WorldWideScience

Sample records for group anonymous papers

  1. Group Anonymity

    CERN Document Server

    Chertov, Oleg; 10.1007/978-3-642-14058-7_61

    2010-01-01

    In recent years the amount of digital data in the world has risen immensely. But, the more information exists, the greater is the possibility of its unwanted disclosure. Thus, the data privacy protection has become a pressing problem of the present time. The task of individual privacy-preserving is being thoroughly studied nowadays. At the same time, the problem of statistical disclosure control for collective (or group) data is still open. In this paper we propose an effective and relatively simple (wavelet-based) way to provide group anonymity in collective data. We also provide a real-life example to illustrate the method.

  2. Deniable Anonymous Group Authentication

    Science.gov (United States)

    2014-02-13

    electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24:84–88, February 1981. [16] D. Chaum. Blind signatures for...ASIACRYPT, 2004. [59] P. P. Tsang and V. K. Wei. Short linkable ring signatures for e- voting , e-cash and attestation. In ’05 ISPEC, 2005. [60] D. I...which we term anonymity, proportionality, forward anonymity, and deniability. Like ring signatures [50], DAGA allows a user to au- thenticate as an

  3. Scalable and Anonymous Group Communication with MTor

    National Research Council Canada - National Science Library

    Dong Lin; Micah Sherr; Boon Thau Loo

    2016-01-01

    This paper presents MTor, a low-latency anonymous group communication system. We construct MTor as an extension to Tor, allowing the construction of multi-source multicast trees on top of the existing Tor infrastructure...

  4. Scalable and Anonymous Group Communication with MTor

    Directory of Open Access Journals (Sweden)

    Lin Dong

    2016-04-01

    Full Text Available This paper presents MTor, a low-latency anonymous group communication system. We construct MTor as an extension to Tor, allowing the construction of multi-source multicast trees on top of the existing Tor infrastructure. MTor does not depend on an external service to broker the group communication, and avoids central points of failure and trust. MTor’s substantial bandwidth savings and graceful scalability enable new classes of anonymous applications that are currently too bandwidth-intensive to be viable through traditional unicast Tor communication-e.g., group file transfer, collaborative editing, streaming video, and real-time audio conferencing.

  5. Yahtzee: An Anonymized Group Level Matching Procedure

    CERN Document Server

    Jones, Jason J; Fariss, Christopher J; Settle, Jaime E; Kramer, Adam; Marlow, Cameron; Fowler, James H

    2011-01-01

    Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources in order to conduct their research. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects evermore important. However, strict privacy procedures can make joining diverse sources of data that contain information about specific individual behaviors difficult. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as expected theoretically when we apply it to data from Facebook and public voter records.

  6. Yahtzee: an anonymized group level matching procedure.

    Directory of Open Access Journals (Sweden)

    Jason J Jones

    Full Text Available Researchers often face the problem of needing to protect the privacy of subjects while also needing to integrate data that contains personal information from diverse data sources. The advent of computational social science and the enormous amount of data about people that is being collected makes protecting the privacy of research subjects ever more important. However, strict privacy procedures can hinder the process of joining diverse sources of data that contain information about specific individual behaviors. In this paper we present a procedure to keep information about specific individuals from being "leaked" or shared in either direction between two sources of data without need of a trusted third party. To achieve this goal, we randomly assign individuals to anonymous groups before combining the anonymized information between the two sources of data. We refer to this method as the Yahtzee procedure, and show that it performs as predicted by theoretical analysis when we apply it to data from Facebook and public voter records.

  7. System for Anonymous Data Collection Based on Group Signature Scheme

    Directory of Open Access Journals (Sweden)

    David Troják

    2016-01-01

    Full Text Available This paper deals with an anonymous data collection in the Internet of Things (IoT. the privacy and anonymity of the data source is important for many IoT applications, such as in agriculture, health, and automotive. the proposed data‑collection system provides anonymity for the data sources by applying a cooperation group scheme. the group scheme also provides a low power consumption. the system is built upon the Tor (The Onion Router anonymous network, which is a part of the Internet darknet. the proposed system was designed for the Android devices on the client side and for Java environment on the server side. We evaluated the anonymous data collection in a real‑use scenario that covers selected data acquisition (e.g. signal strength from smartphones triggered by their geographical location change. the results show that the proposed system provides the sufficient data source anonymity, an effective revocation, a low computational cost and a low overhead.

