clients by counselors at Pusat Kaunseling Majlis Agama Islam Negeri Sembilan (PKMAINS). In addition, this research also analyses the Islamic approach applied in counseling at PKMAINS with reference to al-Quran and al-Sunnah. This is a qualitative research in the form of case study at PKMAINS. The main method used in this research is interview. The research instrument used is interview protocol. The respondents in this study include 9 counselors who serve in one of the counseling centers in Malaysia. This study also uses questionnaire as an additional instrument, distributed to 36 clients who receive counseling service at the center. The findings of the study show that the Islamic approach applied in counseling at PKMAINS may be categorized into three main aspects: aqidah (faith), ibadah (worship/ultimate devotion and love for God) and akhlaq (moral conduct). Findings also show that the counseling in these aspects is in line with Islamic teachings as contained in al-Quran and al-Sunnah.

  18. Counseling in Singapore

    Science.gov (United States)

    Yeo, Lay See; Tan, Soo Yin; Neihart, Maureen F.

    2012-01-01

    Singapore, a tiny island nation, rose from 3rd- to 1st-world status in just 3 decades. Unlike in most developed countries, counseling in Singapore has a short history with faith-based beginnings and currently faces challenges to remain culturally relevant. The authors trace the development of Singapore's counseling services, provide an update…

  19. Selfishness, Greed, and Counseling.

    Science.gov (United States)

    Farrugia, David

    2002-01-01

    Although the concepts of greed and selfishness have often been used in discussions about human nature, there seems to be little attention to these characteristics in the disciplines of psychology and counseling. Considers characteristics of greed and selfishness as encountered in counseling from a multidisciplinary perspective and identifies…

  20. High Tech Counseling.

    Science.gov (United States)

    Hohenshil, Thomas H.

    2000-01-01

    Includes a discussion of technology's use in counseling at the beginning of the new millennium. Contains reviews and implications of several articles that appeared in the first issue of the "Journal of Technology in Counseling" and some recent technology related developments by the Association for Counselor Education and Supervision and…

  1. Perioperative counseling in children

    Directory of Open Access Journals (Sweden)

    Ioannis Koutelekos

    2012-10-01

    Full Text Available Counseling is a part of professional role of nurses and a prerequisite for holistic care. Aim: The aim of the present study was to review the literature about Counseling of children that undergo surgery. Material and method: The methodology οf this study included bibliography research from both the review and the research literature, between 2005-2009 mainly in the pubmed data base which referred to Counseling of children that undergo surgery, using the key words: Counseling, perioperative treatment, holistic care . Results: In the literature it is cited that counseling is provided by well trained and balanced individuals that have communication skills. Prerequisite of effective counseling is Conversation, where the nurse-consultant after elaborate listening proposes remarks, proposals, in order to enhance self-image, self-knowledge and self-esteem of the child and improve its’ personal emotional state. Perioperative counseling procedure as a part of the holistic care of children should follow and individualized approach either on preoperative and postoperative stage. Conclusion: Ultimate goal of effective counseling to children that undergo surgery is to improve the quality of provided care and increase the degree of satisfaction of hospitalized children and their families.

  2. Counseling with Exceptional Children

    Science.gov (United States)

    Tarver-Behring, Shari; Spagna, Michael E.

    2004-01-01

    Children and adolescents with disabilities are an extremely heterogeneous group of diverse learners, each with unique learning strengths and needs. Often misunderstood and frequently less served by the counseling profession, these children and adolescents need counseling services just as much as, if not more than, other children. Federal…

  3. Malpractice in Counseling Neuropsychology.

    Science.gov (United States)

    Woody, Robert Henley

    1992-01-01

    Responds to earlier four articles on integration of counseling psychology and neuropsychology by noting that neuropsychology occurs in settings with high risk of legal complaints. Contends that aspiration to press counseling psychology toward clinical neuropsychology should be filtered through consideration for legal risk. Explores legal…

  4. Publishing International Counseling Articles

    Science.gov (United States)

    Hohenshil, Thomas H.; Amundson, Norman E.

    2011-01-01

    This article begins with a rationale for including international articles in the "Journal of Counseling & Development." Then, 2 general categories of international articles are described. First are articles that provide a general overview of counseling in a particular country. The 2nd category is more general and might involve international…

  5. Restricted common data in anonymous E-cash system

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiang-jun; CHEN Ke-fei

    2006-01-01

    Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don't break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems.

  6. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  7. Sexual behaviours of clients of sex workers reported within phone calls at HIV/AIDS/STIs Italian Helpline

    Directory of Open Access Journals (Sweden)

    Ilaria Mulieri

    2013-06-01

    Full Text Available BACKGROUND: Clients of sex workers represent a relevant target for interventions aimed at the prevention of HIV and sexually transmitted infections (STIs. Within prevention strategies, the AIDS and sexually transmitted infections helpline (Telefono Verde AIDS/ IST, TVA-IST of National Institute of Health in Italy has provided, since 1987, specific information and counselling interventions. AIM: The present study reports data on anagraphical characteristics and behaviours of clients of sex workers, anonymously reported at TVA-IST in the period 1987-2010. DISCUSSION: Among 95 149 phone calls (14% of the total considered 99.5% came from males, over 80% aged under 37 years and prevalently from Northern Italy. Among sexual behaviours, unprotected sexual intercourses were reported in the 26% of the calls. Subjects under 27 years reported a higher frequency of unprotected anal intercourse, while they used protection with oral and vaginal intercourses in a greater extent than older ones. Due to differential behaviours within clients of sex workers, specific informative strategies for this targeted population should adequately consider age-related differences.

  8. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  9. Application of Steganography for Anonymity through the Internet

    CERN Document Server

    Bahi, Jacques M; Friot, Nicolas; Guyeux, Christophe

    2012-01-01

    In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve this goal, we propose an information hiding scheme being stego-secure, which is the highest level of security in a well defined and studied category of attacks called "watermark-only attack". This category of attacks is the best context to study steganography-based anonymity through the Internet. The steganalysis of our steganographic process is also studied in order to show it security in a real test framework.

  10. Clients' Willingness to Incorporate Religion or Spirituality in Counseling: A Brief Report

    Science.gov (United States)

    Diallo, Abdoulaye

    2013-01-01

    A total of 84 individuals with addiction issues (e.g., drugs, sex, weight, food, and codependency) were asked about their willingness to incorporate religion or spirituality in their counseling. These respondents expressed willingness to deal with religion or spirituality in counseling if the counselor was knowledgeable about their religion or…

  11. Medication counselling: physicians' perspective.

    Science.gov (United States)

    Bonnerup, Dorthe Krogsgaard; Lisby, Marianne; Eskildsen, Anette Gjetrup; Saedder, Eva Aggerholm; Nielsen, Lars Peter

    2013-12-01

    Medication reviews have the potential to lower the incidence of prescribing errors. To benefit from a medication review, the prescriber must adhere to medication counselling. Adherence rates vary from 39 to 100%. The aim of this study was to examine counselling-naive hospital physicians' perspectives and demands to medication counselling as well as study factors that might increase adherence to the counselling. The study was conducted as a questionnaire survey among physicians at Aarhus University Hospital, Denmark. The questionnaire was developed based on focus group interviews and literature search, and was pilot-tested among 30 physicians before being sent to 669 physicians. The questionnaire consisted of 35 items divided into four categories: attitudes (19 items), behaviours (3 items), assessment (8 items) and demographics (5 items). The response rate was 60% (400/669). Respondents were employed at psychiatric, medical or surgical departments. Eighty-five per cent of respondents agreed that patients would benefit of an extra medication review, and 72% agreed that there was a need for external medication counselling. The most important factor that could increase adherence was the clinical relevance of the counselling as 78% rated it of major importance. The most favoured method for receiving counselling was via the electronic patient record.

  12. Completely anonymous multi-recipient signcryption scheme with public verification.

    Science.gov (United States)

    Pang, Liaojun; Li, Huixian; Gao, Lu; Wang, Yumin

    2013-01-01

    Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant.

  13. Completely anonymous multi-recipient signcryption scheme with public verification.

    Directory of Open Access Journals (Sweden)

    Liaojun Pang

    Full Text Available Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant.

  14. Collecting substance use data with an anonymous mailed survey.

    Science.gov (United States)

    Trinkoff, A M; Storr, C L

    1997-10-25

    Because mailed surveys minimize personal contact, they are useful for collecting sensitive data on substance use, as long as the problems of achieving adequate response rates can be conquered. To address these issues, we report on an anonymous mailed survey of substance use with a 78% response rate, including data collection and survey methods. Analysis of sociodemographic effects on responding found certain groups required additional contacts. Substance use estimates were not affected by non-response bias, suggesting that anonymous mailed surveys can be a feasible means of collecting data on substance use.

  15. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  16. Impact of Knowledge on Election Time in Anonymous Networks

    OpenAIRE

    Dieudonné, Yoann; Pelc, Andrzej

    2016-01-01

    Leader election is one of the basic problems in distributed computing. For anonymous networks, the task of leader election is formulated as follows: every node v of the network must output a simple path, which is coded as a sequence of port numbers, such that all these paths end at a common node, the leader. In this paper, we study deterministic leader election in arbitrary anonymous networks. It is well known that leader election is impossible in some networks, regardless of the allocated am...

  17. 38 CFR 21.3100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.3100.... Chapter 35 Counseling § 21.3100 Counseling. (a) Purpose of counseling. The purpose of counseling is to...)) (b) Availability of counseling. Counseling assistance is available for— (1) Identifying and...

  18. Controlling Depersonalized Counseling.

    Science.gov (United States)

    Balistrieri, Tom

    1982-01-01

    Outlines Gestalt therapy techniques to increase active listening and counselor/client involvement in career counseling. Discusses awareness through dialog, role playing or "presentizing," and experiential "presentizing." Presents a sample dialog as illustration. (RC)

  19. Faceless sex: glory holes and sexual assemblages.

    Science.gov (United States)

    Holmes, Dave; O'Byrne, Patrick; Murray, Stuart J

    2010-10-01

    According to our previous research, the use of glory holes in public venues such as saunas and bathhouses is very popular. The popularity of glory holes is due in part to the anonymous sex that these architectural elements allow. This post-structuralist theoretical reflection seeks to understand the specific nature of anonymous public sex among bathhouse patrons, focusing on the links between desire-architecture-place-sexual practices. Drawing on interviews with glory hole users gathered during an ethnographic research project in bathhouses, this essay goes beyond traditional public health discourse to offer an original perspective on anonymous public sex. Utilizing the philosophy of Deleuze and Guattari's concepts of assemblages and machines, we re-theorize glory hole sex--what we call 'faceless sex'--and rethink the ways that desire is imbricated with our understanding of architecture, place, and public. Finally, we reflect upon the particular ethical challenges that are posed by these particular sexual practices, and ask whether a post-structuralist ethic might be possible.

  20. Social distance and anonymity modulate fairness consideration: An ERP study

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  1. Effects of Help, Anonymity, and Privacy on Children's Academic Expectations.

    Science.gov (United States)

    Bird, Lisa

    This study examined the effect of three aspects of the testing context--physical privacy, anonymity, and offers of help from a tester--on children's expectations. Performance of 96 11-year-old boys and girls on a pictorial recall memory task in a simulated test was evaluated. The subjects were divided into eight different groups varying on the…

  2. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually cue

  3. Father-Daughter Incest: Data from an Anonymous Computerized Survey

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel V. S.; Kommor, Martin J.

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were…

  4. Anonymity versus Perceived Patron Identity in Virtual Reference Transcripts

    Science.gov (United States)

    Roper, Kristin Grabarek; Sobel, Karen

    2012-01-01

    Librarians who provide virtual reference services often perceive that their patrons self-identify to some degree, even when transactions are anonymous. They also develop a sense of patrons' greatest research-related needs over time. In this article, two librarians analyze two years' worth of virtual reference transcripts to determine what patrons…

  5. Student Feedback, Anonymity, Observable Change and Course Barometers.

    Science.gov (United States)

    Jones, David

    A Course Barometer is a method for addressing the loss of informal feedback in a distance education setting. Originally proposed and used at the University of Trollhattan Uddevella this paper describes how the idea of a course barometer has been adopted by Central Queensland University. The paper suggests connections between anonymity, observable…

  6. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    A. van Drie; R.R. Ganzevoort; M. Spiering

    2013-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria o

  7. ANONYMOUS OFF-LINE ELECTRONIC PAYMENT SYSTEM WITH MULTIPLE BANKS

    Institute of Scientific and Technical Information of China (English)

    Liang Jian; Ao Qingyun; Chen Ying

    2001-01-01

    This letter presents an anonymous off-line electronic payment model with multiple issuing-banks and gives an implementation scheme based on the discrete logarithm problem and the random oracle model. Comparing with previous works, the proposed scheme benefits from no involvement of customer group authority and its security depends on the known difficulty of resolving general discrete logarithm problem.

  8. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  9. Anonymously Productive and Socially Engaged While Learning at Work

    Science.gov (United States)

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  10. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    van Drie, A.; Ganzevoort, R.R.; Spiering, M.

    2014-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria o

  11. Role Engagement and Anonymity in Synchronous Online Role Play

    Directory of Open Access Journals (Sweden)

    Sarah Cornelius

    2011-06-01

    Full Text Available Role play activities provide opportunities for learners to adopt unfamiliar roles, engage in interactions with others, and get involved in realistic tasks. They are often recommended to foster the development of soft skills and a wider perspective of the world. Such activities are widely used as an online teaching approach, with examples ranging from the simple use of email to the employment of virtual worlds and Web 2.0 technologies.This paper provides a case study of a role play activity which employs real-time anonymous discussion forums and aims to improve our understanding of effective role play and the impact of anonymity. This role play has been effective in educating learners about different perspectives on the issue of Quality in Further Education. The context and implementation of the role play are outlined, and the learners’ interactions and experiences are explored using an investigative analysis of discussion transcripts and semi-structured interviews with participants. The findings suggest that role engagement and anonymity are important components for success in synchronous online role play. Evidence is presented that provides an insight into the factors which encourage role engagement, including prior experiences and contributions from peers. The impact of anonymity is also explored since many participants did not regard the study environment as real and attempted to identify their peers.

  12. Social distance and anonymity modulate fairness consideration: An ERP study.

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-08-21

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity.

  13. A Generic Framework for Anonymous Authentication in Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Jing Xu; Wen-Tao Zhu

    2013-01-01

    Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication,processing and storage capabilities.In this paper,we present a generic construction that converts any existing secure password authentication scheme based on a smart card into an anonymous authentication scheme for roaming services.The security proof of our construction can be derived from the underlying password authentication scheme employing the same assumptions.Compared with the original password authentication scheme,the transformed scheme does not sacrifice the authentication efficiency,and additionally,an agreed session key can be securely established between an anonymous mobile user and the foreign agent in charge of the network being visited.Furthermore,we present an instantiation of the proposed generic construction.The performance analysis shows that compared with other related anonymous authentication schemes,our instantiation is more efficient.

  14. Leader election in anonymous rings: Franklin goes probabilistic

    NARCIS (Netherlands)

    Bakhshi, R.; Fokkink, W.J.; Pang, J.; Pol, J.C. van de; Ausiello, G.

    2008-01-01

    We present a probabilistic leader election algorithm for anonymous, bidirectional, asynchronous rings. It is based on an algorithm from Franklin, augmented with random identity selection, hop counters to detect identity clashes, and round numbers modulo 2. As a result, the algorithm is finite-state,

  15. Leader Election in Anonymous Rings: Franklin Goes Probabilistic

    NARCIS (Netherlands)

    Bakhshi, Rena; Fokkink, Wan; Pang, Jun; Pol, van de Jaco; Ausiello, G.; Karhumäki, J.; Mauri, G.; Ong, L.

    2008-01-01

    We present a probabilistic leader election algorithm for anonymous, bidirectional, asynchronous rings. It is based on an algorithm from Franklin, augmented with random identity selection, hop counters to detect identity clashes, and round numbers modulo 2. As a result, the algorithm is finite-state,

  16. Evaluation of a nurse-led haemophilia counselling service.

    LENUS (Irish Health Repository)

    O'Shea, Eadaoln

    2012-01-01

    Genetic counselling and testing for females with a family history of haemophilia has long been advocated. However, there is little research in regard to clients\\' satisfaction with the existing counselling models in haemophilia, and in particular with nurse-led clinics. The purpose of this study was to evaluate whether clients were satisfied with a nurse-led carrier testing clinic and counselling service. A retrospective quantitative study of clients\\' satisfaction and perceived knowledge was undertaken using an anonymous questionnaire. A sample of 42 women who had attended the clinic in the last 12 months was identified. The response rate for the study was 71% (n = 30).Two thirds of the respondents were 35 years of age or younger, 93% had a family history of haemophilia and 56% were diagnosed as carriers. Perceived understanding and knowledge increased significantly between the first and second appointments (p < 0.001). Overall, the study identified a high level of client satisfaction with the nurse-led carrier testing clinic and counselling service.

  17. "Counseling and Values" Publication Patterns from 1990 to 2009

    Science.gov (United States)

    Erford, Bradley T.; Erford, Breann M.; Hoffman, Caren; Erford, Matthew R.

    2013-01-01

    The authors reviewed publication patterns for articles published from 1990 to 2009 in the journal "Counseling and Values". Article content and author demographic characteristics (i.e., sex of authors, nation of domicile, employment setting of authors, frequently contributing individuals and universities) were analyzed by 5-year periods for trends…

  18. Pursuing Therapeugenic Consequences of Restricting Client Smoking during Counseling.

    Science.gov (United States)

    Schneider, Lawrence J.; Dearing, Nancy

    Theorists and therapists have become increasingly attentive to the role of interpersonal behaviors that facilitate or hinder the ability of the counselor to exert influence over the client during counseling. A study was conducted to examine the impact of a counselor's preference that clients not smoke, client stress levels, client sex, and…

  19. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  20. Behavioral Risk Profile of Men Who Have Sex with Men in Beijing, China: Results from a Cross-sectional Survey with Randomized Response Techniques

    Institute of Scientific and Technical Information of China (English)

    Guo-Zhu Geng; Ge Gao; Yu-Hua Ruan; Ming-Run Yu; Yun-Hua Zhou

    2016-01-01

    Background:Human immunodeficiency virus (HIV) is spreading rapidly among men who have sex with men (MSM) in China.Anonymous questionnaires or direct interviews have been frequently used to study their behavior.The aim of the study was to describe the behavioral risk profile of the MSM in Beijing using the randomized response techniques (RRTs).Methods:A cross-sectional survey of sexual behavior among a sample of MSM was conducted in two HIV counseling and testing clinics in Beijing.The survey was carried out with an anonymous questionnaire containing sensitive questions on sexual behavior.To obtain the honest responses to the sensitive questions,three distinctive RRTs were used in the questionnaire:(1) Additive randomized response model for quantitative questions,(2) randomized response model for multiple choice questions,and (3) Simmons randomized response model for binomial questions.Formulae for the point estimate,variance,and confidence interval (CI) were provided for each specific model.Results:Using RRTs in a sample of 659 participants,the mean age at first homosexual encounter was estimated to be 21.7 years (95% CI:21.2-22.2),and each had sex with about three (2.9,95% CI:2.4-3.4) male partners on average in the past month.The estimated rate for consistent condom use was 56.4% (95% CI:50.1-62.8%).In addition,condom was estimated to be used among 80.0% (95% CI:74.1-85.9%) of the population during last anal sex with a male partner.Conclusions:Our study employed RRTs in a survey containing questions on sexual behavior among MSM,and the results showed that RRT might be a useful tool to obtain truthful feedback on sensitive information such as sexual behavior from the respondents,especially in traditional Chinese cultural settings.

  1. A Comparison of Telephone Genetic Counseling and In-Person Genetic Counseling from the Genetic Counselor's Perspective.

    Science.gov (United States)

    Burgess, Kelly R; Carmany, Erin P; Trepanier, Angela M

    2016-02-01

    Growing demand for and limited geographic access to genetic counseling services is increasing the need for alternative service delivery models (SDM) like telephone genetic counseling (TGC). Little research has been done on genetic counselors' perspectives of the practice of TGC. We created an anonymous online survey to assess whether telephone genetic counselors believed the tasks identified in the ABGC (American Board of Genetic Counseling) Practice Analysis were performed similarly or differently in TGC compared to in person genetic counseling (IPGC). If there were differences noted, we sought to determine the nature of the differences and if additional training might be needed to address them. Eighty eight genetic counselors with experience in TGC completed some or all of the survey. Respondents identified differences in 13 (14.8%) of the 88 tasks studied. The tasks identified as most different in TGC were: "establishing rapport through verbal and nonverbal interactions" (60.2%; 50/83 respondents identified the task as different), "recognizing factors affecting the counseling interaction" (47.8%; 32/67), "assessing client/family emotions, support, etc." (40.1%; 27/66) and "educating clients about basic genetic concepts" (35.6%; 26/73). A slight majority (53.8%; 35/65) felt additional training was needed to communicate information without visual aids and more effectively perform psychosocial assessments. In summary, although a majority of genetic counseling tasks are performed similarly between TGC and IPGC, TGC counselors recognize that specific training in the TGC model may be needed to address the key differences.

  2. Time Lag and Anonymity as Variables in Student Evaluation of Curricula

    Science.gov (United States)

    Pierce, Walter D.; Getz, Howard G.

    1975-01-01

    The major concern of this study was the effect on evaluation data of anonymity and differing time spans between completion of specific programs by students and their responses to anonymous questionnaires. (Author)

  3. Factors associated with failure to return for HIV test results in a free and anonymous screening centre.

    Science.gov (United States)

    Laanani, Moussa; Dozol, Adrien; Meyer, Laurence; David, Stéphane; Camara, Sékou; Segouin, Christophe; Troude, Pénélope

    2015-07-01

    Free and anonymous screening centres (CDAG: Centres de Depistage Anononyme et Gratuit) are public facilities set up for HIV infection diagnosis in France. Some people visiting CDAG fail to return for test results and are not informed of their serology. This study aimed to assess factors associated with failure to return for HIV test results. Patients visiting the Fernand-Widal CDAG (Paris) for an HIV test in January-February 2011 were eligible to take part in the study. Data were collected with an anonymous self-administered questionnaire. Factors associated with failure to return were assessed using logistic regression models. Of the 710 participants (participation rate 88%), 46 patients failed to return. Not specifying birthplace and not living in the region of Paris were associated with failure to return. Those who perceived no risk of HIV infection and those who felt they were more at risk than other people were both statistically associated with failure to return. Self-perceived risk seemed to be of chief concern for failure to return for HIV test results and should be considered during pre-test counselling.

  4. The Ghosts of Counseling Psychology: Is Counseling Research Really Dead?

    Science.gov (United States)

    Murdock, Nancy L.

    2011-01-01

    Scheel et al. offer an interesting analysis on the publication rate of counseling-related research articles in counseling psychology's two major journals. In this reaction to their work, the author considers various aspects of their results and contemplates possible explanations for the decline of counseling-related publications. The author…

  5. Application of Adaptive Counseling and Therapy to Career Counseling.

    Science.gov (United States)

    Anderson, Mary Z.; Tracey, Terence J.

    1995-01-01

    Adaptive Counseling and Therapy theory predicts that counseling efficacy depends on a match between counselor style and client readiness. Data from 137 females and 54 males showed a negative relationship between client readiness and preference for directive counseling and a curvilinear (inverted U) relationship between readiness and preference for…

  6. Health counseling of adolescents.

    Science.gov (United States)

    Joffe, A; Radius, S M

    1991-05-01

    Health counseling is a fundamental aspect of health care for adolescents and is a natural extension of the concept of anticipatory guidance. It is a dynamic process involving active participation by adolescents. Pediatricians are a valued source of health-relevant information, but must also recognize how their attitudes and beliefs can affect the counseling process. Knowledge of the multitude of changes occurring during adolescence and an understanding of the role of health-risking behaviors in meeting various developmental needs are critical to successful counseling. Particular attention must be focused on ways to help adolescents develop the skills necessary to maintain health-promoting lifestyles and to resist peer pressure to engage in health-risking behaviors.

  7. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  8. Compromising Tor Anonymity Exploiting P2P Information Leakage

    CERN Document Server

    Manils, Pere; Blond, Stevens Le; Kaafar, Mohamed Ali; Castelluccia, Claude; Legout, Arnaud; Dabbous, Walid

    2010-01-01

    Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak information that may compromise the identity of its users. In this paper, we first present three attacks targeting BitTorrent users on top of Tor that reveal their real IP addresses. In a second step, we analyze the Tor usage by BitTorrent users and compare it to its usage outside of Tor. Finally, we depict the risks induced by this de-anonymization and show that users' privacy violation goes beyond BitTorrent traffic and contaminates other protocols such as HTTP.