  8. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually

  9. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually cue

  10. Visibility and anonymity effects on attraction and group cohesiveness

    NARCIS (Netherlands)

    Lea, Martin; Spears, Russell; Watt, Susan E.

    2007-01-01

    This study investigated attraction and group cohesiveness under different visibility and anonymity conditions for social categories that differed in their capacity to be visually cued. Using computer-mediated communication in 36 mixed gender (visually cued category) and nationality (non-visually cue

  11. Security Analysis of Accountable Anonymous Group Communication in Dissent

    Science.gov (United States)

    2013-01-31

    simple yet powerful attack against one scheme (Park, Itoh, and Kurosawa 1994) trivially breaks an honest member’s anonymity if an attacker can create a...probably secure (Jakobsson 1998) was given by Mitomo and Kurosawa (2000). A corrupted mix server can alter intermediate ciphertexts, affect- ing the...Pfizmann 1990; Desmedt and Kurosawa 2000) general design flaws as well 62 as the ability of mix servers to use incorrect and specially-prepared inputs

  12. Guidelines for Professional Referral to Alcoholics Anonymous and Other Twelve Step Groups.

    Science.gov (United States)

    Riordan, Richard J.; Walsh, Lani

    1994-01-01

    Reviews 12-step programs, focusing on Alcoholics Anonymous (AA), the oldest and largest 12-step group. Explores criticisms of AA, describes its components and mechanics, and provides guidelines for client referral. Includes 28 citations. (Author/CRR)

  13. Knowing me, knowing you : Anonymity effects on social identity processes within groups

    NARCIS (Netherlands)

    Lea, M; Spears, R; de Groot, D

    The Social Identity Model of Deindividuation Effects (SIDE) proposes that depersonalization of self and others is responsible for the effects of visual anonymity on group behavior The authors investigated these mediating processes by assessing the effects of group-based self-categorization and

  14. Knowing me, knowing you : Anonymity effects on social identity processes within groups

    NARCIS (Netherlands)

    Lea, M; Spears, R; de Groot, D

    2001-01-01

    The Social Identity Model of Deindividuation Effects (SIDE) proposes that depersonalization of self and others is responsible for the effects of visual anonymity on group behavior The authors investigated these mediating processes by assessing the effects of group-based self-categorization and stere

  15. Social influence in computer-mediated communication : The effects of anonymity on group behavior

    NARCIS (Netherlands)

    Postmes, T; Spears, R; Sakhel, K; de Groot, D

    2001-01-01

    Two studies examined hypotheses derived from a Social Identity model of Deindividuation Effects (SIDE) as applied to social influence in computer-mediated communication (CMC) in groups. This model predicts that anonymity can increase social influence if a common group identity is salient. In a first

  16. Knowing me, knowing you : Anonymity effects on social identity processes within groups

    NARCIS (Netherlands)

    Lea, M; Spears, R; de Groot, D

    2001-01-01

    The Social Identity Model of Deindividuation Effects (SIDE) proposes that depersonalization of self and others is responsible for the effects of visual anonymity on group behavior The authors investigated these mediating processes by assessing the effects of group-based self-categorization and stere

  17. Verbal Venting in the Social Web: Effects of Anonymity and Group Norms on Aggressive Language Use in Online Comments

    Directory of Open Access Journals (Sweden)

    Leonie Rösner

    2016-08-01

    Full Text Available Scholars often blame the occurrence of aggressive behavior in online discussions on the anonymity of the Internet; however, even on today’s less anonymous platforms, such as social networking sites, users write plenty of aggressive comments, which can elicit a whole wave of negative remarks. Drawing on the social identity and deindividuation effects (SIDE model, this research conducts a laboratory experiment with a 2 (anonymity vs. no anonymity × 2 (aggressive norm vs. non-aggressive norm between-subjects design in order to disentangle the effects of anonymity, social group norms, and their interactions on aggressive language use in online comments. Results reveal that participants used more aggressive expressions in their comments when peer comments on a blog included aggressive wording (i.e., the social group norm was aggressive. Anonymity had no direct effect; however, we found a tendency that users’ conformity to an aggressive social norm of commenting is stronger in an anonymous environment.

  18. [Examination of the Young maladaptive schemes in a group of Gamblers Anonymous].

    Science.gov (United States)

    Katona, Zsuzsa; Körmendi, Attila

    2012-01-01

    Literature of gambling addiction has become widespread in last years. Many studies were written about the vulnerability factors helping the development of addiction, theoretical models, comorbid problems and therapy possibilities. Currently there is no integrated theoretical model that could explain sufficiently the development and maintenance of pathological gambling. The treatment issue is also unresolved. Cognitive psychology is a dynamically developing field of psychology and good results are achieved in gambling treatment with applying cognitive techniques. Jeffrey Young's schema-focused therapy is a recent theoretical and therapeutic direction within cognitive psychology which emphasizes the necessity of emotional changes beside rational ones in the interest of efficiency. The purpose of our research is to examine and analyse active maladaptive schemas among gamblers who are members of Gamblers Anonymous self-help group. 23 control persons and 23 gamblers associated with support group of Gamblers Anonymous took part in our research. The severity of gambling behaviour was measured by Gamblers Anonymous Twenty Questions. For exploring maladaptive schemas we used the shorter 114-item version of the Young Schema Questionnaire (YSQ-S3). All the examined gamblers were considered as problem gamblers based on Gamblers Anonymous Twenty Questions. In the control group there where no active schemas while in the group of gamblers several schemas (Emotional deprivation, Self-sacrifice, Recognition seeking, Emotional inhibition, Unrelenting standards, Self-punitiveness, Insufficient self-control) showed activity. Active schemas show similarity in their matter with main establishments of researches about gamblers and support the role of impulsivity, narcissistic traits, self-medicalization and emotional deprivation in the development and maintenance of pathological gambling.

  19. Anonymity in voting revisited

    NARCIS (Netherlands)

    Jonker, Hugo; Pieters, Wolter; Chaum, David; Jakobsson, Markus; Rivest, Ronald L.; Ryan, Peter Y.A.; Benaloh, Josh; Kutylowski, Miroslaw; Adida, Ben

    2010-01-01

    According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in

  20. Anonymous Gossiping

    CERN Document Server

    Datta, Anwitaman

    2010-01-01

    In this paper we introduce a novel gossiping primitive to support privacy preserving data analytics (PPDA). In contrast to existing computational PPDA primitives such as secure multiparty computation and data randomization based approaches, the proposed primitive `anonymous gossiping' is a communication primitive for privacy preserving personalized information aggregation complementing such traditional computational analytics. We realize this novel primitive by composing existing gossiping mechanisms for peer sampling & information aggregation and onion routing technique for establishing anonymous communication. This is more an `ideas' paper, rather than providing concrete and quantified results.

  1. What do adolescents exposed to Alcoholics Anonymous think about 12-step groups?

    Science.gov (United States)

    Kelly, John F; Myers, Mark G; Rodolico, John

    2008-01-01

    Referral to Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) is a common continuing care recommendation. Evidence suggests some youth benefit, yet, despite referrals, youth participation is low. Little is known about adolescents' experiences of AA/NA. Greater knowledge would inform and help tailor aftercare recommendations. Two clinical samples of youth (N = 74 and N= 377) were asked about their perceptions of, and experiences with, AA/NA with responses categorized by content into domains assessed for face validity and reliability. The aspects of AA/NA youth liked best were general group dynamic processes related to universality, support, and instillation of hope. The most common reason for discontinuing was boredom/lack of fit. General group-therapeutic, and not 12-step-specific, factors are most valued by youth during early stages of recovery and/or degree of AA/NA exposure. Many youth discontinue due to a perceived lack of fit, suggesting a mismatch between some youth and aspects of AA/NA.

  2. Anonymous Gossiping

    OpenAIRE

    Datta, Anwitaman

    2010-01-01

    In this paper we introduce a novel gossiping primitive to support privacy preserving data analytics (PPDA). In contrast to existing computational PPDA primitives such as secure multiparty computation and data randomization based approaches, the proposed primitive `anonymous gossiping' is a communication primitive for privacy preserving personalized information aggregation complementing such traditional computational analytics. We realize this novel primitive by composing existing gossiping me...