  9. Anonymous Card Shuffling and its Applications to Parallel Mixnets

    CERN Document Server

    Goodrich, Michael T

    2012-01-01

    We study the question of how to shuffle $n$ cards when faced with an opponent who knows the initial position of all the cards {\\em and} can track every card when permuted, {\\em except} when one takes $K< n$ cards at a time and shuffles them in a private buffer "behind your back," which we call {\\em buffer shuffling}. The problem arises naturally in the context of parallel mixnet servers as well as other security applications. Our analysis is based on related analyses of load-balancing processes. We include extensions to variations that involve corrupted servers and adversarially injected messages, which correspond to an opponent who can peek at some shuffles in the buffer and who can mark some number of the cards. In addition, our analysis makes novel use of a sum-of-squares metric for anonymity, which leads to improved performance bounds for parallel mixnets and can also be used to bound well-known existing anonymity measures.

  10. Secure Web Transaction with Anonymous Mobile Agent over Internet

    Institute of Scientific and Technical Information of China (English)

    WANG ChangJie(王常杰); ZHANG FangGuo(张方国); WANG YuMin(王育民)

    2003-01-01

    A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, a new secure anonymous mobile agent scheme is proposed for the prevention of agent tempering without compromising the mobility or autonomy of the agent. In the scheme, a mobile agent can produce valid signature on website's bid (it means to transact a contact with the web site) on behalf of its customer, without revealing the customer's real private key. In addition, the anonymity of the customer is also achieved when its agent transacts with the websites. Furthermore, the customer who issues a malicious agent or denies the transaction can be identified and detected by Agent Management Center (AMC). Therefore, the scheme is practical in the future electronic commerce over Internet.

  11. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    Science.gov (United States)

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  12. Managed Care, Ethics, and Counseling.

    Science.gov (United States)

    Daniels, Jeffrey A.

    2001-01-01

    Addresses issues of managed care and ethics and how they relate to counseling. Specifically reviews a recent article published in "The Counseling Psychologist" (2000). Explores implications for counselors and counselor educators. (Author/GCP)

  13. Some Approaches for Counseling Students

    Science.gov (United States)

    Craig, David G.

    1970-01-01

    Suggests teachers use following steps in counseling students: preparation, introduction, problem definition, solution identification, information gathering, decision making, and follow-up. Discusses role of teacher in directive and non-directive counseling. (DM)

  14. Kierkegaard's Philosophy: Implications for Counseling.

    Science.gov (United States)

    Dopson, Lorraine; Gade, Eldon

    1981-01-01

    Discusses how the philosophy of Soren Kierkegaard can provide useful guidelines for the study of the counseling process. Compares Kierkegaard's philosophy with selected contributions of Freud, Skinner, Rogers, and May and with four common themes of counseling and psychotherapy. (Author)

  15. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  16. "Un-Googling” publications: The ethics and problems of anonymization

    DEFF Research Database (Denmark)

    Shklovski, Irina; Vertesi, Janet

    2013-01-01

    to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...... to the HCI community to take up this discussion not only as an ethical consideration but also as a socio-technical research and design opportunity....

  17. Mobile Anonymous Trust Based Routing Using Ant Colony Optimization

    Directory of Open Access Journals (Sweden)

    R. Kalpana

    2012-01-01

    Full Text Available Problem statement: Ad hoc networks are susceptible to malicious attacks through denial of services, traffic analysis and spoofing. The security of the ad hoc routing protocol depends upon encryption, authentication, anonymity and trust factors. End-to-end security of data is provided by encryption and authentication, topology information of the nodes can be obtained by studying traffic and routing data. This security problem of ad hoc network is addressed by the use of anonymity mechanisms and trust levels. Identification information like traffic flow, network topology, paths from malicious attackers is hidden in anonymous networks. Similarly, trust plays a very important role in the intermediate node selection in ad hoc networks. Trust is essential as selfish and malicious nodes not only pose a security issue but also decreases the Quality of Service. Approach: In this study, a routing to address anonymous routing with a trust which improves the overall security of the ad hoc network was proposed. A new approach for an on demand ad-hoc routing algorithm, which was based on swarm intelligence. Ant colony algorithms were a subset of swarm intelligence and considered the ability of simple ants to solve complex problems by cooperation. The interesting point was, that the ants do not need any direct communication for the solution process, instead they communicate by stigmergy. The notion of stigmergy means the indirect communication of individuals through modifying their environment. Several algorithms which were based on ant colony problems were introduced in recent years to solve different problems, e.g., optimization problems. Results and Conclusion: It is observed that the overall security in the network improves when the trust factor is considered. It is seen that non performing nodes are not considered due to the proposed ACO technique.

  18. [Couples counseling with Latinos].

    Science.gov (United States)

    Zumaya, Mario

    2011-01-01

    Intimate ties and emotional relationship gain the function to confirm, to stabilize and, afterwards, to structure the coherency's model of the structured self-organization up to that moment. When the couple perceives the bond of the relationship such as a sole and exclusive for a person, they take a leading role to be able to deduce a sense of individuality and uniqueness in the way to feel himself in the world. Based on these considerations, in this paper I propose a brief description of a counselling method, which characterises the work I am carrying out since several years in the counselling and therapy with couples.

  19. Beyond Spaces of Counselling

    DEFF Research Database (Denmark)

    Bank, Mads; Nissen, Morten

    2015-01-01

    The article articulates experiments with spatial constructions in two Danish social work agencies, basing on a) a sketchy genealogical reconstruction of conceptualisations and uses of space in social work and counselling; b) a search for theoretical resources to articulate new spaces, and c) data...... from a long-standing collaboration with the social workers. Beside the classical disciplinary and pastoral spaces, we find spaces of attunement, spaces of production, and public spaces as forms of spatialisations which might be taken as prototypical in attempts to develop social work and counselling....

  20. 38 CFR 21.5100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.5100.... Chapter 32 Counseling § 21.5100 Counseling. (a) Purpose. The purpose of counseling is: (1) To assist in... of counseling. Counseling assistance in available for— (1) Identifying and removing reasons...

  1. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  2. An Analysis of Anonymity in the Bitcoin System

    CERN Document Server

    Reid, Fergal

    2011-01-01

    Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the oneto- many mapping between users and public-keys and associate information external to the system with the users. Bitcoin frustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approx...

  3. AATCT: Anonymously Authenticated Transmission on the Cloud with Traceability

    Directory of Open Access Journals (Sweden)

    Maged Hamada Ibrahim

    2015-09-01

    Full Text Available In Cloud computing, anonymous authentication is an important service that must be available to users in the Cloud. Users have the right to remain anonymous as long as they behave honestly. However, in case a malicious behavior is detected, the system – under court order – must be able to trace the user to his clear identity. Most of the proposed authentication schemes for the Cloud are either password-based authentication schemes that are vulnerable to offline dictionary attacks, or biometric-based authentication schemes that take a long time of execution specially in case of high security requirements. In this paper, we propose an efficient and secure scheme to non-interactively authenticate the users on the Cloud to the remote servers while preserving their anonymity. In case of accusations, the registration authority is able to trace any user to his clear identity. We avoid using low entropy passwords or biometric mechanisms, instead, we employ pseudonym systems in our design. The computation complexity and storage requirements are efficient and suitable to be implemented on smart cards/devices. Our proposed scheme withstands challenging adversarial attacks such as, stolen databases attacks, databases insertion attacks, impersonation attacks, replay attacks and malicious users/servers collaboration attacks.

  4. Reversible Anonymization of DICOM Images using Cryptography and Digital Watermarking

    Directory of Open Access Journals (Sweden)

    Lhoussain ELFADIL

    2012-04-01

    Full Text Available Digital Imaging and Communications in Medicine (DICOM is a standard for handling, storing, printing, and transmitting information in medical images. The DICOM file contains the image data and a number of attributes such as identified patient data (name, age, insurance ID card,…, and non-identified patient data (doctor’s interpretation, image type,…. Medical images serve not only for examination, but can also be used for research and education purposes. For research they are used to prevent illegal use of information; before authorizing researchers to use these images, the medical staff deletes all the data which would reveal the patient identity to prevent patient privacy. This manipulation is called anonymization. In this paper, we propose a reversible anonymization of DICOM images. Identifying patient data with image digest, computed by the well-known SHA-256 hash function, are encrypted using the proposed probabilistic public key crypto-system. After compressing the Least Significant Bit (LSB bitplan of the image using Hofmann coding algorithm, the encrypted data is inserted into a liberated zone of the LSB bitplan of the image. The proposed method allows researchers to use anonymous DICOM images and keep to authorized staff -if necessary- the possibility to return to the original image with all related patient data.

  5. Utility-guided Clustering-based Transaction Data Anonymization

    Directory of Open Access Journals (Sweden)

    Aris Gkoulalas-Divanis

    2012-04-01

    Full Text Available Transaction data about individuals are increasingly collected to support a plethora of applications, spanning from marketing to biomedical studies. Publishing these data is required by many organizations, but may result in privacy breaches, if an attacker exploits potentially identifying information to link individuals to their records in the published data. Algorithms that prevent this threat by transforming transaction data prior to their release have been proposed recently, but they may incur significant utility loss due to their inability to: (i accommodate a range of different privacy requirements that data owners often have, and (ii guarantee that the produced data will satisfy data owners’ utility requirements. To address this issue, we propose a novel clustering-based framework to anonymizing transaction data, which provides the basis for designing algorithms that better preserve data utility. Based on this framework, we develop two anonymization algorithms which explore a larger solution space than existing methods and can satisfy a wide range of privacy requirements. Additionally, the second algorithm allows the specification and enforcement of utility requirements, thereby ensuring that the anonymized data remain useful in intended tasks. Experiments with both benchmark and real medical datasets verify that our algorithms significantly outperform the current state-of-the-art algorithms in terms of data utility, while being comparable in terms of efficiency.

  6. Do Counseling and Marketing Mix?

    Science.gov (United States)

    Fong-Beyette, Margaret L.

    1988-01-01

    Responds to Wittman's previous article on counseling and marketing by discussing concerns about two of Wittman's purposes for use of marketing: improved services in consumers and economic survival of counseling profession. Agrees that counseling profession needs to understand basic marketing principles used by business and health care industry;…

  7. Contemporary Counseling: Services, Applications, Issues.

    Science.gov (United States)

    Humes, Charles W.

    This book was written to serve as a basic text in courses that overview the use of counseling services and to serve as a useful reference for counseling practitioners. It is designed to stress counseling services in different settings (social agencies, mental health centers, schools, business/industry, correctional institutions, and private…

  8. First Cycle Counselling.

    Science.gov (United States)

    Darska, Anna

    1981-01-01

    Investigations are described that were carried out by the Centre d'Information de Documentation et d'Orientation of the Rene Descartes University to find an answer to the counseling problems arising from student admission, through coursework, and upon leaving the university to start a career. (Author/MLW)

  9. Counseling in Italy

    Science.gov (United States)

    Remley, Theodore P.; Bacchini, Eugenio; Krieg, Paul

    2010-01-01

    The counseling profession in Italy is in an early stage of development. No university preparation programs exist, and counselors are not employed in schools. Counselors maintain private practices, work in agencies, and are employed by the government. Counselors receive their preparation in Italy from professional associations in programs that…

  10. Counseling Skills for Teachers

    Science.gov (United States)

    Kottler, Jeffrey A.; Kottler, Ellen

    2006-01-01

    By necessity, today's teachers do much more than deliver instruction. In the classroom, on the playground, or even in the parking lot, teachers are often called upon to respond quickly and appropriately to students' social and emotional needs, drawing from instinct more than anything else. In this second edition of "Counseling Skills for…

  11. Counseling Third Culture Kids.

    Science.gov (United States)

    Barringer, Carolyn Fox

    Third Culture Kids (TCKs) represent a group of youth who have lived overseas with their families for business, service, or missionary work. The implications of living in multiple cultures, especially during the developmental and formative years of youth, warrant investigation. This study informs the US counseling community about the…

  12. Counseling and Transcendental Philosophy

    Science.gov (United States)

    Donceel, Joseph

    1971-01-01

    An acquaintance with the different philosophies of human nature is an invaluable asset for counseling. The author presents a modern Christian concept of man with emphasis on contributions of Aristotle and St. Thomas Aquinas and elements from modern philosophy. Its two main concerns are man's spirit and man's knowledge and will. (Author/CG)

  13. A Maslovian Counseling Method.

    Science.gov (United States)

    Kirkpatrick, J. Stephen

    1979-01-01

    With Maslow's hierarchy as a basis, the model provides structure for setting goals in counseling cases and overall programs. Different kinds of client concerns are identified, and suggestions are made for using these 14 categories. The article includes specific suggestions for using the model in diagnosis, evaluation, counselor education, and…

  14. Effects of a short individually tailored counselling session for HIV prevention in gay and bisexual men receiving Hepatitis B vaccination

    NARCIS (Netherlands)

    M.E.G. Wolfers (Mireille); J.B.F. de Wit (John); H.J. Hospers (Harm Jan); J.H. Richardus (Jan Hendrik); O. de Zwart (Onno)

    2009-01-01

    textabstractBackground. There is currently a trend towards unsafe unprotected anal intercourse (UAI) among men who have sex with men. We evaluated a short individual counselling session on reducing UAI among gay and bisexual men. Methods. A quasi-experimental design was used to evaluate the counsell

  15. The implications of stigma and anonymity for self-disclosure in health blogs.

    Science.gov (United States)

    Rains, Stephen A

    2014-01-01

    The reported study examines the implications of anonymity and stigma in the form of illness-related embarrassment for self-disclosure in the context of health blogging. Drawing from theorizing about anonymous communication and stigma, anonymity is argued to be strategically used by individuals who are embarrassed by their illness and to moderate the relationship between embarrassment and self-disclosure. Data from 114 individuals who blog about their experiences coping with a health condition were examined to test study hypotheses. Illness-related embarrassment was positively associated with anonymity. Additionally, anonymity moderated the relationship between embarrassment and self-disclosure. Among bloggers with relatively higher levels of anonymity, illness-related embarrassment was positively associated with self-disclosure. The results suggest that anonymity is strategically used and fosters self-disclosure among individuals who are embarrassed by their illness.

  16. Osteopathic medical student administered smoking cessation counseling is an effective tool

    Directory of Open Access Journals (Sweden)

    Barbara Capozzi

    2016-01-01

    Full Text Available Background: Physician counseling on the risks of tobacco smoking and the benefits of cessation has been shown to be an effective method of increasing the rate of smoking cessation. Using the "Help Your Patients Quit Smoking: A Coaching Guide" also referred to as the "7A′s of Smoking Cessation" guideline from the New York City Department of Health and Mental Hygiene is thought to be effective to convey the importance of smoking cessation. Aim: To study the efficacy of the "7A′s of Smoking Cessation" guideline counseling conducted by osteopathic medical students. Materials and Methods: Osteopathic medical students were trained to counsel smokers for 3-10 min based on New York City Department of Health′s "7A′s of Smoking Cessation" guidelines by a licensed physician. Students then counseled health fair participants who were cigarette smokers for 3-10 min. Postcounseling, participants were administered an 4 question survey to evaluate the effect counseling had on their desire to quit smoking. Survey data were collected and analyzed. Institutional Review Board approval was obtained for this study. Results: A total of 13 anonymous health fair participants who were also smokers were administered both counseling sessions and surveys. 11/13 (84.6% participants stated that the session motivated them to quit smoking. 9/13 (69.2% participants responded that they were now motivated to discuss smoking cessation with their doctor after being counseled. Of these participants 12/13 (92.3% had previously attempted to quit smoking without success. Conclusion: Participants reported an increased willingness to stop smoking after being counseled by osteopathic medical students. Participants also reported an increased motivation to discuss smoking cessation with their physician. These findings indicate that smoking cessation counseling administered by osteopathic medical students effectively in encouraging smokers to consider reduction or cessation of tobacco

  17. Same-Sex Partner Bereavement.

    Science.gov (United States)

    Patlamazoglou, Lefteris; Simmonds, Janette G; Snell, Tristan L

    2017-01-01

    The experience of same-sex-attracted people who have lost a partner is neglected in the existing literature on bereavement. Previous research on lesbian, gay, bisexual, transgender, intersex, queer and questioning (LGBTIQ) populations tends to focus on the loss of a partner to HIV-related causes, and there is scant research concerning non-HIV-related bereavement. The purpose of this article is to investigate the non-HIV-related bereavement experiences of same-sex partners and to address the potential complications of disenfranchised grief. Coping with the loss of a same-sex partner and the impact of bereavement on subsequent relationships are also discussed. Implications for counseling of bereaved same-sex-attracted individuals are drawn, and recommendations for future psychological research on the experience of bereavement are made.

  18. Quantum election scheme based on anonymous quantum key distribution

    Institute of Scientific and Technical Information of China (English)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented,based on which we construct a quantum election scheme without the help of an entanglement state.We show that this election scheme ensures the completeness,soundness,privacy,eligibility,unreusability,fairness,and verifiability of a large-scale election in which the administrator and counter are semi-honest.This election scheme can work even if there exist loss and errors in quantum channels.In addition,any irregularity in this scheme is sensible.

  19. A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION

    Directory of Open Access Journals (Sweden)

    Manabu Okamoto

    2011-10-01

    Full Text Available Electronic voting is an important application for security protocols. Most existing voting schemes aredesigned for elections in which each voter has only one ballot. However, some elections permit voters tocast multiple ballots. In this paper, we present a new voting scheme in which each voter can havemultiple ballots, and can vote for multiple candidates. The proposed scheme allows the voter to simplypick their candidates and post a single encrypted message. Anonymous distribution of secret informationis used so that no one knows which information is being passed to whom.

  20. Predictors of return rate for an HIV-positive result in a French Voluntary Counseling and Testing centre.

    Science.gov (United States)

    Pahlavan, Golriz; Burdet, Charles; Laouénan, Cédric; Guiroy, Frédérique; Bouscarat, Fabrice; Tosini, William; Yazdanpanah, Yazdan; Bouvet, Elisabeth

    2015-01-01

    Bichat Hospital's free and anonymous Voluntary Counseling and Testing centre in Paris is widely visited, with a high rate of HIV-positive diagnosis. This study proposed, in this centre, to describe the HIV newly-diagnosed patients over an 8-year period and to determinate risk factors for failure to return for a positive result. Higher risk for failure to return was found among the heterosexual subjects regardless of their socio-economic background.

  1. Rett syndrome molecular diagnosis and implications in genetic counseling

    Directory of Open Access Journals (Sweden)

    Noruzinia M

    2007-01-01

    Full Text Available Rett syndrome is a rare genetic X-linked dominant disorder. This syndrome is the most frequent cause of mental retardation in girls. In the classical form of the disease, the presenting signs and the course of development are characteristic. However clinical diagnosis can be very difficult when the expression is not in the classical form. Mutations in MeCP2 are responsible for 80% of cases. When MeCP2 mutation is found in an index case, genetic counseling is similar to that in other X-linked dominant genetic diseases. However, mutations in this gene can cause a spectrum of atypical forms. On the other hand, other genetic conditions like translocations, sex chromosome numerical anomalies, and mutations in other genes can complicate genetic counseling in this syndrome. We present the first case of molecular diagnosis of Rett syndrome in Iran and discuss the recent developments in its genetic counseling.

  2. Individualised motivational counselling to enhance adherence to antiretroviral therapy is not superior to didactic counselling in South African patients: findings of the CAPRISA 058 randomised controlled trial.

    Science.gov (United States)

    van Loggerenberg, Francois; Grant, Alison D; Naidoo, Kogieleum; Murrman, Marita; Gengiah, Santhanalakshmi; Gengiah, Tanuja N; Fielding, Katherine; Abdool Karim, Salim S

    2015-01-01

    Concerns that standard didactic adherence counselling may be inadequate to maximise antiretroviral therapy (ART) adherence led us to evaluate more intensive individualised motivational adherence counselling. We randomised 297 HIV-positive ART-naïve patients in Durban, South Africa, to receive either didactic counselling, prior to ART initiation (n = 150), or an intensive motivational adherence intervention after initiating ART (n = 147). Study arms were similar for age (mean 35.8 years), sex (43.1 % male), CD4+ cell count (median 121.5 cells/μl) and viral load (median 119,000 copies/ml). Virologic suppression at 9 months was achieved in 89.8 % of didactic and 87.9 % of motivational counselling participants (risk ratio [RR] 0.98, 95 % confidence interval [CI] 0.90-1.07, p = 0.62). 82.9 % of didactic and 79.5 % of motivational counselling participants achieved >95 % adherence by pill count at 6 months (RR 0.96, 95 % CI 0.85-1.09, p = 0.51). Participants receiving intensive motivational counselling did not achieve higher treatment adherence or virological suppression than those receiving routinely provided didactic adherence counselling. These data are reassuring that less resource intensive didactic counselling was adequate for excellent treatment outcomes in this setting.

  3. Quantum anonymous voting with unweighted continuous-variable graph states

    Science.gov (United States)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-08-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  4. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  5. IdentiDroid: Android can finally Wear its Anonymous Suit

    Directory of Open Access Journals (Sweden)

    Bilal Shebaro

    2014-04-01

    from applications when the smartphone is used under the anonymous modality. They are re-instated back when the smartphone returns to work in the normal modality. In addition, both solutions offer protection from applications that identify their users through traces left in the application's data storage or through exchanging identifying data messages. We developed IdentiDroid, a customized Android operating system, to deploy these solutions and built IdentiDroid Profile Manager, a profile-based configuration tool that allows one to set different configurations for each installed Android application. With this tool, applications running within the same device are configured to be given different identifications and privileges to limit the uniqueness of device and user information. We analyzed 250 Android applications to determine what information, services, and permissions can identify users and devices. Our experiments show that when IdentiDroid is deployed and properly configured on Android devices, users' anonymity is better guaranteed by either of the proposed solutions with no significant impact on most device applications.

  6. Nonexposure Accurate Location K-Anonymity Algorithm in LBS

    Directory of Open Access Journals (Sweden)

    Jinying Jia

    2014-01-01

    Full Text Available This paper tackles location privacy protection in current location-based services (LBS where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. Location cloaking has been proposed and well studied to protect user privacy. It blurs the user’s accurate coordinate and replaces it with a well-shaped cloaked region. However, to obtain such an anonymous spatial region (ASR, nearly all existent cloaking algorithms require knowing the accurate locations of all users. Therefore, location cloaking without exposing the user’s accurate location to any party is urgently needed. In this paper, we present such two nonexposure accurate location cloaking algorithms. They are designed for K-anonymity, and cloaking is performed based on the identifications (IDs of the grid areas which were reported by all the users, instead of directly on their accurate coordinates. Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.

  7. Nonexposure accurate location K-anonymity algorithm in LBS.

    Science.gov (United States)

    Jia, Jinying; Zhang, Fengli

    2014-01-01

    This paper tackles location privacy protection in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. Location cloaking has been proposed and well studied to protect user privacy. It blurs the user's accurate coordinate and replaces it with a well-shaped cloaked region. However, to obtain such an anonymous spatial region (ASR), nearly all existent cloaking algorithms require knowing the accurate locations of all users. Therefore, location cloaking without exposing the user's accurate location to any party is urgently needed. In this paper, we present such two nonexposure accurate location cloaking algorithms. They are designed for K-anonymity, and cloaking is performed based on the identifications (IDs) of the grid areas which were reported by all the users, instead of directly on their accurate coordinates. Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.

  8. Applying Stylometric Analysis Techniques to Counter Anonymity in Cyberspace

    Directory of Open Access Journals (Sweden)

    Jianwen Sun

    2012-02-01

    Full Text Available Due to the ubiquitous nature and anonymity abuses in cyberspace, it’s difficult to make criminal identity tracing in cybercrime investigation. Writeprint identification offers a valuable tool to counter anonymity by applying stylometric analysis technique to help identify individuals based on textual traces. In this study, a framework for online writeprint identification is proposed. Variable length character n-gram is used to represent the author’s writing style. The technique of IG seeded GA based feature selection for Ensemble (IGAE is also developed to build an identification model based on individual author level features. Several specific components for dealing with the individual feature set are integrated to improve the performance. The proposed feature and technique are evaluated on a real world data set encompassing reviews posted by 50 Amazon customers. The experimental results show the effectiveness of the proposed framework, with accuracy over 94% for 20 authors and over 80% for 50 ones. Compared with the baseline technique (Support Vector Machine, a higher performance is achieved by using IGAE, resulting in a 2% and 8% improvement over SVM for 20 and 50 authors respectively. Moreover, it has been shown that IGAE is more scalable in terms of the number of authors, than author group level based methods.

  9. Private anonymous fingerprinting for color images in the wavelet domain

    Science.gov (United States)

    Abdul, W.; Gaborit, P.; Carré, P.

    2010-01-01

    An online buyer of multimedia content does not want to reveal his identity or his choice of multimedia content whereas the seller or owner of the content does not want the buyer to further distribute the content illegally. To address these issues we present a new private anonymous fingerprinting protocol. It is based on superposed sending for communication security, group signature for anonymity and traceability and single database private information retrieval (PIR) to allow the user to get an element of the database without giving any information about the acquired element. In the presence of a semi-honest model, the protocol is implemented using a blind, wavelet based color image watermarking scheme. The main advantage of the proposed protocol is that both the user identity and the acquired database element are unknown to any third party and in the case of piracy, the pirate can be identified using the group signature scheme. The robustness of the watermarking scheme against Additive White Gaussian Noise is also shown.