  3. What Do Adolescents Exposed to Alcoholic Anonymous Think about 12-Step Groups?

    Science.gov (United States)

    Kelly, John F.; Myers, Mark G.; Rodolico, John

    2008-01-01

    Objectives: Referral to Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) is a common continuing care recommendation. Evidence suggests some youth benefit, yet, despite referrals, youth participation is low. Little is known about adolescents' experiences of AA/NA. Greater knowledge would inform and help tailor aftercare recommendations.…

  4. Factors associated with attendance in 12-step groups (Alcoholics Anonymous/Narcotics Anonymous) among adults with alcohol problems living with HIV/AIDS.

    Science.gov (United States)

    Orwat, John; Samet, Jeffrey H; Tompkins, Christopher P; Cheng, Debbie M; Dentato, Michael P; Saitz, Richard

    2011-01-15

    Despite the value of 12-step meetings, few studies have examined factors associated with attendance among those living with HIV/AIDS, such as the impact of HIV disease severity and demographics. This study examines predisposing characteristics, enabling resources and need on attendance at Alcoholic Anonymous (AA) and Narcotics Anonymous (NA) meetings among those living with HIV/AIDS and alcohol problems. Secondary analysis of prospective data from the HIV-Longitudinal Interrelationships of Viruses and Ethanol study, a cohort of 400 adults living with HIV/AIDS and alcohol problems. Factors associated with AA/NA attendance were identified using the Anderson model for vulnerable populations. Generalized estimating equation logistic regression models were fit to identify factors associated with self-reported AA/NA attendance. At study entry, subjects were 75% male, 12% met diagnostic criteria for alcohol dependence, 43% had drug dependence and 56% reported attending one or more AA/NA meetings (past 6 months). In the adjusted model, female gender negatively associated with attendance, as were social support systems that use alcohol and/or drugs, while presence of HCV antibody, drug dependence diagnosis, and homelessness associated with higher odds of attendance. Non-substance abuse related barriers to AA/NA group attendance exist for those living with HIV/AIDS, including females and social support systems that use alcohol and/or drugs. Positive associations of homelessness, HCV infection and current drug dependence were identified. These findings provide implications for policy makers and treatment professionals who wish to encourage attendance at 12-step meetings for those living with HIV/AIDS and alcohol or other substance use problems. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.

  5. Effectiveness of Making Alcoholics Anonymous Easier: a group format 12-step facilitation approach.

    Science.gov (United States)

    Kaskutas, Lee Ann; Subbaraman, Meenakshi S; Witbrodt, Jane; Zemore, Sarah E

    2009-10-01

    Most treatment programs recommend clients attend 12-step groups, but many drop out posttreatment. The effectiveness of Making Alcoholics Anonymous [AA] Easier (MAAEZ ), a manual-guided intervention designed to help clients connect with individuals encountered in AA, was tested using an "OFF/ON" design (n = 508). MAAEZ effectiveness was determined by comparing abstinence rates of participants recruited during ON and OFF conditions and by studying the effect of the number of MAAEZ sessions attended. At 12 months, more clients in the ON condition (vs. OFF) reported past 30-day abstinence from alcohol (p = .012), drugs (p = .009), and both alcohol and drugs (p = .045). In multivariate analyses, ON condition participants had significantly increased odds of abstinence from alcohol (odds ratio [OR] = 1.85) and from drugs (OR = 2.21); abstinence odds also increased significantly for each additional MAAEZ session received. MAAEZ appeared especially effective for those with more prior AA exposure, severe psychiatric problems, and atheists/agnostics. MAAEZ represents an evidence-based intervention that is easily implemented in existing treatment programs.

  6. An overview of anonymity and anonymous communication

    NARCIS (Netherlands)

    Koot, M.

    2008-01-01

    Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of

  7. An overview of anonymity and anonymous communication

    NARCIS (Netherlands)

    Koot, M.