  10. 38 CFR 21.3102 - Required counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Required counseling. 21.... Chapter 35 Counseling § 21.3102 Required counseling. (a) Child. The VA counseling psychologist will provide counseling and assist in preparing the educational plan only if the eligible child or his or...

  11. 38 CFR 21.7100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.7100... Bill-Active Duty) Counseling § 21.7100 Counseling. A veteran or servicemember may receive counseling from VA before beginning training and during training. (a) Purpose. The purpose of counseling is (1)...

  12. Cell-free DNA screening and sex chromosome aneuploidies.

    Science.gov (United States)

    Mennuti, Michael T; Chandrasekaran, Suchitra; Khalek, Nahla; Dugoff, Lorraine

    2015-10-01

    Cell-free DNA (cfDNA) testing is increasingly being used to screen pregnant women for fetal aneuploidies. This technology may also identify fetal sex and can be used to screen for sex chromosome aneuploidies (SCAs). Physicians offering this screening will need to be prepared to offer comprehensive prenatal counseling about these disorders to an increasing number of patients. The purpose of this article is to consider the source of information to use for counseling, factors in parental decision-making, and the performance characteristics of cfDNA testing in screening for SCAs. Discordance between ultrasound examination and cfDNA results regarding fetal sex is also discussed.

  13. A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards

    Institute of Scientific and Technical Information of China (English)

    LU Rong-xing; CAO Zhen-fu; SU Ren-wang

    2006-01-01

    Remote user authentication is essential in distributed network environment to protect unauthorized access of a networked system. However, most of those existing remote user authentication schemes have not provided the user identity anonymity, while user anonymity is particularly important in some practical applications.Therefore, based on self-encryption mechanism, a new remote user authentication scheme was proposed. The scheme not only has no need of maintaining a password table at the remote server, but also can protect the user's anonymity.

  14. Adaptation of the African couples HIV testing and counseling model for men who have sex with men in the United States: an application of the ADAPT-ITT framework.

    Science.gov (United States)

    Sullivan, Patrick S; Stephenson, Rob; Grazter, Beau; Wingood, Gina; Diclemente, Ralph; Allen, Susan; Hoff, Colleen; Salazar, Laura; Scales, Lamont; Montgomery, Jeanne; Schwartz, Ann; Barnes, Jasper; Grabbe, Kristina

    2014-01-01

    To respond to the need for new HIV prevention services for men who have sex with men (MSM) in the United States, and to respond to new data on the key role of main partnerships in US MSM epidemics, we sought to develop a new service for joint HIV testing of male couples. We used the ADAPT-ITT framework to guide our work. From May 2009 to July 2013, a multiphase process was undertaken to identify an appropriate service as the basis for adaptation, collect data to inform the adaptation, adapt the testing service, develop training materials, test the adapted service, and scale up and evaluate the initial version of the service. We chose to base our adaptation on an African couples HIV testing service that was developed in the 1980s and has been widely disseminated in low- and middle-income countries. Our adaptation was informed by qualitative data collections from MSM and HIV counselors, multiple online surveys of MSM, information gathering from key stakeholders, and theater testing of the adapted service with MSM and HIV counselors. Results of initial testing indicate that the adapted service is highly acceptable to MSM and to HIV counselors, that there are no evident harms (e.g., intimate partner violence, relationship dissolution) associated with the service, and that the service identifies a substantial number of HIV serodiscordant male couples. The story of the development and scale-up of the adapted service illustrates how multiple public and foundation funding sources can collaborate to bring a prevention adaptation from concept to public health application, touching on research, program evaluation, implementation science, and public health program delivery. The result of this process is an adapted couples HIV testing approach, with training materials and handoff from academic partners to public health for assessment of effectiveness and consideration of the potential benefits of implementation; further work is needed to optimally adapt the African couples

  15. Abortion Counseling and the School Counselor

    Science.gov (United States)

    Duncan, Jack A.; Moffett, Catherine F.

    1974-01-01

    Abortion counseling is now legally within the purview of the school counselor. It is therefore essential that counselors determine their role in abortion counseling, the kind of training necessary, and whether professional organizations should develop counseling guidelines. (RP)

  16. The Individual Differences Tradition in Counseling Psychology.

    Science.gov (United States)

    Dawis, Rene V.

    1992-01-01

    Traces historical development from individual differences psychology through psychological testing, vocational counseling, and student personnel work, to counseling psychology. Describes individual differences tradition in counseling psychology research and practice. Discusses how individual differences psychology has influenced counseling…

  17. Motivational Interviewing and Rehabilitation Counseling Practice

    Science.gov (United States)

    Wagner, C. C.; McMahon, B. T.

    2004-01-01

    This article explores commonalities between rehabilitation counseling and the counseling approach known as motivational interviewing. Motivational interviewing is an empirically supported, clientcentered, directive counseling approach designed to promote client motivation and reduce motivational conflicts and barriers to change. The underpinnings…

  18. Counseling in Turkey: An Evolving Field

    Science.gov (United States)

    Stockton, Rex; Guneri, Oya Yerin

    2011-01-01

    This article provides a brief history of counseling and addresses the current issues and future trends of counseling in Turkey. Special emphasis is placed on the factors that impede the development of school counseling as a discipline.

  19. Counseling without Truth: Toward a Neopragmatic Foundation for Counseling Practice

    Science.gov (United States)

    Hansen, James T.

    2007-01-01

    The author presents an overview of contemporary developments in philosophy regarding the status of truth and discusses the implications of these ideas for the practice of counseling. Counseling without truth is presented as a desirable option when a neopragmatic frame of reference is adopted.

  20. Examining Multicultural Counseling Competencies of Rehabilitation Counseling Graduate Students

    Science.gov (United States)

    Donnell, Chandra M.

    2008-01-01

    There has been little examination of multicultural counseling competencies of rehabilitation counselor trainees. The current study examined competency development (knowledge, skills and awareness) of 68 rehabilitation counseling master's degree students across six universities. Results indicate that students did not demonstrate competence in…

  1. Addiction Counseling Accreditation: CACREP's Role in Solidifying the Counseling Profession

    Science.gov (United States)

    Hagedorn, W. Bryce; Culbreth, Jack R.; Cashwell, Craig S.

    2012-01-01

    In this article, the authors discuss the Council for Accreditation of Counseling and Related Educational Programs' (CACREP) role in furthering the specialty of addiction counseling. After sharing a brief history and the role of counselor certification and licensure, the authors share the process whereby CACREP developed the first set of…

  2. Sex Stereotype

    Institute of Scientific and Technical Information of China (English)

    倪媛

    2014-01-01

    This paper analyzes the social phenomenon—sex stereotype.The paper illustrates the characteristics of stereotype and discusses about the factors which influence sex stereotypes and the reasons of its existence.And it also found the positive role that sex stereotype plays in the communication.

  3. Selfrando: Securing the Tor Browser against De-anonymization Exploits

    Directory of Open Access Journals (Sweden)

    Conti Mauro

    2016-10-01

    Full Text Available Tor is a well-known anonymous communication system used by millions of users, including journalists and civil rights activists all over the world. The Tor Browser gives non-technical users an easy way to access the Tor Network. However, many government organizations are actively trying to compromise Tor not only in regions with repressive regimes but also in the free world, as the recent FBI incidents clearly demonstrate. Exploiting software vulnerabilities in general, and browser vulnerabilities in particular, constitutes a clear and present threat to the Tor software. The Tor Browser shares a large part of its attack surface with the Firefox browser. Therefore, Firefox vulnerabilities (even patched ones are highly valuable to attackers trying to monitor users of the Tor Browser.

  4. ANDaNA: Anonymous Named Data Networking Application

    CERN Document Server

    DiBenedetto, Steven; Tsudik, Gene; Uzun, Ersin

    2011-01-01

    Content-centric networking -- also known as information-centric networking (ICN) -- shifts emphasis from hosts and interfaces (as in today's Internet) to data. Named data becomes addressable and routable, while locations that currently store that data become irrelevant to applications. Named Data Networking (NDN) is a large collaborative research effort that exemplifies the content-centric approach to networking. NDN has some innate privacy-friendly features, such as lack of source and destination addresses on packets. However, as discussed in this paper, NDN architecture prompts some privacy concerns mainly stemming from the semantic richness of names. We examine privacy-relevant characteristics of NDN and present an initial attempt to achieve communication privacy. Specifically, we design an NDN add-on tool, called ANDaNA, that borrows a number of features from Tor. As we demonstrate via experiments, it provides comparable anonymity with lower relative overhead.

  5. Anonymization of Electronic Medical Records to Support Clinical Analysis

    CERN Document Server

    Gkoulalas-Divanis, Aris

    2013-01-01

    Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for su...

  6. Talking about suicide: confidentiality and anonymity in qualitative research.

    Science.gov (United States)

    Gibson, Susanne; Benson, Outi; Brand, Sarah L

    2013-02-01

    While it is acknowledged that there is a need for more qualitative research on suicide, it is also clear that the ethics of undertaking such research need to be addressed. This article uses the case study of the authors' experience of gaining ethics approval for a research project that asks people what it is like to feel suicidal to (a) analyse the limits of confidentiality and anonymity and (b) consider the ways in which the process of ethics review can shape and constrain suicide research. This leads to a discussion of the ways in which ethics committees assess and monitor qualitative research more generally and some preliminary suggestions for how this might be improved.

  7. Qualitative Research in Rehabilitation Counseling

    Science.gov (United States)

    Hanley-Maxwell, Cheryl; Al Hano, Ibrahim; Skivington, Michael

    2007-01-01

    Qualitative research approaches offer rehabilitation scholars and practitioners avenues into understanding the lives and experiences of people with disabilities and those people and systems with whom they interact. The methods used often parallel those used in counseling and appear to be well matched with the field of rehabilitation counseling.…

  8. Allegories and Symbols in Counseling

    Science.gov (United States)

    Alvarado, Victor I.; Cavazos, Lionel J.

    2007-01-01

    This manuscript describes how counselors can facilitate self-awareness in clients and counselors-in-training through the use of metaphors. The use of metaphors and others symbols provide a creative, non-intrusive, and non-confrontational approach to counseling. Examples of stories and fables used during counseling sessions and instructional…

  9. Restructuring Guidance and Counseling Programs.

    Science.gov (United States)

    Snyder, Beverly A.; Daly, Timothy P.

    1993-01-01

    Briefly reviews counseling profession's call for revitalization and transformation in school counseling and guidance programs. Summarizes one school system's efforts during late 1980s and early 1990s to transform its program from services and crisis orientation into a comprehensive developmental model based on Myrick's developmental guidance and…

  10. Client Motivation and Multicultural Counseling

    Science.gov (United States)

    Kim, Bryan S. K.

    2011-01-01

    This reaction article comments on the major contribution titled "Motivation and Autonomy in Counseling, Psychotherapy, and Behavior Change: A Look at Theory and Practice." It first points out the article's strengths, the primary of which was to move the construct of motivation to the center of focus in the discussion of counseling. In addition,…

  11. School Counseling in China Today

    Science.gov (United States)

    Thomason, Timothy C.; Qiong, Xiao

    2008-01-01

    This article provides a brief overview of the development of psychological thinking in China and social influences on the practice of school counseling today. Common problems of students are described, including anxiety due to pressure to perform well on exams, loneliness and social discomfort, and video game addiction. Counseling approaches used…

  12. Physical Attractiveness and Counseling Skills.

    Science.gov (United States)

    Vargas, Alice M.; Borkowski, John G.

    1982-01-01

    Searched for interaction between quality of counseling skills (presence or absence of empathy, genuineness, and positive regard) and physical attractiveness as determinants of counseling effectiveness. Attractiveness influenced perceived effectiveness of counselor's skill. Analyses of expectancy data revealed that only with good skills did…

  13. Counseling Japanese Men on Fathering

    Science.gov (United States)

    Seto, Atsuko; Becker, Kent W.; Akutsu, Motoko

    2006-01-01

    The authors review an article (J. Yamamoto & F. Tagami, 2004) published in the "Japanese Journal of Counseling Science" that described changes in contemporary Japanese family structures and illustrated a therapy process with a father to enhance the father-son relationship. Implications for the counseling profession in working with…

  14. Rape: Counseling the Traumatized Victim

    Science.gov (United States)

    Heppner, P. Paul; Heppner, Mary

    1977-01-01

    There are at least three goals of intensive rape counseling: identifying and accepting feelings, reorienting perceptions, attributions, and self-statements, and resuming a normal lifestyle. Various counseling techniques can be employed to help rape victims restructure cognitions to reduce negative self-evaluations, physical distress, and loss of…

  15. HIV infection and syphilis prevalence among men who have sex with men receiving voluntary counseling and testing appointed through a web-based registering system and related factors%互联网预约检测的男男性行为者HIV、梅毒感染状况及相关因素分析

    Institute of Scientific and Technical Information of China (English)

    吴琼苗; 程伟彬; 钟斐; 徐慧芳; 刘奇; 林鹏

    2015-01-01

    目的 了解通过互联网预约检测MSM的HIV、梅毒感染状况,分析其相关影响因素.方法 对广州市2011-2012年通过互联网预约自愿前来进行HIV和梅毒抗体检测的MSM进行问卷调查和血清学检测,内容包括研究对象的社会人口学、行为学资料及HIV/梅毒抗体检测结果,采用logistic回归方法分析HIV/梅毒感染的相关影响因素.结果 共调查4 904名MSM,平均年龄(28.77±7.24)岁,大专及以上学历占70.3%;未婚占72.7%;HIV和梅毒抗体阳性检出率分别为8.7%(429/4904)和4.4%(214/4 904),HIV合并梅毒感染率为1.2%(59/4904).约1/3调查对象最近一次与男性发生性行为时未使用安全套,43.5%最近3个月与男性发生性行为不能坚持每次使用安全套.多因素logistic回归分析结果显示:文化程度低、职业(工人或农民)、最近3个月与男性发生性行为不能坚持使用安全套、既往是否做过HIV检测以及感染梅毒与HIV感染相关联;年龄(≥40岁)、文化程度低、最近3个月的男性性伴数(≥10个)及感染HIV与梅毒感染相关联.结论 基于互联网预约检测的MSM,危险性行为发生率和HIV感染率较高,既往HIV检测率较低.应加大应用互联网检测动员,开发针对低文化、高年龄MSM的干预措施.%Objective To understand the human immunodeficiency virus (HIV) infection status and syphilis prevalence among men who have sex with men (MSM) receiving voluntary counseling and testing appointed through a web-based registering system and related factors.Methods The MSM receiving web appointed HIV counseling and testing from 2011 to 2012 in Guangzhou were recruited and a questionnaire survey was conduct among them to obtain the information about their demographic characteristics and sexual behavior.Binary and multivariate logistic regression model were used to identify the factors associated with HIV infection or syphilis prevalence.Results A total of 4 904 MSM were enrolled

  16. Breastfeeding counsel against cancers

    Directory of Open Access Journals (Sweden)

    Prameela Kannan Kutty

    2016-05-01

    Full Text Available The anticancer potential by breastfeeding is not fully tapped in the light of the present knowledge of the subject. Literature indicates that breastmilk has anticancer action but may underestimate its full capacity. The protective spectrum within breastmilk hints on the need for a more comprehensive understanding of it as an anticancer tool. Exclusive breastfeeding could confer protection from carcinogenesis with a greater impact than realised. A literature review was conducted using four electronic databases. Selected areas were extracted after thorough perusal of the articles. The uninitiated would take exclusive breastfeeding seriously if actively counselled as an anticancer tool. Advice on details of the breastfeeding process and holistic information on breastfeeding may endow a greater impact among the skeptics. Counselling the breastfeeding mother on information sometimes not imparted, such as on maternal nutrition, details of the process of breastfeeding, benefits of direct breastfeeding versus milk expression and her psychosocial well being may make a difference in optimising anticancer action that exists in breastmilk. Additionally, its anticancer potential provides a platform to universally improve physical and psychosocial well being of women who breastfeed. Statistics of protection by breastfeeding in some maternal and childhood cancers are evident. “Bio-geno-immuno-nutrition” of breastmilk may shield the mother and infant from carcinogenesis in more ways than appreciated. The molecular basis of mother-to-infant signals and their “energies” need to be researched. Breastfeeding as a modifiable behaviour provides cost effective nutrition with potential for both cancer immunoprophylaxis and immunotherapy.

  17. Breastfeeding counsel against cancers

    Institute of Scientific and Technical Information of China (English)

    Prameela Kannan Kutty

    2016-01-01

    The anticancer potential by breastfeeding is not fully tapped in the light of the present knowledge of the subject. Literature indicates that breastmilk has anticancer action but may underestimate its full capacity. The protective spectrum within breastmilk hints on the need for a more comprehensive understanding of it as an anticancer tool. Exclusive breastfeeding could confer protection from carcinogenesis with a greater impact than realised. A literature review was conducted using four electronic databases. Selected areas were extracted after thorough perusal of the articles. The uninitiated would take exclusive breastfeeding seriously if actively counselled as an anticancer tool. Advice on details of the breastfeeding process and holistic information on breastfeeding may endow a greater impact among the skeptics. Counselling the breastfeeding mother on information sometimes not imparted, such as on maternal nutrition, details of the process of breast-feeding, benefits of direct breastfeeding versus milk expression and her psychosocial well being may make a difference in optimising anticancer action that exists in breastmilk. Additionally, its anticancer potential provides a platform to universally improve physical and psychosocial well being of women who breastfeed. Statistics of protection by breastfeeding in some maternal and childhood cancers are evident. “Bio-geno-immuno-nutrition” of breastmilk may shield the mother and infant from carcinogenesis in more ways than appreciated. The molecular basis of mother-to-infant signals and their “en-ergies” need to be researched. Breastfeeding as a modifiable behaviour provides cost effective nutrition with potential for both cancer immunoprophylaxis and immunotherapy.

  18. [Counsel for traveling children].

    Science.gov (United States)

    Sorge, F; Gendrel, D

    2013-01-01

    Consultation of child traveler has two main objectives: to assess of health risk related to the child's health status and history and also the risk related to travel environment; to counsel and prescribe preventive measure to reduce these travel health risks. The evaluation is based on physical examination and a detailed interview including personal history and information regarding the regions of proposed travel. Up to date knowledge of the epidemiology of visited sites, preventive measures and presumptive treatment is required. Essential health recommendations include, in case of exposure, prevention of malaria, arthropod borned diseases and vaccine preventable diseases. For all destinations advice regarding prevention of diarrhea, accident risks and aggravation of preexisting chronic diseases is needed. Universal primary prevention counselling is valuable for all travellers regardless of their age. In the case of children, special attention must be given to food and water hygiene, sun and heat exposure, swimming risks and transports security measures. Evaluation of risk and health education take time and often several visits are needed to complete the immunization schedule before departure.

  19. Breastfeeding counsel against cancers

    Institute of Scientific and Technical Information of China (English)

    Prameela Kannan Kutty

    2016-01-01

    The anticancer potential by breastfeeding is not fully tapped in the light of the present knowledge of the subject. Literature indicates that breastmilk has anticancer action but may underestimate its full capacity. The protective spectrum within breastmilk hints on the need for a more comprehensive understanding of it as an anticancer tool. Exclusive breastfeeding could confer protection from carcinogenesis with a greater impact than realised. A literature review was conducted using four electronic databases. Selected areas were extracted after thorough perusal of the articles. The uninitiated would take exclusive breastfeeding seriously if actively counselled as an anticancer tool. Advice on details of the breastfeeding process and holistic information on breastfeeding may endow a greater impact among the skeptics. Counselling the breastfeeding mother on information sometimes not imparted, such as on maternal nutrition, details of the process of breastfeeding, benefits of direct breastfeeding versus milk expression and her psychosocial well being may make a difference in optimising anticancer action that exists in breastmilk.Additionally, its anticancer potential provides a platform to universally improve physical and psychosocial well being of women who breastfeed. Statistics of protection by breastfeeding in some maternal and childhood cancers are evident. "Bio-geno-immunonutrition" of breastmilk may shield the mother and infant from carcinogenesis in more ways than appreciated. The molecular basis of mother-to-infant signals and their "energies" need to be researched. Breastfeeding as a modifiable behaviour provides cost effective nutrition with potential for both cancer immunoprophylaxis and immunotherapy.

  20. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    Science.gov (United States)

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback.

  1. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    Directory of Open Access Journals (Sweden)

    Balázs Bodó

    2014-11-01

    Full Text Available This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs. Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of online political activism. Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders. Through the analysis of Wikileaks, the anonymous whistleblowing website, it describes how strong PETs enable the development of hacktivism 2.0, where the source of threat is shifted from outsiders to insiders. Insiders have access to documents with which power can be exposed, and who, by using PETs, can anonymously engage in political action. We also describe the emergence of a third generation of hacktivists who use PETs to disengage and create their own autonomous spaces rather than to engage with power through anonymous whistleblowing.

  2. HIV-related behaviors, social support and health-related quality of life among men who have sex with men and women (MSMW: a cross-sectional study in Chongqing, China.

    Directory of Open Access Journals (Sweden)

    Jiang-Peng Chen

    Full Text Available Health-related quality of life (HRQOL has become commonly used both as a concept and as a field of research. However, little is known about the HRQOL of men who have sex with men and women (MSMW. The aim of this study was to examine HIV-related behaviors, social support, and HRQOL status and explore its predictors among MSMW.An anonymous cross-sectional study was conducted by snowball sampling method in 2013. A total of 563 Chinese MSM completed a structured questionnaire. The HRQOL and social support were measured with the Chinese version of the World Health Organization Quality of Life Scale (WHOQOL-BRFE and the Social Support Rating Scale (SSRS, respectively.Of the 563 MSM analyzed, 77 (13.68% were MSMW who had a higher proportion of in-marriage and preference for an insertive role as compared with the men who have sex with men only (MSMO (P<0.05. As high as 70.13% of MSMW had no regular sex partners and 72.73% of MSMW reported engaging in unprotected anal sex in the last six months. 36.36% had tested for HIV, while only 12.99% had accepted HIV voluntary counseling and testing (VCT services. The scores of objective support and subjective support in MSMW were significantly higher than that of MSMO (P<0.05. No statistically significant difference was found in scores of all the four domains of the HRQOL between MSMW and MSMO. When comparing the HRQOL scores of MSMW with the Chinese general population reference group, the scores of MSMW were significantly lower in physical health domain. In a multivariate regression model, age, monthly income, sexual role, VCT acceptability, subjective support were associated with variability in HRQOL.To improve the HRQOL among MSMW, more attention needs to be paid to those with low social support, low-income, the old and those prefer a receptive role during anal sex populations.

  3. Sex education in Cyprus.

    Science.gov (United States)

    Patsalides, N

    1991-05-01

    The objective of educating people on family planning and sexuality issues has been carried forth by the Family Planning Association of Cyprus (FPAC) since 1971. The promotion of sex education in schools has generated respect for their expertise. Sex education has reached the agenda of the General Assembly of Parliament only to be postponed due to the April 1991 end of term dismissal. A newly elected Parliament are not expected to act immediately. The Ministry of Education Committee on Health Education has been actively counseled since 1974, and most recently in their examination of the possibilities of school sex education and training of high school teachers. The Ministry of Education has authority over primary and secondary education, which is compulsory up to 3 years of secondary education. The approach of FPAC has been to work with parents first in education lectures at various well publicized locations. The agenda was to inform about FPAC, explain the purpose and meaning of sex education, and show the Merry-Go-Round educational film followed by a question and answer session. Eventually, presentations involved children with parent observation. In 1977, authorization from the Ministry of Education gave official approval to FPAC, but not on school premises. FPAC went directly to headmasters and gained support in primary schools to organize sessions on school premises, which successfully involved many primary schools even in the much needed rural areas. Home Economics and Child Care, offered in the 5th and 6th grades was the only vehicle for gaining permission to enter secondary schools. In Larnaca, secondary school headmasters at the 3rd and 6th grade levels permitted invitations which requested parental permission. Lecture topics on human reproduction, sex roles, and disease and contraception were also provided in a follow-up letter. Higher education levels were involved through youth clubs and evening lectures. In 1988, FPAC urged the Director General of the

  4. Courtland Lee: A Global Advocate for Counseling

    Science.gov (United States)

    Gladding, Samuel T.

    2011-01-01

    Courtland Lee is exemplary in his accomplishments nationally and internationally. His academic achievements are notable in multicultural counseling and social justice. His leadership in counseling has been outstanding with his having served as president of the American Counseling Association, the Association for Multicultural Counseling and…

  5. The Impact of Creativity in Counseling

    Science.gov (United States)

    Gladding, Samuel T.

    2008-01-01

    Creativity is a crucial component in the advancement of all major cultural entities, including effective counseling. It is through creativity that major theories of counseling and skills in counseling have been developed. Creativity is longitudinal in its impact. If counseling is to progress in the future, it is essential that counselors be…

  6. Counselling: Fit It into Your Career.

    Science.gov (United States)

    Kerford, Kristi

    What is career counseling? With the development of professional standards and guidelines and the ever changing definition of counseling, now is the time to re-examine career counseling. The term career counseling encompasses many different types of work, from personal therapy to job search coaching. This discussion will examine the continuum known…

  7. 38 CFR 21.6100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.6100... Recipients Counseling § 21.6100 Counseling. General. A veteran requesting or being furnished assistance under this temporary program shall be provided professional counseling services by the...

  8. 38 CFR 21.7600 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.7600...) VOCATIONAL REHABILITATION AND EDUCATION Educational Assistance for Members of the Selected Reserve Counseling § 21.7600 Counseling. A reservist may receive counseling from VA before beginning training and...

  9. 24 CFR 214.300 - Counseling services.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Counseling services. 214.300... HOUSING COUNSELING PROGRAM Program Administration § 214.300 Counseling services. (a) Basic requirements. (1) Agencies must provide counseling to current and potential homeowners and tenants to assist...

  10. 38 CFR 21.9580 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.9580...) VOCATIONAL REHABILITATION AND EDUCATION Post-9/11 GI Bill Counseling § 21.9580 Counseling. An individual may receive counseling from VA before beginning training and during training. VA will apply the provisions...

  11. 38 CFR 21.100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.100... Counseling § 21.100 Counseling. (a) General. A veteran requesting or being furnished assistance under Chapter 31 shall be provided professional counseling services by Vocational Rehabilitation and Employment...

  12. 28 CFR 550.43 - Drug counseling.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Drug counseling. 550.43 Section 550.43... Drug Services (Urine Surveillance and Counseling for Sentenced Inmates in Contract CTCs) § 550.43 Drug counseling. (a) Drug counseling shall be provided to sentenced inmates in contract community...

  13. 34 CFR 686.32 - Counseling requirements.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Counseling requirements. 686.32 Section 686.32...) GRANT PROGRAM Administration of Grant Payments § 686.32 Counseling requirements. (a) Initial counseling. (1) An institution must ensure that initial counseling is conducted with each TEACH Grant...

  14. 38 CFR 21.8100 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling. 21.8100... Vietnam Veterans-Spina Bifida and Covered Birth Defects Counseling § 21.8100 Counseling. An eligible child requesting or receiving services and assistance under this subpart will receive professional counseling by...

  15. 34 CFR 685.304 - Counseling borrowers.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Counseling borrowers. 685.304 Section 685.304 Education... Direct Loan Program Schools § 685.304 Counseling borrowers. (a) Entrance counseling. (1) Except as provided in paragraph (a)(8) of this section, a school must ensure that entrance counseling is...

  16. 38 CFR 23.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 23.425 Section 23.425 Pensions, Bonuses, and Veterans' Relief DEPARTMENT... Activities Prohibited § 23.425 Counseling and use of appraisal and counseling materials. (a) Counseling....

  17. 24 CFR 3.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling materials. 3.425 Section 3.425 Housing and Urban Development Office of the Secretary, Department... Activities Prohibited § 3.425 Counseling and use of appraisal and counseling materials. (a) Counseling....

  18. 18 CFR 1317.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Counseling and use of appraisal and counseling materials. 1317.425 Section 1317.425 Conservation of Power and Water Resources... Activities Prohibited § 1317.425 Counseling and use of appraisal and counseling materials. (a) Counseling....

  19. 14 CFR 1253.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials. 1253.425 Section 1253.425 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE... § 1253.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient...

  20. 31 CFR 28.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 28.425 Section 28.425 Money and Finance: Treasury Office of the Secretary of the....425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall...

  1. 29 CFR 36.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Counseling and use of appraisal and counseling materials. 36... in Education Programs or Activities Prohibited § 36.425 Counseling and use of appraisal and counseling materials. (a) Counseling. A recipient shall not discriminate against any person on the basis...

  2. 13 CFR 113.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Counseling and use of appraisal and counseling materials. 113.425 Section 113.425 Business Credit and Assistance SMALL BUSINESS... Activities Prohibited § 113.425 Counseling and use of appraisal and counseling materials. (a) Counseling....

  3. Multicultural Counseling : Issues and Analysis

    OpenAIRE

    Donahue, Ray T

    2007-01-01

    In this working paper, I consider a case in multicultural counseling of “Sandra,” a Brazilian black female who emigrated to Portugal but who characterizes her experience there like that of Cinderella’s pumpkin, a heartbreak reversal of fortune. Invited to assess her case, I shall treat it as if a referral for counseling from a case worker, for that is nearly how I got involved. Given a sketchy set of notes from her file, I found that her case could be instructive for multicultural counseling,...

  4. Summarized data to achieve population-wide anonymized wellness measures.

    Science.gov (United States)

    Clarke, Andrew; Steele, Robert

    2012-01-01

    The growth in smartphone market share has seen the increasing emergence of individuals collecting quantitative wellness data. Beyond the potential health benefits for the individual in regards to managing their own health, the data is highly related to preventative and risk factors for a number of lifestyle related diseases. This data has often been a component of public health data collection and epidemiological studies due to its large impact on the health system with chronic and lifestyle diseases increasingly being a major burden for the health service. However, collection of this kind of information from large segments of the community in a usable fashion has not been specifically explored in previous work. In this paper we discuss some of the technologies that increase the ease and capability of gathering quantitative wellness data via smartphones, how specific and detailed this data needs to be for public health use and the challenges of such anonymized data collection for public health. Additionally, we propose a conceptual architecture that includes the necessary components to support this approach to data collection.

  5. Deterministic gathering of anonymous agents in arbitrary networks

    CERN Document Server

    Dieudonné, Yoann

    2011-01-01

    A team consisting of an unknown number of mobile agents, starting from different nodes of an unknown network, possibly at different times, have to meet at the same node. Agents are anonymous (identical), execute the same deterministic algorithm and move in synchronous rounds along links of the network. Which configurations are gatherable and how to gather all of them deterministically by the same algorithm? We give a complete solution of this gathering problem in arbitrary networks. We characterize all gatherable configurations and give two universal deterministic gathering algorithms, i.e., algorithms that gather all gatherable configurations. The first algorithm works under the assumption that an upper bound n on the size of the network is known. In this case our algorithm guarantees gathering with detection, i.e., the existence of a round for any gatherable configuration, such that all agents are at the same node and all declare that gathering is accomplished. If no upper bound on the size of the network i...

  6. Parameterized Complexity of the k-anonymity Problem

    CERN Document Server

    Bonizzoni, Paola; Dondi, Riccardo; Pirola, Yuri

    2009-01-01

    The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization that has been recently proposed is the $k$-anonymity. This approach requires that the rows of a table are partitioned in clusters of size at least $k$ and that all the rows in a cluster become the same tuple, after the suppression of some entries. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is known to be APX-hard even when the records values are over a binary alphabet and $k=3$, and when the records have length at most 8 and $k=4$ . In this paper we study how the complexity of the problem is influenced by different parameters. In this paper we follow this direction of research, first showing that the problem is W[1]-hard when parameterized by the size of the solution (and the value $k$). Then we exhibit a fixed parameter algorithm, when the problem is parameterized by the size of the alphabet and the number of columns. Finally...

  7. Delineating social network data anonymization via random edge perturbation

    KAUST Repository

    Xue, Mingqiang

    2012-01-01

    Social network data analysis raises concerns about the privacy of related entities or individuals. To address this issue, organizations can publish data after simply replacing the identities of individuals with pseudonyms, leaving the overall structure of the social network unchanged. However, it has been shown that attacks based on structural identification (e.g., a walk-based attack) enable an adversary to re-identify selected individuals in an anonymized network. In this paper we explore the capacity of techniques based on random edge perturbation to thwart such attacks. We theoretically establish that any kind of structural identification attack can effectively be prevented using random edge perturbation and show that, surprisingly, important properties of the whole network, as well as of subgraphs thereof, can be accurately calculated and hence data analysis tasks performed on the perturbed data, given that the legitimate data recipient knows the perturbation probability as well. Yet we also examine ways to enhance the walk-based attack, proposing a variant we call probabilistic attack. Nevertheless, we demonstrate that such probabilistic attacks can also be prevented under sufficient perturbation. Eventually, we conduct a thorough theoretical study of the probability of success of any}structural attack as a function of the perturbation probability. Our analysis provides a powerful tool for delineating the identification risk of perturbed social network data; our extensive experiments with synthetic and real datasets confirm our expectations. © 2012 ACM.

  8. Behavior online : Does anonymous computer communication reduce gender inequality?

    NARCIS (Netherlands)

    Postmes, T; Spears, R

    2002-01-01

    Two studies examined dominance and self-stereotyping in mixed-sex groups who had online discussions. Gender differences in dominance varied as a function of several contextual variables: individuation, the accessibility of gender stereotypes, and the fit between group task and stereotype. Results of

  9. Multicultural education and genetic counseling.

    Science.gov (United States)

    Weil, J

    2001-03-01

    The responsibility to provide accessible, useful genetic counseling to individuals from many cultures and ethnicities arises from the increasing ethnocultural diversity of the populations served, coupled with the ethical goal of providing equal access and quality of services for all individuals. The multicultural education, training, and practice of genetic counseling involves three major components: knowledge of relevant ethnocultural groups, ethnocultural self-awareness, and an understanding of institutional and social barriers to services. Despite the diversity of ethnocultural groups served and the critical role of direct experience and training for the genetic counselor, some general guidelines for multicultural genetic counseling can be identified. These include the importance of establishing and maintaining trust, the essential need to respect the counselee's healthcare beliefs and practices, and the necessity of understanding the impact of culture on the process of decision making and on counselee responses to nondirective counseling.

  10. Counselling Psychology in South Africa.

    Science.gov (United States)

    Bantjes, Jason; Kagee, Ashraf; Young, Charles

    2016-01-01

    The origin and development of counselling psychology in South Africa has been profoundly influenced by the country's socio-political history and the impact of apartheid. As a result of this, counselling psychologists in the country face a number of challenges and opportunities for the future. In this paper we provide a portrait of counselling psychology in South Africa by describing the current character of the specialty and the context in which South African psychologists work. We critically discuss the challenges that the specialty faces to meet the country's mental health care needs, contest the current Scope of Practice; affirm multiculturalism without essentializing or reifying race and ethnicity, and build an evidence base for community interventions in the country. We also consider how, in the future, counselling psychologists in South Africa may make a more meaningful contribution within public health and the country's health care and education systems.

  11. FEATURES OF STUDENT PSYCHOLOGICAL COUNSELLING

    Directory of Open Access Journals (Sweden)

    Maria Dorina PASCA

    2013-10-01

    Full Text Available Student psychological counseling is one of the means to acknowledge student identity by employing counseling tools that allow the psychologist to make use of a set of skills essential in achieving envisaged outcomes. To act as counseling psychologist for students is to guide actions by the five wh- questions: who (the client is, why (the counselor is approached, who (the counselor talks to, what (problem the student has to tackle, how (the problem can be solved. Some of the most important features that contribute to solving student problems are the counselor’s deontology, trustworthiness and attitude that are to be relied on without impeding the client’s personality traits. Thus, developing awareness of the features underlying student psychological counseling and acting accordingly is the real test for any professional in the field. Therefore, the real challenge is not being in the lion’s den, but living with it.

  12. Outplacement: The New Counseling Frontier.

    Science.gov (United States)

    Branstead, Elizabeth; And Others

    1991-01-01

    Includes "Outplacement: The New Counseling Frontier" (Branstead); "Interview with Bob Ward"; "Ethics of Outplacement" (Axmith); "Outplacement--The View from Over Here" (Murray); "In-House Outplacement Programs for the 1990s and Beyond" (Benedict); "Government and Outplacement"…

  13. HUD Approved Housing Counseling Agencies

    Data.gov (United States)

    Department of Housing and Urban Development — HUD sponsors housing counseling agencies throughout the country that can provide advice on buying a home, renting, defaults, foreclosures, and credit issues. This...

  14. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  15. Confronting Sex in the Media: Implications and Counseling Recommendations

    Science.gov (United States)

    Ballam, Stacy M.; Granello, Paul F.

    2011-01-01

    The media greatly influences the sexual development of our youth and impacts society on a macro level. The messages that the media sends to our youth are contradictory to what families and professionals, such as educators and counselors, attempt to instill in our youth. This article addresses the urgent need for parents, educators, and counselors…

  16. Genetic Counseling Supervisors' Self-Efficacy for Select Clinical Supervision Competencies.

    Science.gov (United States)

    Finley, Sabra Ledare; Veach, Pat McCarthy; MacFarlane, Ian M; LeRoy, Bonnie S; Callanan, Nancy

    2016-04-01

    Supervision is a primary instructional vehicle for genetic counseling student clinical training. Approximately two-thirds of genetic counselors report teaching and education roles, which include supervisory roles. Recently, Eubanks Higgins and colleagues published the first comprehensive list of empirically-derived genetic counseling supervisor competencies. Studies have yet to evaluate whether supervisors possess these competencies and whether their competencies differ as a function of experience. This study investigated three research questions: (1) What are genetic counselor supervisors' perceptions of their capabilities (self-efficacy) for a select group of supervisor competencies?, (2) Are there differences in self-efficacy as a function of their supervision experience or their genetic counseling experience, and 3) What training methods do they use and prefer to develop supervision skills? One-hundred thirty-one genetic counselor supervisors completed an anonymous online survey assessing demographics, self-efficacy (self-perceived capability) for 12 goal setting and 16 feedback competencies (Scale: 0-100), competencies that are personally challenging, and supervision training experiences and preferences (open-ended). A MANOVA revealed significant positive effects of supervision experience but not genetic counseling experience on participants' self-efficacy. Although mean self-efficacy ratings were high (>83.7), participant comments revealed several challenging competencies (e.g., incorporating student's report of feedback from previous supervisors into goal setting, and providing feedback about student behavior rather than personal traits). Commonly preferred supervision training methods included consultation with colleagues, peer discussion, and workshops/seminars.

  17. A Metastudy of "Journal of Employment Counseling" Publication Patterns from 1994 through 2009

    Science.gov (United States)

    Erford, Bradley T.; Crockett, Stephanie; Giguere, Monica; Darrow, Jenna

    2011-01-01

    The authors reviewed article and author patterns for articles published in the "Journal of Employment Counseling (JEC)" from 1994 through 2009. Author demographic characteristics assessed included sex of lead and all authors, lead author domicile, employment setting of lead and all authors, and individuals and universities contributing most…

  18. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    NARCIS (Netherlands)

    Bodó, B.

    2014-01-01

    This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of onl

  19. The Role of the Anonymous Voice in Post-Publication Peer Review Versus Traditional Peer Review

    Directory of Open Access Journals (Sweden)

    Jaime A. Teixeira da Silva

    2015-12-01

    Full Text Available Traditional peer review (TPR has several limitations and weaknesses. Post-publication peer review is one practical way to repair the ills of TPR and reinforce it. A literature that is marked by errors is unhealthy and should, if given the opportunity, be corrected or further improved. The anonymous voice is one source of critique and differs from the blind peer review in TPR in which the reviewer remains anonymous to the authors and/or vice versa, but the identity is known to the editor. If unregulated, the anonymous voice can pose a threat to established editorial norms in TPR, to one of the most important criteria of science publishing, i.e., transparency, and to worthwhile discussion. Yet, if the anonymous voice is not heard, then a vast and potentially valuable pool of untapped opinions may be lost, opinions that may provide valuable solutions to improving TPR.

  20. Sex determination

    OpenAIRE

    McCullagh, W. McK. H.

    2013-01-01

    How the sex of offspring is determined has puzzled philosophers and scientists for millennia. Modern science has identified both genetic and environmental factors, but the question is still not yet fully answered.

  1. PHENOMENAL EXPLORATION INTO IMPACT OF ANONYMITY ON LAW AND ORDER IN CYBERSPACE

    OpenAIRE

    Li, Xingan

    2015-01-01

    While information systems provide modern society with great convenience, it also poses new problems in maintaining social order. One of its negative influences is the anonymity of cyberspace, which makes identity tracing a noteworthy predicament which poses obstacles in detection and investigations. It has been found that cyber anonymity has critical impacts on criminal motivation, and the phenomena of victimization, and should be tackled on different layers including technology and law enfor...

  2. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    Directory of Open Access Journals (Sweden)

    Tomas A. Lipinski

    2002-01-01

    Full Text Available This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has altered the traditional legal paradigm of responsibility and as a result creates potential problems for the future of anonymous speech on the Internet.  As a result plaintiffs are no longer pursuing litigation against service providers but taking their dispute directly to the anonymous speaker. Second, several cases have arisen in the United States where plaintiffs have requested that the identity of an anonymous Internet speaker be revealed.  These cases are surveyed.  Third, the cases are analyzed in order to determine the factors that courts require to be present before the identity of an anonymous speaker will be revealed.  The release is typically accomplished by the enforcement of a discovery subpoena instigated by the party seeking the identity of the anonymous speaker. The factors courts have used are as follows: jurisdiction, good faith (both internal and external, necessity (basic and sometimes absolute, and at times proprietary interest. Finally, these factors are applied in three scenarios--e-commerce, education, and employment--to guide institutions when adopting policies that regulate when the identity of an anonymous speaker--a customer, a student or an employee--would be released as part of an internal initiative, but would nonetheless be consistent with developing legal standards.

  3. Why Sex?

    DEFF Research Database (Denmark)

    Nielsen, Rasmus

    2006-01-01

    It is assumed that most organisms have sex because the resulting genetic recombination allows Darwinian selection to work better. It is now shown that in water fleas, recombination does lead to fewer deleterious mutations.......It is assumed that most organisms have sex because the resulting genetic recombination allows Darwinian selection to work better. It is now shown that in water fleas, recombination does lead to fewer deleterious mutations....

  4. Verbal Venting in the Social Web: Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments

    Directory of Open Access Journals (Sweden)

    Leonie Rösner

    2016-08-01

    Full Text Available Scholars often blame the occurrence of aggressive behavior in online discussions on the anonymity of the Internet; however, even on today’s less anonymous platforms, such as social networking sites, users write plenty of aggressive comments, which can elicit a whole wave of negative remarks. Drawing on the social identity and deindividuation effects (SIDE model, this research conducts a laboratory experiment with a 2 (anonymity vs. no anonymity × 2 (aggressive norm vs. non-aggressive norm between-subjects design in order to disentangle the effects of anonymity, social group norms, and their interactions on aggressive language use in online comments. Results reveal that participants used more aggressive expressions in their comments when peer comments on a blog included aggressive wording (i.e., the social group norm was aggressive. Anonymity had no direct effect; however, we found a tendency that users’ conformity to an aggressive social norm of commenting is stronger in an anonymous environment.

  5. Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge

    CERN Document Server

    Narayanan, Arvind; Rubinstein, Benjamin I P

    2011-01-01

    This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on real-world link prediction, and the dataset was a graph obtained by crawling the popular Flickr social photo sharing website, with user identities scrubbed. By de-anonymizing much of the competition test set using our own Flickr crawl, we were able to effectively game the competition. Our attack represents a new application of de-anonymization to gaming machine learning contests, suggesting changes in how future competitions should be run. We introduce a new simulated annealing-based weighted graph matching algorithm for the seeding step of de-anonymization. We also show how to combine de-anonymization with link prediction---the latter is required to achieve good performance on the portion of the test set not de-anonymized---for example by training the predictor on the de-anonymized portion of the test set, and combining probabilistic predictions from de-anony...

  6. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.

    Science.gov (United States)

    Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho

    2016-10-07

    More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.'s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes.

  7. Trauma Symptoms, Sexual Behaviors, and Substance Abuse: Correlates of Childhood Sexual Abuse and HIV Risks among Men Who Have Sex with Men

    Science.gov (United States)

    Kalichman, Seth C.; Gore-Felton, Cheryl; Benotsch, Eric; Cage, Marjorie; Rompa, David

    2004-01-01

    Childhood sexual abuse is associated with high-risk sexual behavior in men who have sex with men. This study examined psychological and behavioral correlates of HIV risk behavior associated with childhood sexual abuse in a sample of men who have sex with men. Men attending a large gay pride event (N = 647) completed anonymous surveys that assessed…

  8. Serbs in the poetry of Theodore Prodromos and anonymous Manganeios

    Directory of Open Access Journals (Sweden)

    Stanković Vlada

    2006-01-01

    Full Text Available Numerous rhetorical writings of the Comnenian period constitute a fruitful field of research, both with respect to historical data, i.e. hard historical facts hidden, though still recognizable, behind the peculiar and somewhat abstract mode of expression of the authors of the twelfth century, and with regard to the poetics of the literary works themselves, i.e. the internal elements characteristic not only for the genre chosen, but also for each particular author. A comparative, historical and literary approach to these works renders their sense clearer and their complex allusions more readily understood. This is a matter of some importance, since allusions constitute one of the basic elements of historical rhetoric, which reached its peak at the time of Emperor Manuel Komnenos (1143-1180, especially during the first half of his reign, i.e. till the end of the fifties of the twelfth century. The poetry of Theodore Prodromes and of the somewhat younger Anonymous ('Prodromos' Manganeios is an excellent example of this intertwining of historical and literary elements, i.e. of the presentation of historical data through rhetorical patterns. One has to concentrate on individual works attempting to determine, as far as possible, the date of composition, the circumstances of writing and the purpose of a particular poem, the occasion for which it was written and the character of the expected audience, in order to better understand both the poetry written by these two rhetoricians and the individual features of the authors, as well as their respective positions in the circle around Emperor Manuel Komnenos. The poems dealt with in the present paper stand out for calling the Serbs by their real name. This naming practice was invariably employed by both rhetoricians in cases when new achievements of the basileus were to be announced and proclaimed immediately after the event, on the occasions of first reports, first celebrations of the new victories and

  9. Causes and strategies of limiting psychoactive substance use by female escort agency sex workers

    Directory of Open Access Journals (Sweden)

    Izabela Ślęzak

    2016-09-01

    Conclusions: Escort agency sex workers use the public support system for addicted individuals to an insignificant extent. They also do not participate in the Anonymous Alcoholics meetings. The crossing stigma related to prostitution and psychoactive substance abuse encourage them to undertake independent attempts to limit consumption, especially such that do not require participation in a therapy or in self-help groups.

  10. Blood, sex, personality, power, and altruism: factors influencing the validity of strong reciprocity.

    Science.gov (United States)

    Ferguson, Eamonn; Corr, Philip

    2012-02-01

    It is argued that the generality of strong reciprocity theory (SRT) is limited by the existence of anonymous spontaneous cooperation, maintained in the absence of punishment, despite free-riding. We highlight how individual differences, status, sex, and the legitimacy of non-cooperation need to be examined to increase the internal and ecological validity of SRT experiments and, ultimately, SRT's external validity.

  11. Developing Multicultural Counseling Competencies through Experiential Learning.

    Science.gov (United States)

    Arthur, Nancy; Achenbach, Kathleen

    2002-01-01

    This article focuses on experiential learning as a teaching and learning methodology to increase students' multicultural counseling competencies. Outlines ethical and practical suggestions for using experiential learning in multicultural counseling curriculum. (Contains 43 references.) (GCP)

  12. 75 FR 8393 - Housing Counseling Training Program

    Science.gov (United States)

    2010-02-24

    ... URBAN DEVELOPMENT Housing Counseling Training Program AGENCY: Office of the Chief Information Officer... forms of information technology, e.g., permitting electronic submission of responses. This notice also lists the following information: Title of Proposal: Housing Counseling Training Program. OMB...

  13. CDC Vital Signs: Alcohol Screening and Counseling

    Science.gov (United States)

    ... Read the MMWR Science Clips Alcohol Screening and Counseling An effective but underused health service Language: English ... about their drinking. 25% Alcohol screening and brief counseling can reduce the amount consumed on an occasion ...

  14. Behavioral Counseling to Prevent Skin Cancer

    Science.gov (United States)

    Understanding Task Force Recommendations Behavioral Counseling to Prevent Skin Cancer The U.S. Preventive Services Task Force (Task Force) has issued a final recommendation statement on Behavioral Counseling ...

  15. Frequently Asked Questions about Genetic Counseling

    Science.gov (United States)

    ... on this page Frequently Asked Questions About Genetic Counseling What are genetic professionals and what do they ... genetics nurses. Top of page What is genetic counseling and evaluation? Genetic professionals work as members of ...

  16. Genetic Counseling for Congenital Heart Defects

    Science.gov (United States)

    ... Artery Disease Venous Thromboembolism Aortic Aneurysm More Genetic Counseling for Congenital Heart Defects Updated:Oct 26,2015 ... with congenital heart disease considers having children. Genetic counseling can help answer these questions and address your ...

  17. Declining Counseling Research in Counseling Psychology Journals: Is the Sky Falling?

    Science.gov (United States)

    Lichtenberg, James W.