    2008-01-01

    Privacy is becoming an increasingly important aspect in distributed systems. In anonymous communication, privacy is provided to communicating parties by hiding their identities from each other and/or from others. This paper discusses the problem of anonymous communication and clarifies the notion of

  8. Anonymity in Voting Revisited

    Science.gov (United States)

    Jonker, Hugo; Pieters, Wolter

    According to international law, anonymity of the voter is a fundamental precondition for democratic elections. In electronic voting, several aspects of voter anonymity have been identified. In this paper, we re-examine anonymity with respect to voting, and generalise existing notions of anonymity in e-voting. First, we identify and categorise the types of attack that can be a threat to anonymity of the voter, including different types of vote buying and coercion. This analysis leads to a categorisation of anonymity in voting in terms of a) the strength of the anonymity achieved and b) the extent of interaction between voter and attacker. Some of the combinations, including weak and strong receipt-freeness, are formalised in epistemic logic.

  9. Foreword for the special issue of selected papers from the 7th EDBT/ICDT Workshop on Privacy and Anonymity in Information Society (PAIS 2014

    Directory of Open Access Journals (Sweden)

    Traian Marius Truta

    2015-04-01

    Full Text Available The seventh Workshop on Privacy and Anonymity in Information Society (PAIS 2014 was held in conjunction with the International Conference on Extending Database Technology (EDBT and International Conference on Database Theory (ICDT in Athens, Greece. The PAIS 2014 workshop provided an open yet focused platform for researchers and practitioners from fields such as computer science, statistics, healthcare informatics, and law to discuss and present current research challenges and advances in data privacy and anonymity research. The present special issue contains three extended papers that have been selected as the best three papers presented at PAIS 2014 workshop.

  10. Anonymizing Unstructured Data

    CERN Document Server

    Motwani, Rajeev

    2008-01-01

    In this paper we consider the problem of anonymizing datasets in which each individual is associated with a set of items that constitute private information about the individual. Illustrative datasets include market-basket datasets and search engine query logs. We formalize the notion of k-anonymity for set-valued data as a variant of the k-anonymity model for traditional relational datasets. We define an optimization problem that arises from this definition of anonymity and provide a constant factor approximation algorithm for the same. We evaluate our algorithms on the America Online query log dataset.

  11. Impressions of Alcoholics Anonymous (AA) Group Cohesion: A Case for a Nonspecific Factor Predicting Later AA Attendance.

    Science.gov (United States)

    Rice, Samara Lloyd; Tonigan, J Scott

    2012-01-04

    Social support for abstinence in Alcoholics Anonymous (AA) has been reported to be a consistent factor accounting for AA benefit. However, the nonspecific or unintended effects of such support remain poorly understood and rarely investigated. This prospective study investigated how one nonspecific factor-perceived AA group cohesiveness-predicted increased practice of AA-related behaviors. Findings indicated that impressions of AA group cohesion predicted increased AA attendance, the practice of prescribed AA activities, and self-reported AA usefulness. It appears that a sense of belongingness predicts subsequent engagement in the AA social network that, in turn, is predictive of increased abstinence.

  12. On Backward-Style Anonymity Verification

    Science.gov (United States)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  13. Comparing Acceptance and Commitment Group Therapy and 12-Steps Narcotics Anonymous in Addict's Rehabilitation Process: A Randomized Controlled Trial.

    Science.gov (United States)

    Azkhosh, Manoochehr; Farhoudianm, Ali; Saadati, Hemn; Shoaee, Fateme; Lashani, Leila

    2016-10-01

    Objective: Substance abuse is a socio-psychological disorder. The aim of this study was to compare the effectiveness of acceptance and commitment therapy with 12-steps Narcotics Anonymous on psychological well-being of opiate dependent individuals in addiction treatment centers in Shiraz, Iran. Method: This was a randomized controlled trial. Data were collected at entry into the study and at post-test and follow-up visits. The participants were selected from opiate addicted individuals who referred to addiction treatment centers in Shiraz. Sixty individuals were evaluated according to inclusion/ exclusion criteria and were divided into three equal groups randomly (20 participants per group). One group received acceptance and commitment group therapy (Twelve 90-minute sessions) and the other group was provided with the 12-steps Narcotics Anonymous program and the control group received the usual methadone maintenance treatment. During the treatment process, seven participants dropped out. Data were collected using the psychological well-being questionnaire and AAQ questionnaire in the three groups at pre-test, post-test and follow-up visits. Data were analyzed using repeated measure analysis of variance. Results: Repeated measure analysis of variance revealed that the mean difference between the three groups was significant (Pacceptance and commitment therapy group showed improvement relative to the NA and control groups on psychological well-being and psychological flexibility. Conclusion: The results of this study revealed that acceptance and commitment therapy can be helpful in enhancing positive emotions and increasing psychological well-being of addicts who seek treatment.