    2011-01-01

    Scheel et al. note a rather precipitous decline over the past 30 years in the number and proportion of counseling-related research articles appearing in "Journal of Counseling Psychology" ("JCP") and "The Counseling Psychologist" ("TCP"). Certainly, counseling psychology as a field has changed over its 65-year history, and a great deal of that…

  18. Relationship between Counseling Self-Efficacy and Multicultural Counseling Self-Efficacy among School Counselors

    Science.gov (United States)

    Crook, Tylon

    2010-01-01

    The purpose of this dissertation was to examine the relationship between school counselors' counseling self-efficacy and multicultural counseling self-efficacy. In addition, this study measured school counselors' levels of general school counseling self-efficacy, multicultural counseling self-efficacy, and the relationship between school counselor…

  19. Distance Career Counseling: A Technology-Assisted Model for Delivering Career Counseling Services.

    Science.gov (United States)

    Djadali, Yas; Malone, James F.

    The purpose of the present article is to demonstrate the need for distance career counseling services, and to present an evolving counseling model that combines the best practices of face-to-face career counseling with technology. The article begins by tracing the historical development of distance career counseling models, and then illustrates…

  20. Perceptions of Clients and Counseling Professionals regarding Spirituality in Counseling

    Science.gov (United States)

    Morrison, Julie Q.; Clutter, Stacy M.; Pritchett, Elaine M.; Demmitt, Alan

    2009-01-01

    Although current research indicates that psychotherapeutic change both affects and is affected by spiritual concerns, relatively little is known about the degree to which spirituality is used as an intervention in counseling and how it is perceived by clients and mental health professionals. The purpose of this study was to examine the perceptions…

  1. Counseling and Counseling Skills in the Industrial Environment.

    Science.gov (United States)

    Papalia, Anthony S.; Kaminski, William

    1981-01-01

    Describes new and challenging opportunities for counselors to apply their skills in an industrial setting, using the Smith Corona Laboratory as an example. Suggests the counselor role can include facilitative, developmental, crisis, and preventative counseling. Counselors can respond to the challenge for constructive cultivation of the work force.…

  2. Continuum of Counseling Goals: A Framework for Differentiating Counseling Strategies.

    Science.gov (United States)

    Bruce, Paul

    1984-01-01

    Presents counseling goals in a developmental continuum similar in concept to Maslow's hierarchy of needs. Discusses ego development goals, socialization goals, developmental goals, self-esteem goals, and self-realization goals and describes characteristics and implications of the continuum. (JAC)

  3. Counseling as an Art: The Creative Arts in Counseling.

    Science.gov (United States)

    Gladding, Samuel T.

    In this book counseling approaches with a variety of populations are examined using these creative arts: music; dance/movement; imagery; visual arts; literature; drama; and play and humor. It is noted that all of these arts are process-oriented, emotionally sensitive, socially directed, and awareness-focused. Chapter 1 discusses the history,…

  4. Models of genetic counseling and their effects on multicultural genetic counseling.

    Science.gov (United States)

    Lewis, Linwood J

    2002-06-01

    This theoretical paper examines challenges to multicultural genetic counseling, counseling between culturally different clients and counselors, in the context of Kessler's typology of models of genetic counseling (Kessler S (1997) J Genet Counsel 6:287-295). It is suggested that challenges such as resistance to multicultural genetic counseling education may be due to conceptions about genetic counseling as a biomedical field that transcends questions of culture as well as lack of multicultural training or prejudice. Directions for future research and recommendations for multicultural genetic counseling education are briefly explored.

  5. Gender Preference, Attitude and Awareness of Young Eligible Couples towards Pre Natal Sex Determination in Lucknow District

    Directory of Open Access Journals (Sweden)

    Ashish Srivastava, Jai V Singh, Om P Singh, Vijay K Singh, Neelam Singh

    2014-01-01

    Conclusion: The study clearly shows that son preference and pre natal sex determination still finds favour with a substantial proportion of young couples and emphasises the need for proper counselling and behaviour change communication among them.

  6. Infusing Counseling Skills in Test Interpretation.

    Science.gov (United States)

    Rawlins, Melanie E.; And Others

    1991-01-01

    Presents an instructional model based on Neurolinguistic Programming that links counseling student course work in measurement and test interpretation with counseling techniques and theory. A process incorporating Neurolinguistic Programming patterns is outlined for teaching graduate students the counseling skills helpful in test interpretation.…

  7. Globalization and Counseling: Professional Issues for Counselors

    Science.gov (United States)

    Lorelle, Sonya; Byrd, Rebekah; Crockett, Stephanie

    2012-01-01

    Scholars have examined globalization for many years in terms of its impact on individuals, but it remains a concept not often discussed in the counseling literature. As counseling transforms from a Western-based practice to a global phenomenon, it is important to understand professional counseling within an international and multicultural context.…

  8. Developing Multicultural Counseling Competencies in Undergraduate Students.

    Science.gov (United States)

    Estrada, Ana Ulloa; Durlak, Joseph A.; Juarez, Scott C.

    2002-01-01

    Assessed impact of training undergraduates in multicultural counseling competencies. When compared with a control group of students in a psychology of personality course (n=20), repeated measures analyses of variance confirmed that multicultural counseling trainees (n=21) significantly increased levels of multicultural counseling awareness and…

  9. A Framework for Chaos Theory Career Counselling

    Science.gov (United States)

    Pryor, Robert G. L.

    2010-01-01

    Theory in career development counselling provides a map that counsellors can use to understand and structure the career counselling process. It also provides a means to communicate this understanding and structuring to their clients as part of the counselling intervention. The chaos theory of careers draws attention to the complexity,…

  10. Teaching Couples Counseling: An Integrative Model

    Science.gov (United States)

    Long, Lynn L.; Burnett, Judith A.

    2005-01-01

    Traditionally, training in couples counseling has not received equal status as other counseling modalities. Recently, there is renewed interest in specific training for couples counseling as more emphasis is placed on the stability of couple relationships as an important factor for helping families and children function in a society of frequent…

  11. Counseling in Switzerland: Past, Present, and Future

    Science.gov (United States)

    Thomas, Roslyn; Henning, Stacy

    2012-01-01

    The authors review counseling in Switzerland and compare it with counseling in the United States. They evaluate the role of professional associations and programs and argue that the evolution of counseling is situated within the history and economic, social, and political systems of Switzerland. Findings suggest that Swiss counselors are ready to…

  12. The Career Counseling with Underserved Populations Model

    Science.gov (United States)

    Pope, Mark

    2011-01-01

    Providing effective career counseling to culturally diverse individuals is not the same as helping those from majority cultures. The Career Counseling With Underserved Populations model aids career counselors in supporting underserved populations as they strive to address their important career counseling issues.

  13. Retain Valuable Employees with Career Adaptation Counseling.

    Science.gov (United States)

    Kleiman, Marcia P.

    1985-01-01

    Discusses the goals of career adaptation counseling: to keep good people who may be dissatisfied; to make people who may have slipped more productive; and to save outplacement, recruitment, and training costs. Examines how counseling can help solve broad career issues, and how communication is crucial to the counseling process. (CT)

  14. Professional Counseling in Taiwan: Past to Future

    Science.gov (United States)

    Guo, Yuh-Jen; Wang, Shu-Ching; Combs, Don C.; Lin, Yi-Chun; Johnson, Veronica

    2013-01-01

    Because of the recent introduction of a licensure law, professional counseling has grown rapidly in Taiwan after decades of slow development. The authors provide a historical review of the development of professional counseling in Taiwan and discuss the current status and future trajectory of professional counseling in Taiwan.

  15. Identifying Role Diffusion in School Counseling

    Science.gov (United States)

    Astramovich, Randall L.; Hoskins, Wendy J.; Gutierrez, Antonio P.; Bartlett, Kerry A.

    2013-01-01

    Role ambiguity in professional school counseling is an ongoing concern despite recent advances with comprehensive school counseling models. The study outlined in this article examined role diffusion as a possible factor contributing to ongoing role ambiguity in school counseling. Participants included 109 graduate students enrolled in a…

  16. 28 CFR 551.113 - Counseling.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Counseling. 551.113 Section 551.113... Pretrial Inmates § 551.113 Counseling. (a) When consistent with institution security and good order, pretrial inmates may be allowed the opportunity to receive counseling services with convicted inmates....

  17. 20 CFR 638.517 - Counseling.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Counseling. 638.517 Section 638.517 Employees... THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.517 Counseling. The center operator shall establish and conduct an ongoing structured counseling program in accordance with procedures issued by...

  18. 24 CFR 206.41 - Counseling.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Counseling. 206.41 Section 206.41... CONVERSION MORTGAGE INSURANCE Eligibility; Endorsement Eligible Mortgagors § 206.41 Counseling. (a) List... receive counseling. (b) Information to be provided. A counselor must discuss with the mortgagor: (1)...

  19. Values and Social Justice in Counseling

    Science.gov (United States)

    Crethar, Hugh C.; Winterowd, Carrie L.

    2012-01-01

    The construct of social justice in counseling is defined and operationalized in this article. This is followed by a discussion about the intersection between social justice in counseling and philosophy, ethics, and spirituality. A call to action for counseling professionals is offered. (Contains 1 figure.)

  20. Sex Education and Intellectual Disability: Practices and Insight from Pediatric Genetic Counselors.

    Science.gov (United States)

    Murphy, Carly; Lincoln, Sharyn; Meredith, Stephanie; Cross, Elizabeth M; Rintell, David

    2016-06-01

    Intellectual disability (ID) with or without other anomalies is a common referral for genetic counseling. Sessions may include discussions of reproductive implications and other issues related to sex education. Patients with ID regularly meet barriers when trying to obtain sex education due to the misperceptions of others as being either asexual or that such education would promote inappropriate sexual behavior. In this pilot study, we surveyed genetic counselors to explore their experiences with being asked to provide sex education counseling and their comfort in doing so for patients with ID ages 9-17. Results were analyzed from 38 respondents. Caregivers and patients most frequently requested information on puberty, sex abuse prevention, and reproductive health. Genetic counselors were most comfortable when they could provide sex education counseling within the context of a particular condition or constellation of features. They were least comfortable when they lacked familiarity with the patient, caregiver, or the family's culture. The most frequently cited barriers that prevented genetic counselors from providing sex education counseling were lack of time, lack of training, the patient's ID being too profound, and a belief that genetic counselors should not be responsible for providing sex education counseling. While many respondents reported that providing sex education counseling is not considered within the scope of a genetic counselor's practice, they also noted that patients' families initiate discussions for which counselors should be prepared. Respondents indicated that resource guides specifically designed for use by genetic counselors would be beneficial to their practice. Genetic counselors have the opportunity to embrace the role of advocate and broach the issue of sexual health with caregivers and patients by directing them toward educational resources, if not providing sex education directly to effectively serve the needs of patients and

  1. Re-identification of home addresses from spatial locations anonymized by Gaussian skew

    Directory of Open Access Journals (Sweden)

    Cassa Christopher A

    2008-08-01

    Full Text Available Abstract Background Knowledge of the geographical locations of individuals is fundamental to the practice of spatial epidemiology. One approach to preserving the privacy of individual-level addresses in a data set is to de-identify the data using a non-deterministic blurring algorithm that shifts the geocoded values. We investigate a vulnerability in this approach which enables an adversary to re-identify individuals using multiple anonymized versions of the original data set. If several such versions are available, each can be used to incrementally refine estimates of the original geocoded location. Results We produce multiple anonymized data sets using a single set of addresses and then progressively average the anonymized results related to each address, characterizing the steep decline in distance from the re-identified point to the original location, (and the reduction in privacy. With ten anonymized copies of an original data set, we find a substantial decrease in average distance from 0.7 km to 0.2 km between the estimated, re-identified address and the original address. With fifty anonymized copies of an original data set, we find a decrease in average distance from 0.7 km to 0.1 km. Conclusion We demonstrate that multiple versions of the same data, each anonymized by non-deterministic Gaussian skew, can be used to ascertain original geographic locations. We explore solutions to this problem that include infrastructure to support the safe disclosure of anonymized medical data to prevent inference or re-identification of original address data, and the use of a Markov-process based algorithm to mitigate this risk.

  2. Equal Opportunity or Lip Service? Sex-Role Stereotyping in the Schools

    Science.gov (United States)

    Lynch, Jerry

    1975-01-01

    Suggests that schools play a major role in sex stereotyping and that violations of federal legislation, restrictions on individual development, and mental health problems may result. The effects of sex stereotyping on hiring practices, teacher models, physical education programs, counseling and guidance services, and textbooks are discussed. (JMB)

  3. Effect of didactic lectures on obesity documentation and counseling among internal medicine residents

    Directory of Open Access Journals (Sweden)

    Vicky Ren

    2016-04-01

    Full Text Available Background: Screening adult patients for obesity and offering appropriate counseling and treatment for weight loss is recommended. However, many healthcare providers feel ill-equipped to address this topic. Objective: We examined whether didactic presentations lead to increased obesity documentation and counseling among internal medicine (IM residents. Methods: We reviewed medical records of patients seen at the IM Resident Continuity Clinic during April 2015. Residents were provided feedback at two didactic presentations during May 2015. To examine the effect of this intervention, we repeated medical record review during June 2015. For both reviews, we abstracted patient-specific (i.e., age, body mass index [BMI], race, sex, and number of comorbid diagnoses and resident-specific (i.e., sex and training level data as well as evidence of obesity documentation and counseling. We used logistic regression models to examine the effect of intervention on obesity documentation and counseling, adjusting for patient- and resident-specific variables. Results: Of the 278 patients with BMI≥30 kg/m2, 139 were seen before and 139 after the intervention. Intervention had no effect on obesity documentation or counseling with or without adjustment for confounding variables (both P>0.05. In adjusted post-hoc analyses, each additional comorbidity increased the odds of obesity documentation by 8% (OR=1.08; 95% CI=1.05–1.11; P<0.001. In addition, as compared to postgraduate year (PGY 1 residents, PGY-3 residents were 56% (OR=0.44; 95% CI=0.21–0.95; P=0.03 less likely to counsel obese patients. Conclusions: Obesity is inadequately addressed in primary care settings, and didactic presentations were unable to increase obesity documentation or weight loss counseling. Future research to identify effective interventions is needed.

  4. The practice of OTC counseling by community pharmacists in Parana, Brazil

    Directory of Open Access Journals (Sweden)

    Halila GC

    2015-12-01

    Full Text Available Background: In order to provide appropriate advice to the patient at the time of dispensing and over-the-counter (OTC medication counseling, community pharmacists need access to current and reliable information about medicines. Brazilian pharmacists have assumed new functions such as prescribing medication, in a dependent model, based in protocols. Objective: To examine the practice of community pharmacists in a Brazilian State, focusing on OTC recommendation. Method: A cross-sectional survey of community pharmacists in a state of Brazil was conducted from October 2013 to January 2014, with data collection through a pre-piloted self-administered anonymous survey via Survey Monkey® platform. Following ethical approval, the online instrument was sent to 8,885 pharmacists registered in Parana State, Brazil, focusing on professionals working in community pharmacies. The questionnaire assessed the community pharmacy setting, the search for information, the knowledge of the evidence-based practice, the important factors to consider when recommending an OTC medicine, and the pharmacist prescribing. Responses were imported into SPSS® (version 22.0 for analysis. Nonparametric tests were used to assess the association between responses and demographic information with a significance level less than 5% (p<0.05. Results: Of the pharmacists, 97.4% dispensed medications and counseled patients for a median of six hours per day. Product's efficacy (97% and adverse effects (62.3% were the most important factors taken into account when counseling a nonprescription medicine. Few pharmacists knew the meaning of terms related to evidence-based health. Most respondents agreed that pharmacists have the necessary training to prescribe. Conclusion: Over-the-counter medication counseling is a daily practice among Brazilian pharmacists. Learning needs exist for community pharmacists in relation to evidence-based practice. Thus, sources of information with good evidence

  5. Knowledge Translation in Rehabilitation Counseling

    Science.gov (United States)

    Johnson, Kurt; Brown, Pat; Harniss, Mark; Schomer, Katherine

    2010-01-01

    The process and importance of Knowledge Translation (KT) for the field of rehabilitation counseling is described. One element of the KT process, systematic reviews of the literature, is described along with several strategies for grading evidence. Practicing clinicians, as do consumers, encounter a number of barriers to using primary source…

  6. College Student Depression: Counseling Billy

    Science.gov (United States)

    Mobley, A. Keith

    2008-01-01

    A substantial portion of the college student population experiences affective disorders. This case study presents the conceptualization, course of treatment, and outcomes for a male college student presenting for counseling with depression. A review of Adlerian, cognitive-behavioral, and Gestalt techniques is provided. (Contains 1 figure.)

  7. Counseling Considerations with Gay Couples.

    Science.gov (United States)

    Winkelpleck, Judy M.; Westfeld, John S.

    1982-01-01

    Discusses the unique strengths of gay couples and major issues which need more consideration. Suggests guidelines for counselors and psychologists working with gay couples, based on a survey of homosexuals and professionals who work with them. Urges professionals to accept homosexuality and develop good counseling skills in this area. (Author/JAC)

  8. Family Assessment and Genetic Counseling.

    Science.gov (United States)

    Carpenter, Pat; And Others

    Presented are two papers from a panel discussion on prenatal diagnosis and genetic counseling with families. D. Blackston (director of the Developmental Evaluation Clinic, Decatur, Georgia) points out that a concise family history, pregnancy and birth data, developmental history, careful physical examination, and appropriate laboratory studies are…

  9. Juvenile Diabetes and Rehabilitation Counseling.

    Science.gov (United States)

    Stone, J. Blair; Gregg, Charles H.

    1981-01-01

    Severe complications of diabetes are more likely to occur with the juvenile diabetic and problems of psychosocial adjustment are recurring and difficult. Implications for the rehabilitation counselor are discussed in terms of employment considerations, the effects of complications, genetic counseling, and cooperation with other professionals.…

  10. Multicultural Counseling: An Appalachian Perspective

    Science.gov (United States)

    Salyers, Kathleen M.; Ritchie, Martin H.

    2006-01-01

    Appalachians have been referred to as the forgotten people and are often overlooked in multicultural counseling. A case study is presented using the extended case method to enhance counselor awareness and demonstrate how counselors can apply knowledge of the Appalachian culture in the provision of best practices for this population.

  11. Behavior Modification in Marriage Counseling

    Science.gov (United States)

    Baird, Emily; Redfering, David L.

    1975-01-01

    The spouses were counseled jointly with a cognitive approach and separately with behavior modification techniques for the husband's obesity and the wife's lack of affective verbalization. After eight weeks, the husband had lost thirty pounds and the wife's affective language had increased markedly. (Author)

  12. Family Counseling for All Counselors.

    Science.gov (United States)

    Kaplan, David M.

    Counselors whose specialty is marriage and family counseling develop a theoretical and research base and acquire countless hours of experience upon which to base their interventions. Most counselors and other helping professionals whose specialty is in another area do as well as they can lacking specific theoretical concepts and experience from…

  13. Board Certification in Counseling Psychology

    Science.gov (United States)

    Crowley, Susan L.; Lichtenberg, James W.; Pollard, Jeffrey W.

    2012-01-01

    Although specialty board certification by the American Board of Professional Psychology (ABPP) has been a valued standard for decades, the vast majority of counseling psychologists do not pursue board certification in the specialty. The present article provides a brief history of board certification in general and some historical information about…

  14. Five-year monitoring of a gay-friendly voluntary counselling and testing facility in Switzerland: who got tested and why?

    Directory of Open Access Journals (Sweden)

    Gumy Cédric

    2012-06-01

    Full Text Available Abstract Background An increase in new HIV cases among men who have sex with men (MSM has been reported in Switzerland since 2001. A rapid result HIV testing for MSM through voluntary counselling and testing (VCT facility (“Checkpoint” was opened in Geneva in 2005. This gay-friendly facility, the first to open in Switzerland, provides testing for sexually transmitted infections (STI and rapid result HIV testing and counselling. Our objective was to analyze Checkpoint’s activity over its first five years of activity and its ability to attract at-risk MSM. Methods We used routine data collected anonymously about the facility activity (number of clients, number of tests, and test results and about the characteristics of the clientele (sociodemographic data, sexual risk behaviour, and reasons for testing from 2005 to 2009. Results The yearly number of HIV tests performed increased from 249 in 2005 to 561 in 2009. The annual proportion of positive tests among tests performed varied between 2% and 3%. Among MSM clients, the median annual number of anal intercourse (AI partners was three. Roughly 30% of all MSM clients had at least one unprotected anal intercourse (UAI experience in the previous 12 months with a partner of different/unknown HIV status. The main reason for testing in 2007, 2008, and 2009 was “sexual risk exposure” (~40%, followed by “routine” testing (~30% and “condom stopping in the beginning of a new steady relationship” (~10%. Clients who came to the facility after a sexual risk exposure, compared to clients who came for "routine testing" or "condom stopping" reasons, had the highest number of AI partners in the previous 12 months, were more likely to have had UAI with a partner of different/unknown HIV status in the previous 12 months (respectively 57.3%, 12.5%, 23.5%, more likely to have had an STI diagnosed in the past (41.6%, 32.2%, 22.9%, and more likely to report recent feelings of sadness or depression

  15. Contextualising eating problems in individual diet counselling

    DEFF Research Database (Denmark)

    Kristensen, Søren Tange; Køster, Allan

    2014-01-01

    than is usually the case in diet counselling, motivational interviewing and health coaching. We suggest the use of narrative practice as a critical and context-sensitive counselling approach to eating problems. Principles of externalisation and co-researching are combined within a counselling framework...... that employs logistic, social and discursive eating problems as analytic categories. Using cases from a health clinic situated at the Metropolitan University College in Copenhagen, we show that even if the structural conditions associated with eating problems may not be solvable through individual counselling...... counselling...

  16. Contextualising eating problems in individual diet counseling

    DEFF Research Database (Denmark)

    Kristensen, Søren Tange; Køster, Allan

    2014-01-01

    than is usually the case in diet counselling, motivational interviewing and health coaching. We suggest the use of narrative practice as a critical and context-sensitive counselling approach to eating problems. Principles of externalisation and co-researching are combined within a counselling framework...... that employs logistic, social and discursive eating problems as analytic categories. Using cases from a health clinic situated at the Metropolitan University College in Copenhagen, we show that even if the structural conditions associated with eating problems may not be solvable through individual counselling...... counselling....

  17. Biblical counselling regarding inner change

    Directory of Open Access Journals (Sweden)

    Y. Campbell-Lane

    2005-07-01

    Full Text Available The concept of inner change is not only the ultimate goal of counselling; it is also a central concept of the gospel. Biblical counselling entails a Scriptural understanding of the nature of change and aims at helping the counsellee change his/her inner life under the guidance of the Holy Spirit. Change is the essence of the process of sanctification, entailing “putting off” (laying off sinful ways of life, renewing the mind, and ”putting on” (“clothing” oneself with godly ways of life (Eph. 4:22 ff.; Col. 3:8 ff.; Rom. 12:1-2. Although believers have a new identity in Christ, they still suffer from the effect of sin and have to grow in sanctification. Often the believer has not been instructed about changing previous irrational and unbiblical beliefs, behaviour, and habits, and he/she thus still integrates these negative results of sin into his/her new life. Unless old patterns are replaced with new ones, the counsellee can revert to sinful habits, unbiblical beliefs and behavioural patterns. A pastoral counsellor thus needs to teach the counsellee that God has made provision for him/her to change. A worldly anthropology-psychology is entirely opposed to the Biblical doctrines of sin and sanctification. Effective Biblical counselling depends on a Biblical anthropology and world view. A Biblical counsellor should promote holiness and a lifestyle in accordance with Biblical guidelines, thus shaping the counsellee to the likeness of Jesus Christ. When a Biblical counsellor ministers the Word of God in a life-transforming way, then God himself changes the counsellee from the inside out. A counsellor may not ignore sin and its effect as it will limit the effectiveness of counselling in facilitating lasting change in the life of a counsellee. It is important that a Biblical counseller understands the nature of change and is equipped with knowledge about, and the character of change.

  18. An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products

    Science.gov (United States)

    Zhang, Zhen; Kim, K. H. (Kane); Kang, Myeong-Ho; Zhou, Tianran; Chung, Byung-Ho; Kim, Shin-Hyo; Lee, Seok-Joon

    The rapid growing of online purchasing of information products poses challenges of how to preserve the customer's privacy during the online transactions. The current widely used way of online shopping does not consider the customer's privacy protection. It exposes the customer's sensitive information unnecessarily. We propose a new five-party implementation model called 5PAPS that provides much enhanced protection of the customer's privacy. The model combines the advantages of the e-cash techniques, the mix technique, the anonymous-honoring merchant model, and the anonymity-protecting payment gateway model. It is aimed for protecting the customer's anonymity in all applicable aspects. Security and anonymity issues of the model have been analyzed. The results show that the model is robust against varieties of common attacks and the customer's anonymity can be protected even in the presence of some collusion among the parties involved in the transactions. Experimental prototyping of the essential parts yields partial validation of the practical nature of the 5PAPS model, and it has also produced reliable estimates of the storage and messaging volume requirements present in sizable purchasing systems.

  19. 可追踪的匿名证书%The Traceable Anonymous Certificate

    Institute of Scientific and Technical Information of China (English)

    王兵

    2014-01-01

    This paper introduces the traceable anonymous certificate, and analyzes the proposed traceable anonymous certificate is⁃suing and tracing protocol in detail, the traceable anonymous certificate should possess two core characteristics: anonymity and non-repudiation, the two features ensure that users can prove the identity himself but without revealing his true identity, this certificate can be used to provide anonymous service in network application.%该文介绍了可追踪匿名证书,并对提出的可追踪匿名证书的发布和追踪协议进行了详细的分析,可追踪匿名证书应该具有匿名性和不可否认性两个核心特点,这两个特点保证了用户可以在不泄露自己的真实身份的情况下来证明用户的身份,这样的证书可以被用于需要提供匿名服务的网络应用中。

  20. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  1. The current state of genetic counseling before and after amniocentesis for fetal karyotyping in Japan: a survey of obstetric hospital clients of a prenatal testing laboratory.

    Science.gov (United States)

    Nishiyama, Miyuki; Sawai, Hideaki; Kosugi, Shinji

    2013-12-01

    Pregnant women undergoing prenatal genetic testing should receive genetic counseling so they can make informed decisions. We examined the current state of providing genetic counseling in Japan to pregnant women before they elected amniocentesis for prenatal diagnosis of chromosome abnormalities and after test results were completed, and explored the opportunity for expanding access to certified genetic counselors (CGC) at clinical practices offering amniocentesis. An anonymous survey was mailed to the 298 hospitals that referred amniotic fluid specimens to LabCorp Japan in 2009. Most genetic counseling was provided by the obstetrician alone; 73.8 % (76/103) of pre-amniocentesis, 82.5 % (85/103) if normal results, and 49.4 % (44/89) if abnormal results. Respondents spent limited time in genetic counseling; 57.3 % spent amniocentesis, 88.3 % spent <10 min for normal results, and 54.0 % spent <20 min for abnormal results. While 45.8 % indicated that CGC do not have an essential role in clinical practice, responses that supported employment of CGC were more likely to come from hospitals that submitted more than ten specimens annually (p < 0.0001), university hospitals (p < 0.0001), and MD geneticists (p = 0.020). Currently, there is limited genetic counseling available in Japan. This indicates there are opportunities for the employment of CGC to improve the quality of genetic counseling.

  2. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.

    Science.gov (United States)

    Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan

    2016-11-01

    Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.

  3. RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks

    Science.gov (United States)

    Wei, Yu-Chih; Chen, Yi-Ming; Shan, Hwai-Ling

    In Vehicular Networks, for enhancing driving safety as well as supporting other applications, vehicles periodically broadcast safety messages with their precise position information to neighbors. However, these broadcast messages make it easy to track specific vehicles and will likely lead to compromise of personal privacy. Unfortunately, current location privacy enhancement methodologies in VANET, including Pseudonymization, K-anonymity, Random silent period, Mix-zones and path confusion, all suffer some shortcomings. In this paper, we propose a RSSI (Received Signal Strength Indicator)-based user centric anonymization model, which can significantly enhance the location privacy and at the same time ensure traffic safety. Simulations are performed to show the advantages of the proposed method. In comparison with traditional random silent period method, our method can increase at least 47% of anonymity in both simple and correlation tracking.

  4. Employee Anonymous Online Dissent: Dynamics and Ethical Challenges for Employees, Targeted Organisations, Online Outlets and Audiences

    DEFF Research Database (Denmark)

    Ravazzani, Silvia; Mazzei, Alessandra

    2015-01-01

    ethical challenges that take into consideration the perspectives of employees, targeted organisations, online outlet administrators and audiences. The ethical challenge for employees is to disclose problems for organisational and societal changes in a safe context and supported by a large audience, while......This paper aims to enhance understanding of dissent expressive acts that employees voice via anonymous online public contexts. Based on literature on organisational dissent, anonymity and online disclosure, we first point out key dynamics of employee anonymous online dissent, and then present...... remaining accountable for them and avoiding emotion-focused and defensive disclosure. Targeted organisations need to prevent external disclosure while ensuring freedom of speech and employee privacy, and to respond effectively when overt criticism is found online. Other tensions concern online outlet...

  5. Anonymity and informed consent in artificial procreation: a report from Denmark

    DEFF Research Database (Denmark)

    Lebech, Anne Mette

    1997-01-01

    a problem concerning its application when dealing with people having a serious mental, social or even physical disability. Within the field of artificial procreation there are even more problems. Informed written consent is often demanded from anonymous donors of gametes in order to ensure their consent...... to the legal and moral consequences of their anonymity. The child resulting from the artificial procreation, on the contrary, cannot consent to, nor be informed before being conceived, of the secrecy laid on the identity of its genetic parents. Some countries resolve this problem by allowing the children, when...... be regarded as invalid. The paper will argue that a law ensuring the complete anonymity of the parents is disregarding the informed consent and the interests of the children resulting from artificial procreation, and is thus doing more damage to society than good....

  6. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  7. The Role of Behavioral Counseling in STD Prevention Program Settings

    Science.gov (United States)

    Brookmeyer, Kathryn A.; Hogben, Matthew; Kinsey, Jennine

    2015-01-01

    Background Behavioral counseling for STD prevention is recommended for persons at risk, and the body of evidence yields numerous interventions that have STD preventive efficacy. What is needed is a review of the subset of these interventions that could be feasible in clinical settings, especially settings in STD prevention programs. Methods We reviewed existing systematic reviews of the literature and abstracted from them studies that fit the following criteria in that the interventions: (1) used no more than 60 minutes contact time in 1 to 2 sessions, (2) were individual-level and face to face, (3) took place in a clinical setting, (4) had STD outcomes available, (5) were based in the United States, (6) were peer-reviewed, and (7) had a control group. Results From 6 reviews (published 2006 – 2014) covering 91 studies, we found 13 analyses representing 11 intervention studies that fit the selection criteria. Of these 13, 5 returned lower STD rates in the intervention group at follow-up; one study reported a higher rate of STD in one subset of the intervention group (men who have sex with men: MSM). Studies with effects on STD at follow-up were quite similar to studies across populations, settings and follow-up periods, although successful interventions were more likely to demonstrate behavioral effects as well (5 of 5 versus 2 of 5 among 10 interventions measuring behavior change). Conclusions Counseling is likely to benefit some STD clinic attendees, although unlikely to benefit MSM. The balance of costs and benefits of implementing behavioral counseling in STD programs is unclear, but feasibility would be improved if behavioral counseling were implemented in the context of other prevention efforts. Because populations outside typical STD clinic settings could also benefit, programs may exercise a valuable role through partnerships. PMID:26779681

  8. 电子投票匿名性分析%Anonymity Analysis of Electronic Voting

    Institute of Scientific and Technical Information of China (English)

    黄福人; 屈玉贵

    2011-01-01

    电子投票公布计票结果会影响投票者的匿名性.针对该问题,定义匿名性为投票选择的不确定度,利用熵衡量投票系统的投票者匿名性,比较计票结果公布前后投票者的匿名性变化.分析结果表明,投票规模越小,投票者匿名性在结果公布后受到的损失越大;在小规模电子投票情况下,计票结果应该选择只公布获胜者,不公布具体得票数,以减少投票者匿名的损失.%The disclosure of the number of votes can compromise the voters' anonymity of the electronic voting. Aiming at this problem, this paper defines anonymity by using the uncertainty of the voting choices and measures the anonymity of the whole voting system by entropy. It compares the anonymity after the release of the voting results with that before releasing the voting results. Analysis result shows that the smaller the voting scale is, the more the voters' anonymity loses. In the design of small-scale electronic-voting scheme, releasing the winner instead of the number of votes that candidates gained decreases the loss of anonymity.

  9. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.

    Science.gov (United States)

    Bushnag, Anas; Abuzneid, Abdelshakour; Mahmood, Ausif

    2016-06-27

    Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  10. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  11. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    LENUS (Irish Health Repository)

    Walsh, Anthony PH

    2011-04-20

    Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004\\/23\\/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004\\/23\\/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  12. The Comparison of Attention Biases to Opiates in Substance Dependent and Treated Clients of Therapeutic Clinics and Narcotics Anonymous Memberships

    Directory of Open Access Journals (Sweden)

    Javad Enayat

    2012-11-01

    Full Text Available Aim: The purpose of this study was to compare the attention bias about tempting incentives related to opium materials in treated, addicted and normal people. Duration of consumption and treating were also considered. Method: In this causal-comparative study population was all addicted people who were referred to the rehabilitation offices, addiction treatment clinic, rebirthing centers and Narcotics Anonymous of East Azerbaijan. This study consisted of five groups of men, including addicted to opium materials which are divided into two groups namely: long consumption period and people with short consumption period, also, treated people including long term treated and short term treated, and a normal control group. Altogether, 103 selected people were studied. Sample groups were similar in terms of age, education, and sex. For measuring attention bias towards tempting stimuli related opiates, a words recognition test was used. This test included three subtests and one recognition test. The recognition scores for the three categories of words were measured. Results: The findings indicated that there was a difference in attention against opium material incentives between control group and the mild and severe consumers groups. Also there were significant differences between treated people with the short time distance and control group, and control group had less temptation and biases in comparison to the other groups. Finally, those who have mild consumption are threatened more in comparison with the control group. Conclusion: The findings have applied implications.

  13. Darknet and bitcoin, the obscure and anonymous side of the internet in healthcare.

    Science.gov (United States)

    Masoni, Marco; Guelfi, Maria Renza; Gensini, Gian Franco

    2016-11-14

    Illegal activities prosecutable by law in the real life can be committed on the internet alike. In the healthcare domain, we refer mainly to selling of illegal and counterfeit drugs, exchange of pedo-pornographic material and marketing of stolen medical records. These illegal activities are made easier by recent developments of the Internet that medical community must be aware of: darknet and bitcoin. The first allows anonymous surfing and the last anonymous financial transactions. After discussing which healthcare areas are affected by these technological developments of the Internet and the deriving consequences, then the Authors express their opinion on what actions can be taken to protect internet community.

  14. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

    DEFF Research Database (Denmark)

    Abdalla, Michel; Bellare, Mihir; Catalano, Dario

    2005-01-01

    ] is computationally consistent, and provide a new scheme that is statistically consistent. We also provide a transform of an anonymous IBE scheme to a secure PEKS scheme that, unlike the previous one, guarantees consistency. Finally we suggest three extensions of the basic notions considered here, namely anonymous......We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of [7...

  15. [Lethal sex].

    Science.gov (United States)

    Rabinerson, David; Ben-Shitrit, Gadi; Glezerman, Marek

    2011-03-01

    Asphyxiophilic sex is a form of autoerotic activity, in which the user creates mechanical means (such as hanging or bondage) in order to achieve cerebral hypoxia, which, in turn, enhances sexual, as well as orgasmic, stimulus. Failure of safety mechanisms, created by the user, may lead to instant death as a result of asphyxiation or strangulation. This kind of sexual practice is more prevalent among men than in women. In cases of death, it is difficult to relate it to the sexual practice itself. Suicide and homicide are the main differential diagnoses. Closely related derivatives of asphyxiophilic sex are anesthesiophilia (inhalation of variable volatile substances) and electrophilia (use of electric current during sexual activity)--both also intended to enhance the sexual stimulation. These forms of sexual practice are less prevalent than asphyxiophilia.

  16. Sex during Pregnancy

    Science.gov (United States)

    ... Your 1- to 2-Year-Old Sex During Pregnancy KidsHealth > For Parents > Sex During Pregnancy A A ... safe sexual relationship during pregnancy. Is Sex During Pregnancy Safe? Sex is considered safe during all stages ...

  17. When Sex Is Painful

    Science.gov (United States)

    ... AQ FREQUENTLY ASKED QUESTIONS GYNECOLOGIC PROBLEMS FAQ020 When Sex Is Painful • How common is painful sex? • What causes pain during sex? • Where is pain during sex felt? • When should ...

  18. Sex during Pregnancy

    Science.gov (United States)

    ... Old Feeding Your 1- to 2-Year-Old Sex During Pregnancy KidsHealth > For Parents > Sex During Pregnancy ... satisfying and safe sexual relationship during pregnancy. Is Sex During Pregnancy Safe? Sex is considered safe during ...

  19. The Knowledge, Attitude and Behavior of HIV/AIDS Patients’ Family toward Their Patients before and after Counseling

    Directory of Open Access Journals (Sweden)

    Behnam Honarvar

    2010-12-01

    Full Text Available Background: Acquired immunodeficiency may impose considerableconsequences on patients’ family behaviors towardthem. The objective of the present study was to investigatewhether a counseling program at Behavioral Counseling Centerin the city of Shiraz, Iran could change the attitude, knowledgeand behavior of patients' family members.Methods: 125 HIV/AIDS patients’ family members were interviewed,using a valid and reliable questionnaire before andafter performing counseling sessions at Behavioral CounselingCenter. The findings were analyzed using nonparametric tests.Results: The age of the participants was 40±13 years. Sixty fivepercent were female, 63% married and 79% educated. Forty fourpercent of participants had spousal relationships with their patients.Their knowledge about the main routes of HIV transmissionwere 9.76 ± 2.59 and10.64±0.88 before and after counseling,respectively (P=0.028. Supportive behaviors of families towardtheir patients reached to 79% after counseling compared with 44% before that (P=0.004. Belief to isolate the patients and thepractice of this approach at home dropped from 71% to 15% andfrom 29% to 7% after counseling, respectively (P0.05.Conclusion: Ongoing counseling for HIV/AIDS patients’ familiesat Behavioral Counseling Center of Shiraz did advance theirknowledge about AIDS and improved their attitude and behaviortoward their patients However, the counseling program didnot show remarkable success in some aspects such as the removalof fear about HIV spread in the family or the change ofthe patients’ wives attitude to have protected sex with their HIVinfected husbands.Iran J Med Sci 2010; 35(4: 287-292.

  20. [Communication skills for prenatal counselling].

    Science.gov (United States)

    Bitzer, J; Tschudin, S; Holzgreve, W; Tercanli, S

    2007-04-18

    Prenatal counselling is characterized by specific characteristics: A):The communication is about the values of the pregnant woman and her relationship with the child to be. B) The communication deals with patient's images and emotions. C) It is a communication about risks, numbers and statistics. D) Physician and patient deal with important ethical issues. In this specific setting of prenatal diagnosis and care physicians should therefore learn to apply basic principles of patient-centred communication with elements of non directive counselling, patient education and shared decision making. These elements are integrated into a process which comprises the following "steps": 1. Clarification of the patient's objectives and the obstetrician's mandate. 2. The providing of individualized information and education about prenatal tests and investigations. 3. Shared decision making regarding tests and investigations 4. Eventually Breaking (bad, ambivalent) news. 5. Caring for patients with an affected child.

  1. [Online Counselling: The prospect of a therapeutic connection].

    Science.gov (United States)

    Giotakos, O; Papadomarkaki, E

    2016-01-01

    Over the last few years, Internet has become an integral part of daily life. An abundant source of information and a principal gateway of communication between individuals, Internet has been continuously gaining considerable ground as a tool of awareness and intervention in the area of public health. With regard to the field of mental health, Internet exhibits a credible potential in facilitating dialogue not only between experts and their beneficiaries but also between stakeholders. Moreover and with regard to various aspects of public concern, it can serve as a circulation portal of educational material between students and teachers. The advent of remote support services dates back in the decade of 1970-1980. In the present time, they consist of informative guides and self-help groups or online counselling. The latter is defined as the process in which both parties, namely the therapist and the client, are involved in an oral or written conciliation through means of an internet connection, videoconferencing, live chat or e-mail exchange. The benefits of this practice - accessibility, relocation, convenience, anonymity, facilitation of face-to-face psychotherapy and low cost - could make online counseling, in specific cases, the treatment of choice. While the usage of the World Wide Web seems promising for the rectification of mental health disorders, there is some debate among experts regarding the ethical aspect of practicing psychotherapy in an interactive digital environment. Issues such as technical expertise and the tackling of related problems, difficulties in the diagnostic process, interchange of verbal and nonverbal cues, crisis management, safeguarding the therapeutic alliance, protection of personal data, age restriction, keeping boundaries in relation to the setting, the time and the dynamics of the therapeutic relationship and, finally, training and supervisory process of online therapist, are some subjects of disagreement. Relevant research reveals

  2. Genetic Counseling in Military Hospitals

    Science.gov (United States)

    1987-04-01

    the result of the negligence of a doctor or pharmacist. Examples of wrongful pregnancy claims are physicians who negligently perform tubal ligations ...plaintiffs sued for the alleged breach of a post conception duty of the treating physicians to advise the plaintiffs of the implications of the mother’s...sergeant, wife, and two daughters for alleged negligent genetic counseling. The Harbeson children were born with fetal hydantoin syndrome . 4 6 The

  3. Field-Based Video Pre-Test Counseling, Oral Testing, and Telephonic Post-Test Counseling: Implementation of an HIV Field Testing Package among High-Risk Indian Men

    Science.gov (United States)

    Snyder, Hannah; Yeldandi, Vijay V.; Kumar, G. Prem; Liao, Chuanhong; Lakshmi, Vemu; Gandham, Sabitha R.; Muppudi, Uma; Oruganti, Ganesh; Schneider, John A.

    2012-01-01

    In India, men who have sex with men (MSM) and truck drivers are high-risk groups that often do not access HIV testing due to stigma and high mobility. This study evaluated a field testing package (FTP) that identified HIV positive participants through video pre-test counseling, OraQuick oral fluid HIV testing, and telephonic post-test counseling…

  4. Current Institutional Trends in Research Productivity in Counseling Psychology Journals

    Science.gov (United States)

    Diegelman, Nathan M.; Uffelman, Rachel A.; Wagner, Kimberly S.; Diegelman, Sally A.

    2005-01-01

    This study investigated institutional publication activity in counseling psychology journals for the 10-year period from 1993 to 2002. Four journals reported by counseling psychology training directors as prime publication outlets for the field of counseling psychology were used: "Journal of Counseling Psychology," "The Counseling Psychologist,"…

  5. Over a Half-Century Encapsulated: A Multicultural Content Analysis of the "Journal of Counseling Psychology," 1954-2009

    Science.gov (United States)

    Lee, Debbiesiu L.; Rosen, Adam D.; Burns, Victoria

    2013-01-01

    Articles including multicultural content published in the "Journal of Counseling Psychology" ("JCP"), from 1954 to 2009, were examined for themes. Multicultural content in this study was broadly defined to include the following identities: race/ethnicity, gender/sex, religion/spirituality, sexual orientation, social status, disability, age, and…

  6. Nurturing the Relationships of All Couples: Integrating Lesbian, Gay, and Bisexual Concerns into Premarital Education and Counseling Programs

    Science.gov (United States)

    Casquarelli, Elaine J.; Fallon, Kathleen M.

    2011-01-01

    Research shows that premarital counseling programs help engaged couples develop interpersonal and problem-solving skills that enhance their marital relationships. Yet, there are limited services for same-sex couples. This article assumes an integrated humanistic and social justice advocacy stance to explore the needs of lesbian, gay, and bisexual…

  7. The development of counselling psychology in Ireland.

    Science.gov (United States)

    Connolly, Allison; O'Callaghan, Dermot; O'Brien, Owen; Broderick, John; Long, Catherine; O'Grady, Ian

    2014-03-01

    This paper discusses the distinctive nature of the specialism of counselling psychology and outlines the development of the discipline in Ireland in the context of international developments and its recognition as a professional branch of applied psychology. Today, counselling psychologists are employed in varied clinical and non-clinical settings including health and mental health services (statutory, private and voluntary sector) along with education, forensic, justice, industry and private practices. Counselling psychologist is the primary professional identity of many practising psychologists in Ireland and the Psychological Society of Ireland's Division of Counselling Psychology is the main affiliation of at least 179 members. With its focus on facilitating personal and interpersonal functioning across the life span and its emphasis on the therapeutic process, the specialism continues to bridge the disciplines of psychology, counselling and psychotherapy. In this article, some of the challenges still faced by counselling psychology are explored as it navigates its way through the changing landscape of further development and evolution.

  8. Social influence in computer-mediated communication : The effects of anonymity on group behavior

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Sakhel, K; de Groot, D

    2001-01-01

    Two studies examined hypotheses derived from a Social Identity model of Deindividuation Effects (SIDE) as applied to social influence in computer-mediated communication (CMC) in groups. This model predicts that anonymity can increase social influence if a common group identity is salient. In a first

  9. Knowing me, knowing you : Anonymity effects on social identity processes within groups

    NARCIS (Netherlands)

    Lea, M; Spears, R; de Groot, D

    2001-01-01

    The Social Identity Model of Deindividuation Effects (SIDE) proposes that depersonalization of self and others is responsible for the effects of visual anonymity on group behavior The authors investigated these mediating processes by assessing the effects of group-based self-categorization and stere

  10. Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2015-10-01

    Full Text Available In a multi-receiver encryption system, a sender chooses a set of authorized receivers and sends them a message securely and efficiently, as the message is well encrypted and only one ciphertext corresponding to the message is generated no matter how many receivers the sender has chosen. It can be applied to video conferencing systems, pay-per-view channels, remote education, and so forth. Due to privacy considerations, an authorized receiver may not expect that his identity is revealed. In 2010, anonymous multi-receiver identity-based (ID-based encryption was first discussed, and furthermore, many works on the topic have been presented so far. Unfortunately, we find that all of those schemes fail to prove the chosen ciphertext attacks (CCA security in either confidentiality or anonymity. In this manuscript, we propose the first anonymous multi-receiver ID-based authenticated encryption scheme with CCA security in both confidentiality and anonymity. In the proposed scheme, the identity of the sender of a ciphertext can be authenticated by the receivers after a successful decryption. In addition, the proposed scheme also is the first CCA-secure one against insider attacks. Moreover, only one pairing computation is required in decryption.

  11. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

    Directory of Open Access Journals (Sweden)

    Kai Chain

    2016-11-01

    Full Text Available Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity.

  12. The Rationality of Alcoholics Anonymous and the Spirituality of Rational Emotive Behavior Therapy.

    Science.gov (United States)

    Velten, Emmett

    1996-01-01

    Argues that Alcoholics Anonymous (AA) and Rational Emotive Behavior Therapy (REBT) share important rational objectives and numerous cognitive-behavioral methods. Both emphasize a philosophical shift as a principal ingredient for change. Provides definitions of rationality and spirituality and explains how REBT and smart recovery are spiritual…

  13. Extended K-Anonymity Model for Privacy Preserving on Micro Data

    Directory of Open Access Journals (Sweden)

    Masoud Rahimi

    2015-11-01

    Full Text Available Today, information collectors, particularly statistical organizations, are faced with two conflicting issues. On one hand, according to their natural responsibilities and the increasing demand for the collected data, they are committed to propagate the information more extensively and with higher quality and on the other hand, due to the public concern about the privacy of personal information and the legal responsibility of these organizations in protecting the private information of their users, they should guarantee that while providing all the information to the population, the privacy is reasonably preserved. This issue becomes more crucial when the datasets published by data mining methods are at risk of attribute and identity disclosure attacks. In order to overcome this problem, several approaches, called p-sensitive k-anonymity, p+-sensitive k-anonymity, and (p, α-sensitive k-anonymity, were proposed. The drawbacks of these methods include the inability to protect micro datasets against attribute disclosure and the high value of the distortion ratio. In order to eliminate these drawbacks, this paper proposes an algorithm that fully protects the propagated micro data against identity and attribute disclosure and significantly reduces the distortion ratio during the anonymity process.

  14. Anonymity in giving in a natural context : an economic field experiment in thirty churches

    NARCIS (Netherlands)

    Soetevent, Adriaan R.

    2003-01-01

    The role of anonymity in giving is examined in a field experiment performed in thirty Dutch churches. For a period of 29 weeks, the means by which offerings are gathered is determined by chance, prescribing for each offering the use of either `closed' collection bags or open collection baskets. When

  15. Peer Feedback in Anonymous Peer Review in an EFL Writing Class in Spain

    Science.gov (United States)

    Coté, Robert A.

    2014-01-01

    The present study reports the results of a process of peer feedback through anonymous peer review in an EFL writing class. Numerous studies have reported on the benefits of peer review (PR) in the ESL/EFL writing classroom. However, the literature also identifies social issues that can negatively affect the outcome of face-to-face PR. In this…

  16. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...

  17. Brother-Sister Incest: Data from Anonymous Computer-Assisted Self Interviews

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel; Stroupe, Walter

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self interview. Forty were classified as victims of brother-sister incest, 19 were classified as victims of father-daughter incest, and 232 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The…

  18. Open and Anonymous Peer Review in a Digital Online Environment Compared in Academic Writing Context

    Science.gov (United States)

    Razi, Salim

    2016-01-01

    This study compares the impact of "open" and "anonymous" peer feedback as an adjunct to teacher-mediated feedback in a digital online environment utilising data gathered on an academic writing course at a Turkish university. Students were divided into two groups with similar writing proficiencies. Students peer reviewed papers…

  19. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  20. Bayesian modeling of consumer behavior in the presence of anonymous visits

    Science.gov (United States)

    Novak, Julie Esther

    Tailoring content to consumers has become a hallmark of marketing and digital media, particularly as it has become easier to identify customers across usage or purchase occasions. However, across a wide variety of contexts, companies find that customers do not consistently identify themselves, leaving a substantial fraction of anonymous visits. We develop a Bayesian hierarchical model that allows us to probabilistically assign anonymous sessions to users. These probabilistic assignments take into account a customer's demographic information, frequency of visitation, activities taken when visiting, and times of arrival. We present two studies, one with synthetic and one with real data, where we demonstrate improved performance over two popular practices (nearest-neighbor matching and deleting the anonymous visits) due to increased efficiency and reduced bias driven by the non-ignorability of which types of events are more likely to be anonymous. Using our proposed model, we avoid potential bias in understanding the effect of a firm's marketing on its customers, improve inference about the total number of customers in the dataset, and provide more precise targeted marketing to both previously observed and unobserved customers.