  14. Data anonymization patent landscape

    Directory of Open Access Journals (Sweden)

    Mirjana Pejić Bach

    2017-01-01

    Full Text Available The omnipresent, unstoppable increase in digital data has led to a greater understanding of the importance of data privacy. Different approaches are used to implement data privacy. The goal of this paper is to develop a data anonymization patent landscape, by determining the following: (i the trend in data anonymization patenting, (ii the type of technical content protected in data anonymization, (iii the organizations and countries most active in patenting data anonymization know-how; and (iv the topics emerging most often in patent titles. Patents from the PatSeer database relating to data anonymization from 2001 to 2015 were analyzed. We used the longitudinal approach in combination with text mining techniques to develop a data anonymization patent landscape. The results indicated the following. The number of single patent families is growing with a high increase after 2010, thus indicating a positive trend in the area of patenting data anonymization solutions. The majority of patenting activities relate to the G Physics section. Organizations from the USA and Japan assigned the majority of patents related to data anonymization. The results of text mining indicate that the most often used word in titles of data anonymization patents are “anonym*, “method”, “data” and “system”. Several additional words that indicated the most frequent topics related to data anonymization were: “equipment”, “software”, “protection”, “identification”, or “encryption”, and specific topics such as “community”, “medical”, or “service”.

  15. Misery Needs Company: The Group Paper.

    Science.gov (United States)

    Pomper, Marlene M.

    Many students consider the writing of papers to be a lonely, difficult, and even painful process. To enable these students to improve their essays and research papers, a teacher has used a collaborative method of writing called the group paper. This method encompasses the various stages of writing, from freewriting of first drafts through multiple…

  16. Do alcoholics anonymous groups really work? Factors of adherence in a Brazilian sample of hospitalized alcohol dependents.

    Science.gov (United States)

    Terra, Mauro Barbosa; Barros, Helena Maria Tannhauser; Stein, Airton Tetelbom; Figueira, Ivan; Palermo, Luiz Henrique; Athayde, Luciana Dias; de Souza Gonçalves, Marcelo; da Silveira, Dartiu Xavier

    2008-01-01

    This study was designed to determine factors affecting adherence to Alcoholics Anonymous (AA) groups. This cohort involved 300 alcoholics committed to three hospitals in Porto Alegre, Brazil. They were interviewed again in their homes after six months. The SCID-I and a questionnaire focusing on patient relationship with AA groups were used. The responses obtained through the questionnaire were independently evaluated by two researchers. AA adherence was below 20%. The main factors reported by patients as reasons for non-adherence to AA were relapse, lack of identification with the method, lack of need, and lack of credibility. The factors reported by patients as reasons for adherence were identification with the method and a way to avoid relapse. Although AA is considered an effective intervention for alcoholism, its adherence rate was excessively low. The identification of these nonadherence factors could help health professionals in referring certain alcoholic patients to therapeutic interventions other than AA.

  17. Recovery and spiritual transformation among peer leaders of a modified methadone anonymous group.

    Science.gov (United States)

    Glickman, Linda; Galanter, Marc; Dermatis, Helen; Dingle, Shannon

    2006-12-01

    This analysis of five recovery narratives from leaders of a peer-led, 12-Step-based self- help group in a methadone treatment program highlights the importance of spiritually-mediated role transformation in the recovery process. For these men and women in their forties and fifties, their progression to a leadership role helping others with their recovery validated the spiritual transformation they regarded as underlying their own recovery process. Assumption of this new leadership/helper role marked a tangible sign that their deepened spirituality allowed them to assume a new, higher function in a struggle with the addiction that had plagued their lives. For these peer leaders, methadone was at the core of the group experience and an aid to spiritual transformation.