  1. Anonymous Search Histories Featuring Personalized Advertisement - Balancing Privacy with Economic Interests

    Directory of Open Access Journals (Sweden)

    Thorben Burghardt

    2011-04-01

    Full Text Available Search engines are key to finding information on the web. Search presently is free for users financed by targeted advertisement. Today, the current search terms determine the ad placement. In the near future, search-engine providers will make use of detailed user profiles for better ad placement. This puts user privacy at risk. Anonymizing search histories, which is a solution in principle, gives way to a trade-off between privacy and the usability of the data for ad placement. This paper studies this tradeoff systematically. To this end, we implement an algorithm for the anonymization of search histories which is flexible regarding the target function. It can retain frequent terms or terms where corresponding ads are clicked with a high probability, keep up the number of users it can derive interests for, etc. We quantify the usefulness of the anonymized log for ad placement in a broad way, e.g., by estimating the number of ad clicks or of ad impressions, based on marketing data from Yahoo! As a result, anonymized search logs are still useful for ad placement, but this very much depends on the target function.

  2. Personal Construct Theory and the Transformation of Identity in Alcoholics Anonymous

    Science.gov (United States)

    Young, Lance Brendan

    2011-01-01

    The dominant theoretical approach to alcoholism research presumes linear, causal relationships between individual cognitions and behavioral outcomes. This approach has largely failed to account for the recovery some alcoholics achieve in Alcoholics Anonymous (AA) because AA emphasizes the transformation of identity, framed in terms of…

  3. HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

    Directory of Open Access Journals (Sweden)

    Campos Javier

    2011-01-01

    Full Text Available Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, we propose and implement HOP, a novel solution based on cryptographic Host Identity Protocol (HIP that offers security and user-level anonymity in MANET environments while maintaining good performance levels. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT relationship anonymity, along with source/destination HIT anonymity when combined with multihoming. Afterward we detail how we integrate our improved version of HIP with the OLSR routing protocol to achieve efficient support for pseudonyms. We implemented our proposal in an experimental testbed, and the results obtained show that performance levels achieved are quite good, and that the integration with OLSR is achieved with a low overhead.

  4. Modernist Ruins, Filmic Archaeologies. Jane and Louise Wilson’s 'A Free and Anonymous Monument'

    Directory of Open Access Journals (Sweden)

    Giuliana Bruno

    2015-02-01

    Full Text Available Translation of the text originally published in Bruno, Giuliana. 2007. “Modernist Ruins, Filmic Archaeologies. Jane and Louise Wilson’s A Free and Anonymous Monument.” In Public Intimacy: Architecture and the Visual Arts, 43-86. Cambridge: MIT Press.

  5. Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones

    Science.gov (United States)

    Gow, Gordon A.; Parisi, Jennifer

    2008-01-01

    In recent years there has been concern among law enforcement and national security organizations about the use of "anonymous" prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates…

  6. Maintaining the anonymity of cadavers in medical education: Historic relic or educational and ethical necessity?

    Science.gov (United States)

    Jones, D Gareth; King, Mike R

    2017-01-01

    Throughout the modern history of anatomical dissection by medical and other health science students, cadavers have been anonymized. This has meant that students have been provided with limited, if any, information on the identities or medical histories of those they are dissecting. While there was little way around this when the bodies were unclaimed, this need not be the case when the bodies have been donated. However, with a few exceptions, no efforts have been made to change this model. Recent attempts to move anatomy teaching in a more humanistic direction, by emphasizing the cadaver as the students' first patient and with the growth of commemoration services following the dissecting process, raise the question of whether cadavers should continue to be anonymized. In laying a basis for discussion of this matter, we outline what appear to be the virtues of anonymity, and the form that alternatives to anonymity might take. The options identified are nonidentification, low information; nonidentification, moderate information; and identification, full information. The virtues and drawbacks of each of these possibilities are assessed by analyzing their value for students, and also for donors and their families. Policy issues raised by alternatives are also considered. This article provides a basis for continued discussion and suggestions for further research in this area. Anat Sci Educ 10: 87-97. © 2016 American Association of Anatomists.

  7. Unison as a Self-Stabilizing Wave Stream Algorithm in Asynchronous Anonymous Networks

    CERN Document Server

    Boulinier, Christian

    2007-01-01

    How to pass from local to global scales in anonymous networks? How to organize a selfstabilizing propagation of information with feedback. From the Angluin impossibility results, we cannot elect a leader in a general anonymous network. Thus, it is impossible to build a rooted spanning tree. Many problems can only be solved by probabilistic methods. In this paper we show how to use Unison to design a self-stabilizing barrier synchronization in an anonymous network. We show that the commuication structure of this barrier synchronization designs a self-stabilizing wave-stream, or pipelining wave, in anonymous networks. We introduce two variants of Wave: the strong waves and the wavelets. A strong wave can be used to solve the idempotent r-operator parametrized computation problem. A wavelet deals with k-distance computation. We show how to use Unison to design a self-stabilizing wave stream, a self-stabilizing strong wave stream and a self-stabilizing wavelet stream.

  8. Health Promotion & Counselling in Context of Mixedness

    DEFF Research Database (Denmark)

    Singla, Rashmi

    My presentation covers some psychosocial aspects and counselling perspectives among intermarried couples in Denmark. It is primarily based on a research project about intermarried couples, where one of the partners is from South Asia and the other a native Dane, constituting “visibly ethnically d....../exclusion processes in the society should be taken in consideration for health promotion, and counselling of the intermarried couples. Key words: Ethnic intermarriages, increased risks, opportunities, good practices, health promotion, integrative counselling...

  9. General Counsel`s office FY 1995 site support program plan WBS 6.10.5

    Energy Technology Data Exchange (ETDEWEB)

    Moreno, S.R.

    1994-09-01

    The General Counsel`s office provides legal counsel to all levels of WHC management; administers the intellectual property program; coordinates all WHC investigative activity and supports WHC activities to ensure compliance with all applicable federal, state, and local laws, DOE directives, contractual provisions, and other requirements. In so doing, the Office of General Counsel supports the Hanford site mission of transforming the Hanford site into an environmentally attractive and economically sustainable community. This document briefs the FY95 site support plan.

  10. Emergence of Informal Educative Space out of an Anonymous Online Bulletin Board in Korea during the Global Economic Crisis

    Science.gov (United States)

    Kang, Dae Joong; Choi, Seon Joo; Lee, SeungHyeop

    2013-01-01

    This study aimed to understand how people learn and teach informally in an anonymous online bulletin board, the primary purpose of which is not learning and teaching. We conducted a qualitative analysis of comments and replies tagged to the most popular postings of an anonymous online bulletin board, during the global economic crisis in 2008-2009.…

  11. Performance Assessment of Counseling Skills Based on Specific Theories: Acquisition, Retention and Transfer to Actual Counseling Sessions

    Science.gov (United States)

    Schaefle, Scott; Smaby, Marlowe H.; Packman, Jill; Maddux, Cleborne D.

    2007-01-01

    The purposes of the present study were to determine if (a) students trained to demonstrate specific skills learn these skills and transfer them to actual counseling sessions; (b) mastery of counseling skills differs by students' adherence to one of four general counseling theories; (c) mastery of counseling skills is related to counseling goal…

  12. Developments in infertility counselling and its accreditation.

    Science.gov (United States)

    Monach, Jim

    2013-03-01

    Infertility counselling was placed in a unique position by the passage of the Human Fertilisation and Embryology Act 1990 and the requirement that couples being treated should be offered counselling. However professional counselling was, and largely still is, at a stage at which there was no universal agreement on the knowledge, standards or qualifications required for practice. Nevertheless, infertility counselling became the first example of counselling to be required by statute, beyond the more generalised requirement in adoption birth records access. Counselling is intended to describe skilled talking therapy offered by a professional with specific training and qualifications directed to helping individuals and couples to achieve goals they own themselves. The therapeutic intervention of counselling is primarily directed to helping clients in a stressful situation to deploy their own coping skills effectively and thus make the difficult choices inseparable from ART. Counselling outcome research consistently demonstrates the effectiveness of the sort of counselling delivered in assisted conception units with mild-moderate anxiety and depression delivered by skilled and experienced practitioners. This article reviews the role of counsellors as members of the assisted conception clinical team and the status of regulation and accreditation in this very new profession.

  13. Race/ethnic differences in HIV prevalence and risks among adolescent and young adult men who have sex with men.

    Science.gov (United States)

    Celentano, David D; Sifakis, Frangiscos; Hylton, John; Torian, Lucia V; Guillin, Vincent; Koblin, Beryl A

    2005-12-01

    The prevalence of HIV infection is disproportionately higher in both racial/ethnic minority men who have sex with men (MSM) and in men under the age of 25, where the leading exposure category is homosexual contact. Less is known, however, about patterns of HIV prevalence in young racial/ethnic minority MSM. We analyzed data from the Young Men's Survey (YMS), an anonymous, cross-sectional survey of 351 MSM in Baltimore and 529 MSM in New York City, aged 15-22, to determine whether race/ethnicity differences exist in the prevalence of HIV infection and associated risk factors. Potential participants were selected systematically at MSM-identified public venues. Venues and associated time periods for subject selection were selected randomly on a monthly basis. Eligible and willing subjects provided informed consent and underwent an interview, HIV pretest counseling, and a blood draw for HIV antibody testing. In multivariate analysis, adjusted for city of recruitment and age, HIV seroprevalence was highest for African Americans [adjusted odds ratio (AOR) = 12.5], intermediate for those of "other/mixed" race/ethnicity (AOR = 8.6), and moderately elevated for Hispanics (AOR = 4.6) as compared to whites. Stratified analysis showed different risk factors for HIV prevalence in each ethnic group: for African Americans, these were history of sexually transmitted diseases (STDs) and not being in school; for Hispanics, risk factors were being aged 20-22, greater number of male partners and use of recreational drugs; and for those of "other/mixed" race/ethnicity, risk factors included injection drug use and (marginally) STDs. These findings suggest the need for HIV prevention and testing programs which target young racial/ethnic minority MSM and highlight identified risk factors and behaviors.

  14. Counseling through Images: Using Photography to Guide the Counseling Process and Achieve Treatment Goals

    Science.gov (United States)

    Ginicola, Misty M.; Smith, Cheri; Trzaska, Jessica

    2012-01-01

    Creative approaches to counseling help counselors to meet the needs of diverse populations. The utility of photography in counseling has been demonstrated through several case studies; however, clear implications of how photography relates to the counseling process have not been well delineated. The existing literature on phototherapy is reviewed…

  15. Career Counselling Development: A Case Study of an Innovative Career Counselling Tool

    Science.gov (United States)

    Papakota, Aikaterini

    2016-01-01

    Promoting the use of new technologies in the career counselling process, the Career Services Office of the Aristotle University of Thessaloniki has developed an easy-to-use career counselling guide containing multimedia applications. The purpose of this career guide, called "Career Counseling@Career Office of Aristotle University of…

  16. Counseling Skills Attainment, Retention, and Transfer as Measured by the Skilled Counseling Scale

    Science.gov (United States)

    Schaefle, Scott; Smaby, Marlowe H.; Maddux, Cleborne D.; Cates, Jennifer

    2005-01-01

    The purpose of this study was to determine if counseling students acquire counseling skills and transfer those skills to their work with actual clients. Students' skills were measured by the Skilled Counseling Scale at pretest (before training), Posttest 1 (immediately after training), and Posttest 2 (at the end of a master's-degree program).…

  17. Race and Ethnicity in Empirical Counseling and Counseling Psychology Research: A 10-Year Review

    Science.gov (United States)

    Delgado-Romero, Edward A.; Galvan, Nallely; Maschino, Peggy; Rowland, Marcy

    2005-01-01

    This article examined 796 empirical studies published in the "Journal of Counseling Psychology," the "Journal of Counseling and Development," and "The Counseling Psychologist" from 1990 to 1999 and found that only 457 (57%) reported racial and ethnic characteristics of research participants. From this data, an overall picture was generated of the…

  18. Integrating Motivational Interviewing into a Basic Counseling Skills Course to Enhance Counseling Self-Efficacy

    Science.gov (United States)

    Iarussi, Melanie H.; Tyler, Jessica M.; Littlebear, Sarah; Hinkle, Michelle S.

    2013-01-01

    Motivational interviewing (MI), a humanistic counseling style used to help activate clients' motivation to change, was integrated into a basic counseling skills course. Nineteen graduate-level counseling students completed the Counselor Estimate of Self-Efficacy at the start and conclusion of the course. Significant differences were found between…

  19. 36 CFR 1211.425 - Counseling and use of appraisal and counseling materials.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Counseling and use of appraisal and counseling materials. 1211.425 Section 1211.425 Parks, Forests, and Public Property NATIONAL... Education Programs or Activities Prohibited § 1211.425 Counseling and use of appraisal and...

  20. Counseling Skills Pre-Practicum Training at Guidance and Counseling Undergraduate Programs: A Qualitative Investigation

    Science.gov (United States)

    Aladag, Mine

    2013-01-01

    This study was aimed to describe counseling skills pre-practicum training at guidance and counseling undergraduate programs in Turkey. A descriptive study was conducted based upon qualitative data. The research group of this study consisted of 11 guidance and counseling undergraduate programs voluntarily participate into study. The Survey Form…

  1. Trainees versus Staff: Exploring Counseling Outcomes in a College Counseling Center

    Science.gov (United States)

    Ilagan, Guy; Vinson, Mike; Sharp, Julia L.; Havice, Pamela; Ilagan, Jill

    2014-01-01

    Investigators compared counseling outcomes among nonpaid graduate-level trainees and professional staff at a college counseling center. Counseling outcomes for 331 college student participants were measured using the Outcome Questionnaire 45.2 (OQ45.2), employing a pretest--posttest design. The two groups of service providers did not differ…

  2. Knowledge of folic acid and counseling practices among Ohio community pharmacists

    Directory of Open Access Journals (Sweden)

    Rodrigues CR

    2012-09-01

    Full Text Available Objective: To determine knowledge of folic acid use for neural tube defect (NTD prevention and counseling practices among community pharmacists registered in Ohio.Methods: A cross-sectional study was performed on a random sample (n=500 of community pharmacists registered with the Ohio Board of Pharmacy and practicing in Ohio. A survey previously used by researchers to assess folic acid knowledge and practices among samples of other healthcare provider groups in the United States was adapted with permission for this study. The final tool consisted of 28 questions evaluating the knowledge, counseling practices, and demographics of respondents. The cover letter did not reveal the emphasis on folic acid, and surveys were completed anonymously. The university institutional review board deemed the study exempt.Results: Of the 122 pharmacists who completed the survey, 116 (95.1% knew that folic acid prevents some birth defects. Twenty-eight (22.9% responded that they “always” or “usually” discuss multivitamins with women of childbearing potential, and 19 (15.6% responded that they “always” or “usually” discuss folic acid supplements. Some gaps in knowledge specific to folic acid were revealed. While 63.1% of pharmacists selected the recommended dose of folic acid intake for most women of childbearing potential, 13.1% could identify the dose recommended for women who have had a previous NTD-affected pregnancy. Respondents identified continuing education programs, pharmacy journals/magazines, and the Internet as preferred avenues to obtain additional information about folic acid and NTD.Conclusion: This study represents the first systematic evaluation of folic acid knowledge and counseling practices among a sample of pharmacists in the United States. As highly accessible healthcare professionals, community pharmacists can fulfill a vital public health role by counseling women of childbearing potential about folic acid intake. Educational

  3. Genomics of sex determination.

    Science.gov (United States)

    Zhang, Jisen; Boualem, Adnane; Bendahmane, Abdelhafid; Ming, Ray

    2014-04-01

    Sex determination is a major switch in the evolutionary history of angiosperm, resulting 11% monoecious and dioecious species. The genomic sequences of papaya sex chromosomes unveiled the molecular basis of recombination suppression in the sex determination region, and candidate genes for sex determination. Identification and analyses of sex determination genes in cucurbits and maize demonstrated conservation of sex determination mechanism in one lineage and divergence between the two systems. Epigenetic control and hormonal influence of sex determination were elucidated in both plants and animals. Intensive investigation of potential sex determination genes in model species will improve our understanding of sex determination gene network. Such network will in turn accelerate the identification of sex determination genes in dioecious species with sex chromosomes, which are burdensome due to no recombination in sex determining regions. The sex determination genes in dioecious species are crucial for understanding the origin of dioecy and sex chromosomes, particularly in their early stage of evolution.

  4. Sexually transmitted infection screening and reproductive health counseling in adolescent renal transplant recipients: Perceptions and practice patterns. A study from the Midwest Pediatric Nephrology Consortium.

    Science.gov (United States)

    Ashoor, Isa F; Dharnidharka, Vikas R

    2015-11-01

    We wanted to identify practice patterns and perceived barriers among pediatric nephrologists regarding STI screening and reproductive health counseling in adolescent renal transplant recipients. We created an online Likert-scaled survey. Response rate was 54%. The majority (83%) believed STI risk in their patients was similar to or higher than healthy teens. Interestingly, while 67% felt moderately or very confident in asking about sexual activity and counseling about safer sex, only 43% routinely or always inquired about sexual activity, and only 42% routinely or always counseled about safer sex. Fifty-four percent routinely or always discussed contraceptive options and implications of unintentional pregnancy. Fifty-one percent routinely or always referred patients to a gynecologist or adolescent provider for contraception prescription. The most common counseling mechanism was informal discussions in clinic (87%). Ten percent had no mechanism in place. Major barriers included time limitations, adolescents' fear regarding confidentiality, and lack of professional training. This is the first report of perceptions and practice patterns of pediatric nephrologists regarding STI screening and reproductive health counseling. Providers seem to recognize the importance of counseling; however, translation into practice remains low. Professional training in this area and increased encounter time could improve counseling delivery and thereby reduce risk in this population.

  5. Switzerland's videotex computer sex education programme.

    Science.gov (United States)

    Barbey, M A

    1991-05-01

    Switzerland's videotex computer sex education program in French is a telematic service set up in youth centers, schools and post offices, or for a monthly home rental charge of 9 swiss francs. German and Italian versions will be available by the end of 1991. CIAO receives 100 calls a month, or 20,000 screen page consultations. Anonymity is assured for caller and specialist through identification by pseudonym. This article discusses the experience of 2 trained specialists, a social worker and a sex education teacher, who answer questions. 70% of callers are boys, perhaps due to greater familiarity with computers, and to public location and freer attitude talking about sex in a group. Girls may use family planning centers for their questions. The typical boys 13-15 years questions concern anatomy and the size of the penis, breast stimulation, masturbation. Guilt and fear of consequences are communicated. Adolescents tend to focus on relationships, with shyness a typical pattern. There is expressed concern for whether it's OK to sexually explore certain sex zones, and what tells me she's happy. Communication between partners about sex is the difficulty and specialists emphasize asking the girl herself how she feels. With increasing age, the focus is very specific; i.e., premature ejaculation, STD's, homosexuality, but also with concern for knowledge about normal love-making and worry about not wanting it enough. In general, questions tend to be bound by traditional roles and questions on contraception are rare. Condom questions are usually related to AIDs. Questions express self-doubt and honesty, which sometimes focuses on the tragedy of sexual abuse, rape, AIDS, and suicide. Specialists find the work rewarding and helpful in sex education discussions in the classroom; great respect for young people is generated.

  6. SEX EDUCATION

    Directory of Open Access Journals (Sweden)

    R N Srivastava

    1994-06-01

    Full Text Available Sex, though not everything in life, is a profoundly important aspect of human existence. It has evolved to serve more than reproductive functions; relational and recreational functions having taken precedence over procrea­tional. Sex has come to play a much wider socio-psychological function.Human sexuality is complex and multidimensional. It is subject to influence by multitude of factors often grouped as biological (e.g. genes, hormones, psychological (e.g. fear, anxiety, mood and socio-cultural (e.g. sex roles, values- religious/moral/ethical, customs. It is the interaction and interrelationship of these factors from the time of conception, through intrauterine life, infancy, childhood and adolescence, till adulthood (even later in life that determine the sexual development expressed as sexual attitudes and behaviour of the people. Learning, both social and cognitive, plays a significantly important role in such development.Sexual dysfunctions in men and women, result from factors often categorised as physical or organic and psychological; more often a combination may be involved. Experience has shown that in majority of men and women in India having sexual problems, ignorance misconceptions and prevailing myths are invariably responsible in the causation of Ihese problems. Sexual problems in individual man (e.g. erectile failure and woman (e.g. vaginismus cause anxiety, feelings of frustration, lowered self esteem and symptoms of depression. The condition may also affect the spouse; he/she, as a reaction to the problem in the partner, may develop sexual and psychosocial problems including distressed marital relationship. This may also have influence on general couple relationship, effecting adversely the quality of family life.Modern therapeutic endevours have made it possible now to offer effective therapy to most people who seek help for their sexual problems, thus preventing the consequences on couple relationship. However, there is also

  7. Sex Bias in Children.

    Science.gov (United States)

    Zalk, Sue Rosenberg; And Others

    This study investigated children's sex biased attitudes as a function of the sex, age, and race of the child as well as a geographical-SES factor. Two attitudes were measured on a 55-item questionnaire: Sex Pride (attributing positive characteristics to a child of the same sex) and Sex Prejudice (attributing negative characteristics to a child of…

  8. Futurism Plus Counseling Equals Life Planning.

    Science.gov (United States)

    John, Gary G.

    1979-01-01

    The principles of futurism have already affected the counseling profession. Their use in the student services sector indicates not only a new orientation, but a distinct new-model for the twenty-first century. It reveals that the counseling profession is becoming devoted to human potential, not human development. (Author)

  9. Counseling in Brazil: Past, Present, and Future

    Science.gov (United States)

    Hutz-Midgett, Aida; Hutz, Claudio Simon

    2012-01-01

    This article describes counseling in Brazil, which is rooted in career and vocational guidance. Although considered a distinct discipline, counseling falls under the umbrella of psychology. The multicultural movement is gaining momentum in Brazil, and counselors are pioneers working with socioracial minority college students. This is an emerging…

  10. Education and counseling children about physical health.

    NARCIS (Netherlands)

    Theunissen, N.C.M.; Tates, K.; Visser, A.

    2004-01-01

    The amount and variety of research in patient education and counseling has increased substantially during the last decades. However, studies that aimed at children are still relatively scarce. In this special issue, are view is presented of recent studies on educating and counseling children about t

  11. Qualitative Research in Counseling Psychology: Conceptual Foundations

    Science.gov (United States)

    Morrow, Susan L.

    2007-01-01

    Beginning with calls for methodological diversity in counseling psychology, this article addresses the history and current state of qualitative research in counseling psychology. It identifies the historical and disciplinary origins as well as basic assumptions and underpinnings of qualitative research in general, as well as within counseling…

  12. Structural Equation Modeling in Rehabilitation Counseling Research

    Science.gov (United States)

    Chan, Fong; Lee, Gloria K.; Lee, Eun-Jeong; Kubota, Coleen; Allen, Chase A.

    2007-01-01

    Structural equation modeling (SEM) has become increasingly popular in counseling, psychology, and rehabilitation research. The purpose of this article is to provide an overview of the basic concepts and applications of SEM in rehabilitation counseling research using the AMOS statistical software program.

  13. Theory and Practice of Peer Counselling.

    Science.gov (United States)

    Carr, Rey A.

    1984-01-01

    The rationale, origins, and practice of peer counseling, a system of training people to help each other through empathy and decision making, are detailed. Specific applications are described, with particular attention to involving adolescents as peer counselors. Peer counselor training as practiced by the Peer Counselling Project (University of…

  14. Personal Epistemology and Preference for Counseling.

    Science.gov (United States)

    Lyddon, William J.

    1989-01-01

    Used a 3 x 3 mixed factorial design to study relation between a person's dominant way of knowing (rationalism, metaphorism, empiricism) and the preference for three counseling approaches (rationalist, constructivist, behavioral) with college students (N=92). Found participants significantly preferred counseling approach hypothesized to represent…

  15. Student Technology Competencies for School Counseling Programs.

    Science.gov (United States)

    Hines, Peggy LaTurno

    2002-01-01

    This article briefly reviews the growth of technology and the development of standards related to technology in counseling, Pre-K-12 education, educator preparation programs, and the field of school counseling. The development of pre-admission and program outcome technology skills at Indiana State University is discussed along with the specific…

  16. A Professional Employee Counseling Program: Credibility Issues.

    Science.gov (United States)

    Puder, Marilyn

    This paper concerns the increasing number of employee counseling programs and the critical issues underlying their credibility. The history and current services of an employee counseling program at Citibank are briefly reviewed. The critical issues for credibility include: (1) a program appropriate to the structure and needs of the organization;…

  17. Scholarship of Teaching in Rehabilitation Counseling Practicum

    Science.gov (United States)

    Kiener, Michael

    2007-01-01

    Understanding how students learn is a common goal for most educators; however pedagogical research in rehabilitation counselor education is limited. This study employed action research to investigate how six students learned beginning counseling skills in a rehabilitation counseling practicum class. Approximately 150 data points were analyzed by…

  18. Revisiting Basic Counseling Skills with Children

    Science.gov (United States)

    Van Velsor, Patricia

    2004-01-01

    Counseling with children can be challenging for counselors whose training focused on adult clients. The purpose of this article is to offer information to counselors seeking to improve their skills with children, revisiting a topic discussed in an earlier Journal of Counseling & Development article by P. Erdman and R. Lampe (1996). Examples of…

  19. A Counseling Psychology for the New Millennium

    Science.gov (United States)

    Watkins, C. Edward, Jr.

    2008-01-01

    In this article, the author offers some comparisons and contrasts about the 1985 and 2000/2003 counseling psychology survey data sets. The data, which show stability and flux, continuity and change, capture elements of counseling psychology's rich heritage, current tensions of growth, and possibilities of future.

  20. Integrating Internationalization in Counseling Psychology Training Programs

    Science.gov (United States)

    Turner-Essel, Laura; Waehler, Charles

    2009-01-01

    Previous scholars have made specific suggestions regarding what counseling psychology training programs can do to help future psychologists become more cross-culturally aware. This article addresses the questions of whether and how U.S. counseling psychology training programs are currently employing these suggestions. Forty-seven American…

  1. 33 CFR 1.07-40 - Counsel.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Counsel. 1.07-40 Section 1.07-40 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY GENERAL GENERAL PROVISIONS Enforcement; Civil and Criminal Penalty Proceedings § 1.07-40 Counsel. A party has the right to be...

  2. Counselling and Career Planning: Symposium V A.

    Science.gov (United States)

    Awang, Amir; And Others

    Focusing generally on counseling and career planning, this symposium provides (1) a review and critique of guidance and counseling in Malaysian schools, by Amir Awang and Latiff Mirasa; (2) a discussion of the needs of Malaysian youth, by Mohd. Yunus Mohd. Noor; and (3) an abstract of the findings of a study of some aspects of student development…

  3. Gestalt Therapy Interventions for Group Counseling

    Science.gov (United States)

    Passons, William R.

    1972-01-01

    The author offers a brief introduction to some of the basic tenets of Gestalt therapy, noting goals that are similar to those in counseling theories. He also suggests several interventions from Gestalt therapy to be considered for group counseling and discusses their applications. (Author)

  4. Counseling Style Preference of Chinese College Students.

    Science.gov (United States)

    Exum, Herbert A.; Lau, Ester Ying-wah

    1988-01-01

    Conducted study to determine preferences of Cantonese-speaking Chinese college students (N=50) from Hong Kong attending a large midwestern university for either a directive or nondirective counseling approach to emotional adjustment problems. Results showed that subjects strongly preferred a directive counseling approach and attributed low…

  5. Using Multilevel Modeling in Counseling Research

    Science.gov (United States)

    Lynch, Martin F.

    2012-01-01

    This conceptual and practical overview of multilevel modeling (MLM) for researchers in counseling and development provides guidelines on setting up SPSS to perform MLM and an example of how to present the findings. It also provides a discussion on how counseling and developmental researchers can use MLM to address their own research questions.…

  6. The Complete Guide to Outplacement Counseling.

    Science.gov (United States)

    Pickman, Alan J.

    This book, which can be of value both to professionals in the field and to persons receiving the services, presents an overview of the profession of outplacement counseling. It contains a wide variety of information, including both counseling theory and practical suggestions. The book also contains many brief case histories of actual outplacement…

  7. Formal and Applied Counseling in Israel

    Science.gov (United States)

    Israelashvili, Moshe; Wegman-Rozi, Orit

    2012-01-01

    Living in Israel is intensive and demanding but also meaningful and exciting. This article addresses the gap between the narrowly defined formal status of counseling in Israel and the widespread occurrence of counseling in various settings. It is argued that several recent changes, especially in the definition of treatment, along with the…

  8. Mindfulness-Based Interventions in Counseling

    Science.gov (United States)

    Brown, Amanda P.; Marquis, Andre; Guiffrida, Douglas A.

    2013-01-01

    Mindfulness is a relatively new construct in counseling that is rapidly gaining interest as it is applied to people struggling with a myriad of problems. Research has consistently demonstrated that counseling interventions using mindfulness improve well-being and reduce psychopathology. This article provides a detailed definition of mindfulness,…

  9. Venezuelan Counseling: Advancement and Current Challenges

    Science.gov (United States)

    Vera, George Davy

    2011-01-01

    In the worldwide community it is not well known that counseling and guidance professional practices have a long tradition in Venezuela. Therefore, this contribution's main purpose is to inform the international audience about past and contemporary counseling in Venezuela. Geographic, demographic, and cultural facts about Venezuela are provided.…

  10. Narrative Counseling for Professional School Counselors

    Science.gov (United States)

    Nafziger, Jacinta; DeKruyf, Lorraine

    2013-01-01

    This article introduces narrative counseling concepts and techniques for professional school counselors. The authors provide a case study of narrative school counseling with an elementary student struggling with selective mutism. Examples also demonstrate how a narrative approach could be used at elementary, middle, and high school levels within…

  11. Relative Influence of Professional Counseling Journals

    Science.gov (United States)

    Fernando, Delini M.; Barrio Minton, Casey A.

    2011-01-01

    The authors used social network analysis of citation data to study the flow of information and relative influence of 17 professional counseling journals. Although the "Journal of Counseling & Development" ranked very highly in all measures of journal influence, several division journals emerged as key players in the flow of information within the…

  12. 78 FR 64141 - 30-Day Notice of Proposed Information Collection: Certificate of Housing Counseling...

    Science.gov (United States)

    2013-10-25

    ... Collection: Certificate of Housing Counseling: Homeownership and Certificate of Housing Counseling: Home... Counseling: Homeownership and Certificate of Housing Counseling: Home Retention. OMB Approval Number: 2502... Information and Proposed Use: Counseling certificates will provide proof to lenders and other...

  13. Sex-linked dominant

    Science.gov (United States)

    Inheritance - sex-linked dominant; Genetics - sex-linked dominant; X-linked dominant; Y-linked dominant ... can be either an autosomal chromosome or a sex chromosome. It also depends on whether the trait ...

  14. Distributed anonymous data perturbation method for privacy-preserving data mining

    Institute of Scientific and Technical Information of China (English)

    Feng LI; Jin MA; Jian-hua LI

    2009-01-01

    Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment.

  15. Design on PKI-Based Anonymous Mobile Agent Security in E-Commerce

    Institute of Scientific and Technical Information of China (English)

    MENG Xiangsong; HAN Fengwu

    2006-01-01

    The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI(public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA(certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit.

  16. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  17. THE WIKILEAKS´S CASE AND ANONYMITY: EFFECTS ON THE INFORMATION FREEDOM

    Directory of Open Access Journals (Sweden)

    Marlus Heriberto Arns de Oliveira

    2015-10-01

    Full Text Available The Constitution of the Federative Republic of Brazil, enacted in 1988 during the democratization process of the country after the end of an authoritarian regime preceded by several others that show a non-democratic tradition in the Brazilian Republic, remained still remnants an authoritarian Patronizing and Paternalist state, the example of the final part of the Article 5, item IV, which claims to be the free expression of thought, but forbids anonymity, prohibition which deserves to be rethought, especially on the internet, where the navigation data of people deserve protection, as well as their rights to remain anonymous, a fact which entails the need for reflection on the scope and how best to interpret the constitutional provision cited, a debate that, in the proposed article will deal think the ideas of paternalism, authoritarianism and freedom, whose focus will be about within the Internet, social networks and the Knowledge Society.

  18. Anonymous-key quantum cryptography and unconditionally secure quantum bit commitment

    CERN Document Server

    Yuen, H P

    2000-01-01

    A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocol that does not require a shared secret key is provided as an illustration. The possibility is also indicated for obtaining unconditionally secure quantum bit commitment protocols with this technique.

  19. Lessons in Fluidity: Anonymous and the Communicative Formation of Organizational Identity

    OpenAIRE

    Schoeneborn, Dennis; Dobusch, Leonhard

    2013-01-01

    Most research on organizational identity tends to take an essentialist perspective, differentiating between an identity construed internally by members of the organization and an image construed by external actors. However, the duality of identity and image struggles with capturing more fluid, open, or partial organizational arrangements, where it is difficult to uphold this distinction. Looking at the case of the hacker collective Anonymous as an extreme example of organization, this paper p...

  20. Mutual support and recovery in the Russian Alcoholics Anonymous online community

    Directory of Open Access Journals (Sweden)

    Lyytikäinen Laura

    2016-04-01

    Full Text Available AIMS – In Russia the paradigm of alcoholism as a disease is still in contrast to the general perception of alcoholics as weak-willed. This article studies alcoholism and recovery in Russia through the case study of the Russian Alcoholics Anonymous online group. It studies how people who are seeking help for their drinking problems in this online community come to incorporate a new self-understanding of being ill with alcoholism.

  1. ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networks

    Science.gov (United States)

    Banerjee, Debasmit; Dong, Bo; Biswas, Subir

    2013-05-01

    Wireless sensor network used in military applications may be deployed in hostile environments, where privacy and security is of primary concern. This can lead to the formation of a trust-based sub-network among mutually-trusting nodes. However, designing a TDMA MAC protocol is very challenging in situations where such multiple sub-networks coexist, since TDMA protocols require node identity information for slot assignments. This paper introduces a novel distributed TDMA MAC protocol, ZEA-TDMA (Zero Exposure Anonymous TDMA), for anonymous wireless networks. ZEA-TDMA achieves slot allocation with strict anonymity constraints, i.e. without nodes having to exchange any identity revealing information. By using just the relative time of arrival of packets and a novel technique of wireless collision-detection and resolution for fixed packetsizes, ZEA-TDMA is able to achieve MAC slot-allocation which is described as follows. Initially, a newly joined node listens to its one-hop neighborhood channel usage and creates a slot allocation table based on its own relative time, and finally, selects a slot that is collision free within its one-hop neighborhood. The selected slot can however cause hidden collisions with a two-hop neighbor of the node. These collisions are resolved by a common neighbor of the colliding nodes, which first detects the collision, and then resolve them using an interrupt packet. ZEA-TDMA provides the following features: a) it is a TDMA protocol ideally suited for highly secure or strictly anonymous environments b) it can be used in heterogeneous environments where devices use different packet structures c) it does not require network time-synchronization, and d) it is insensitive to channel errors. We have implemented ZEA-TDMA on the MICA2 hardware platform running TinyOS and evaluated the protocol functionality and performance on a MICA2 test-bed.

  2. Local and global recoding methods for anonymizing set-valued data

    KAUST Repository

    Terrovitis, Manolis

    2010-06-10

    In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to his identity, the publication of such data is still subject to privacy attacks from adversaries who have partial knowledge about the set. Unlike most previous works, we do not distinguish data as sensitive and non-sensitive, but we consider them both as potential quasi-identifiers and potential sensitive data, depending on the knowledge of the adversary. We define a new version of the k-anonymity guarantee, the k m-anonymity, to limit the effects of the data dimensionality, and we propose efficient algorithms to transform the database. Our anonymization model relies on generalization instead of suppression, which is the most common practice in related works on such data. We develop an algorithm that finds the optimal solution, however, at a high cost that makes it inapplicable for large, realistic problems. Then, we propose a greedy heuristic, which performs generalizations in an Apriori, level-wise fashion. The heuristic scales much better and in most of the cases finds a solution close to the optimal. Finally, we investigate the application of techniques that partition the database and perform anonymization locally, aiming at the reduction of the memory consumption and further scalability. A thorough experimental evaluation with real datasets shows that a vertical partitioning approach achieves excellent results in practice. © 2010 Springer-Verlag.

  3. A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial

    Institute of Scientific and Technical Information of China (English)

    CAO Feng; CAO Zhenfu

    2006-01-01

    In this paper, we use the polynomial function and Chaum's RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not need to be revealed in the tallying phase. The ballot number of each candidate gets is counted by computing the degrees of two polynomials' greatest common divisor. Our scheme does not require a special voting channel and communication can occur entirely over the current internet.

  4. Effect Of Diet Counseling On Type 2 Diabetes Mellitus

    Directory of Open Access Journals (Sweden)

    Kusumaneela Bolla

    2015-08-01

    Full Text Available Abstract Diabetes is a metabolic disorder. Metabolism is the way the uses digested food for growth amp energy. Importance of diet in diabetes can be treated back to the days of the ancient ayurvedic physician Sushreeta. Type of diabetes age of the patient body weight severity of the hyperglycemia associated complications and mode of treatment being followed determine the exact allowance and type of diet. This needs to be worked out for each individual diabetic. Dietary management is the corn stone of diabetes treatment and should receive the almost consideration by the patient and by the treating physician. Objective To assess The Nutritional Status and To Study the Effect Of Diet Counseling on Type II Diabetic Patients. Methodology For this study from diabetic hospital in Vijayawada were selected. In this study 40 samples age 30 to 60 years. They belong to age between 30 to 60 years. Preparation of Questionnaire to collect the General information age sex past history of subjects Anthropometric data Biochemical information Dietary information. Conclusion There is significant changes in the blood sugar levels after the diet counseling. Intake of the high amounts of the fiber low glycemic foods and functional foods helps to reduce the blood sugar levels randomly.

  5. Sexual Orientation, Drug Use Preference during Sex, and HIV Risk Practices and Preferences among Men Who Specifically Seek Unprotected Sex Partners via the Internet

    Directory of Open Access Journals (Sweden)

    Hugh Klein

    2009-05-01

    Full Text Available The present study entailed conducting a content analysis of 1,434 ads/profiles posted on one of the most popular “Men who have Sex with Men” (MSM websites that specifically fosters unprotected sex. Ads/profiles were selected randomly based on the American ZIP code of residence (n = 1,316, with a randomly-drawn oversampling of profiles of men who self-identified as heterosexual or ���curious” rather than gay or bisexual (n = 118. Data were collected between September 2006 and September 2007. The purpose of the present paper is to examine the conjoint effects of self-identified sexual orientation and preference for having/not having sex while high, on men’s sought-after sexual risk. Analytical comparisons of the four groups showed that, on most measures, the combination of sexual orientation and drug use preference during sex differentiated the men. Generally speaking, gay/bisexual men who advertised online for partners with whom they could have sex while high expressed the greatest interest in risky sexual behaviors (e.g., felching, unprotected oral sex, unprotected anal sex and various risk-related preferences (e.g., multiple partner sex, anonymous sex, eroticizing ejaculatory fluids. This is especially true when they are compared to their heterosexual/“curious” counterparts whose online profiles were not as likely to indicate a desire for having sex while high.

  6. On Enhancing Data Utility in K-Anonymization for Data without Hierarchical Taxonomies

    Directory of Open Access Journals (Sweden)

    Mohammad Rasool Sarrafi Aghdam

    2015-05-01

    Full Text Available K-anonymity is the model that is widely used to protect the privacy of individuals in publishing micro-data. It could be defined as clustering with constrain of minimum k tuples in each group. K-anonymity cuts down the linking confidence between sensitive information and specific individual by the ration of 1/k. However, the accuracy of the data in k-anonymous dataset decreases due to information loss. Moreover, most of the current approaches are for numerical attributes or in case of categorical attributes they require extra information such as attribute hierarchical taxonomies which often do not exist. In this paper we propose a new model, based on clustering, defining the distance between tuples including numerical and categorical attributes which does not require extra information and present the SpatialDistance (SD heuristic algorithm. Comparisons of experimental results on real datasets between SD algorithm and existing well-known algorithms show that SD performs the best and offers much higher data utility and reduces the information loss significantly.

  7. Fortified anonymous communication protocol for location privacy in WSN: a modular approach.

    Science.gov (United States)

    Abuzneid, Abdel-Shakour; Sobh, Tarek; Faezipour, Miad; Mahmood, Ausif; James, John

    2015-03-10

    Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN.

  8. Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

    Directory of Open Access Journals (Sweden)

    Abdel-Shakour Abuzneid

    2015-03-01

    Full Text Available Wireless sensor network (WSN consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc. and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC protocol for WSN.

  9. Apriori-based algorithms for k m-anonymizing trajectory data

    Directory of Open Access Journals (Sweden)

    Giorgos Poulis

    2014-08-01

    Full Text Available The proliferation of GPS-enabled devices (e.g., smartphones and tablets and locationbased social networks has resulted in the abundance of trajectory data. The publication of such data opens up new directions in analyzing, studying and understanding human behavior. However, it should be performed in a privacy-preserving way, because the identities of individuals, whose movement is recorded in trajectories, can be disclosed even after removing identifying information. Existing trajectory data anonymization approaches offer privacy but at a high data utility cost, since they either do not produce truthful data (an important requirement of several applications, or are limited in their privacy specification component. In this work, we propose a novel approach that overcomes these shortcomings by adapting km-anonymity to trajectory data. To realize our approach, we develop three efficient and effective anonymization algorithms that are based on the apriori principle. These algorithms aim at preserving different data characteristics, including location distance and semantic similarity, as well as user-specified utility requirements, which must be satisfied to ensure that the released data can be meaningfully analyzed. Our extensive experiments using synthetic and real datasets verify that the proposed algorithms are efficient and effective at preserving data utility.

  10. There is no ``I'' in referee: Why referees should be anonymous

    Science.gov (United States)

    Ucko, Daniel

    2015-03-01

    From the early days of modern science, it has been recognized that scientific claims must be verified by someone who is not the maker of those claims, and who furthermore has no stake in the matter. In other words, claims need to be evaluated objectively, by the community. The way in which this tends to be done is by peer review conducted by journals. Peer review as currently practiced touches on the themes of trust, where the trust is in institutions and procedures that emerge from expert communities. The practice of peer review is viewed as a citizenly duty of scientists in the scientific community, because all scientists take turns serving either as authors, referees, and editors in the peer review process We lack the resources to have a work evaluated by the entire community, so we substitute with a representative. Yet, in most examples of scientific review, the referee or referees are anonymous. This question is particularly important when the peer review process is brought to bear in order to evaluate matters beyond scientific validity, more ``subjective'' criteria such as relative importance, broadness of interest - criteria that do not appear to have an objective standard of comparison and validation. I will show that the anonymity of referees, far from endangering this trust, actually strengthens it. I will show that this anonymity is crucial in order to maintain any objectivity in scientific peer review, and why authors should not try to unmask the referee. Also at American Physical Society (APS).

  11. [Intersex and differences of sex development: background, diagnostics, and concepts of care].

    Science.gov (United States)

    Holterhus, P-M

    2013-12-01

    Intersex is an inherited incongruence of chromosomal, gonadal, and genital sexual characteristics. A typical clinical situation of intersex is the ambiguous genitalia in the newborn. Diagnostics, counseling, and therapy should be offered by specialized multidisciplinary health-care teams. The focus is not only on medical issues but also on psychological, social, and ethical aspects. In the international literature, intersex is now termed "disorders of sex development" (DSD). Alternatively, some authors use "differences of sex development" to underline that patients do not necessarily feel they have a "disorder" but rather a "difference" of sex development compared with normal sex development.

  12. Alcoholics Anonymous

    Science.gov (United States)

    ... Cyprus Czech Republic Denmark Dominican Republic Ecuador Egypt El Salvador Estonia Faroe Islands Finland France French Polynesia ... Home Site Help Site Map Contact Us Website Feedback AAGRAPEVINE.ORG Terms of use Copyright © 2017 by ...

  13. Sexual counseling and cardiovascular disease: practical approaches

    Directory of Open Access Journals (Sweden)

    Elaine E Steinke

    2015-02-01

    Full Text Available Patients with cardiovascular disease and their partners expect health care providers to provide sexual counseling to assist them in maintaining sexual quality of life. Evidence suggests however, that there is a gap in integrating evidence into practice and that relatively few cardiac patients receive sexual counseling. This can result in negative psychological, physical, and quality of life outcomes for couples who may needlessly decide sexual activity is too risky and cease all sexual activity. Two scientific statements now exist that provide ample guidance to health care providers in discussing this important topic. Using a team approach that includes physicians, nurses, physical therapists, rehabilitation staff, and others is important to ensure that sexual counseling occurs throughout recovery. In addition, several trials using interventional approaches for sexual counseling provide insight into successful approaches for sexual counseling in practice. This article provides practical strategies and evidence-based approaches for assessment and sexual counseling for all cardiac patients and their partners, and specific counseling for those with ischemic conditions, heart failure, and implanted devices.

  14. The Treatment Advocacy Program: A Randomized Controlled Trial of a Peer-Led Safer Sex Intervention for HIV-Infected Men Who Have Sex with Men

    Science.gov (United States)

    McKirnan, David J.; Tolou-Shams, Marina; Courtenay-Quirk, Cari

    2010-01-01

    Objective: Primary care may be an effective venue for delivering behavioral interventions for sexual safety among HIV-positive men who have sex with men (MSM); however, few studies show efficacy for such an approach. We tested the efficacy of the Treatment Advocacy Program (TAP), a 4-session, primary-care-based, individual counseling intervention…

  15. Attitudes of Family Planning Workers toward Setting Up Special Counseling Stations for Unmarried Young Adults

    Institute of Scientific and Technical Information of China (English)

    涂晓雯; 刘英惠; 楼超华; 高尔生

    2001-01-01

    Objective To understand attitudes of family planning workers to setting up special counseling stations for unmarried young adults and to identify the acceptable and feasible ways to provide the services for unmarried young adults in eight provinces/cities in ChinaMethods From May 1998to December 1998, 1 927family planning workers including 965 contraceptive providers and 962 contraceptive distributors were recruited for questionnaire survey in eight provinces/cities in China.Results Except the subjects from Hebei Province, over 70% of all the subjects from other provinces/cities thought it was necessary to have a special counseling station set up for unmarried young adults, while 10~ 20% of them opposed to it. Result of Multivariable Logistic regression analysis showed that where the subjects came from, were contraceptive distributors, have higher education level, younger than 50, expressed tolerance for premarital sex, perceived that unmarried young adults had no or inadequate knowledge about sexuality and considered it was difficult for unmarried young adults to obtain contraceptive methods, were more likely to support the establishment of special counseling stations for unmarried youth. The acceptable and feasible ways to provide contraceptive services varied from one province/city to another. Generally,family planning counseling stations and hospital were the most acceptable place to provide counseling services for unmarried young adults in eight provinces/cities. Specially trained persons were recommended as the suitable persons for providing the services for unmarried young adults. Conclusion It is acceptable and feasible to set up special counseling stations for unmarried young adults.

  16. The Clinical and Client-Centered Approach to Counseling.

    Science.gov (United States)

    Rivas, Richard G.

    This review analyzes the clinical and client-centered approaches to counseling. Clinical counseling separated from vocational counseling in the third decade of this century. A split took place between guidance and discipline. The mental hygiene movement facilitated this split. In 1942 Carl Rogers made an impact on counseling theory with the…

  17. Implications for Counseling the Unemployed in a Recessionary Economy.

    Science.gov (United States)

    Shifron, Rachel; And Others

    1983-01-01

    Addresses the implications of recessionary unemployment for the field of counseling, including family counseling, group counseling, and career education. Counseling should focus on maintaining the person's physical and psychological wellness, and teaching coping behavior to prevent temporary unemployment from becoming permanent. (JAC)

  18. Counselling International Students in Turkish Universities: Current Status and Recommendations

    Science.gov (United States)

    Bektas, Dilek Yelda

    2008-01-01

    In the present study, the current status of international students and counselling services provided at Turkish universities is addressed. Firstly, a brief history of counselling and counselling services in Turkish universities is examined, leading to a consideration of the current status of international students and counselling services.…

  19. A Process for Working with Families across Counseling Specialties.

    Science.gov (United States)

    Kaplan, David M.

    This chapter discusses the development of an approach to counseling that allows counselors to incorporate family counseling into their individual counseling practices. The six-stage counseling process that is presented draws upon a broad-based behavior therapy/social learning theory approach. The stages of this process are identified as: establish…

  20. Counseling Exceptional Individuals and Their Families: A Systems Perspective

    Science.gov (United States)

    Thomas, Volker; Ray, Karen E.

    2006-01-01

    This article presents three models of counseling exceptional students from a systems perspective. The authors present their definition of counseling, the goals of counseling, and the counseling relationship from a systems perspective. Each model is described, including assessment and intervention techniques appropriate for working with children,…