  18. Against anonymity.

    Science.gov (United States)

    Baker, Robert

    2014-05-01

    In 'New Threats to Academic Freedom' Francesca Minerva argues that anonymity for the authors of controversial articles is a prerequisite for academic freedom in the Internet age. This argument draws its intellectual and emotional power from the author's account of the reaction to the on-line publication of ' After-birth abortion: why should the baby live?'--an article that provoked cascades of hostile postings and e-mails. Reflecting on these events, Minerva proposes that publishers should offer the authors of controversial articles the option of publishing their articles anonymously. This response reviews the history of anonymous publication and concludes that its reintroduction in the Internet era would recreate problems similar to those that led print journals to abandon the practice: corruption of scholarly discourse by invective and hate speech, masked conflicts of interest, and a diminution of editorial accountability. It also contends that Minerva misreads the intent of the hostile e-mails provoked by 'After-birth abortion,' and that ethicists who publish controversial articles should take responsibility by dialoguing with their critics--even those whose critiques are emotionally charged and hostile.

  19. Preserving Communities in Anonymized Social Networks

    Directory of Open Access Journals (Sweden)

    Alina Campan

    2015-04-01

    Full Text Available Social media and social networks are embedded in our society to a point that could not have been imagined only ten years ago. Facebook, LinkedIn, and Twitter are already well known social networks that have a large audience in all age groups. The amount of data that those social sites gather from their users is continually increasing and this data is very valuable for marketing, research, and various other purposes. At the same time, this data usually contain a significant amount of sensitive information which should be protected against unauthorized disclosure. To protect the privacy of individuals, this data must be anonymized such that the risk of re-identification of specific individuals is very low. In this paper we study if anonymized social networks preserve existing communities from the original social networks. To perform this study, we introduce two approaches to measure the community preservation between the initial network and its anonymized version. In the first approach we simply count how many nodes from the original communities remained in the same community after the processes of anonymization and de-anonymization. In the second approach we consider the community preservation for each node individually. Specifically, for each node, we compare the original and final communities to which the node belongs. To anonymize social networks we use two models, namely, k-anonymity for social networks and k-degree anonymity. To determine communities in social networks we use an existing community detection algorithm based on modularity quality function. Our experiments on publically available datasets show that anonymized social networks satisfactorily preserve the community structure of their original networks.

  20. Anonymous Mobile Payment Solution

    Directory of Open Access Journals (Sweden)

    Alhaj Ali Jalila

    2015-09-01

    Full Text Available The evolution and increasing popularity of mobile handheld devices has led to the development of payment applications. The global acceptance of mobile payments is hindered by security and privacy concerns. One of the main problems evoked is the anonymity related with banking transactions. In this paper I propose a new secured architecture for mobile banking. Anonymity and privacy protection are the measures to be enhanced in order to satisfy people’s current needs. The banking platform must provide the highest level of security for messages exchanged between bank and the customer.

  1. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  2. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted attribu

  3. Comparing Acceptance and Commitment Group Therapy and 12-Steps Narcotics Anonymous in Addict’s Rehabilitation Process: A Randomized Controlled Trial

    Directory of Open Access Journals (Sweden)

    Manoochehr Azkhosh

    2016-12-01

    Full Text Available Objective: Substance abuse is a socio-psychological disorder. The aim of this study was to compare the effectiveness of acceptance and commitment therapy with 12-steps Narcotics Anonymous on psychological well-being of opiate dependent individuals in addiction treatment centers in Shiraz, Iran.Method: This was a randomized controlled trial. Data were collected at entry into the study and at post-test and follow-up visits. The participants were selected from opiate addicted individuals who referred to addiction treatment centers in Shiraz. Sixty individuals were evaluated according to inclusion/ exclusion criteria and were divided into three equal groups randomly (20 participants per group. One group received acceptance and commitment group therapy (Twelve 90-minute sessions and the other group was provided with the 12-steps Narcotics Anonymous program and the control group received the usual methadone maintenance treatment. During the treatment process, seven participants dropped out. Data were collected using the psychological well-being questionnaire and AAQ questionnaire in the three groups at pre-test, post-test and follow-up visits. Data were analyzed using repeated measure analysis of variance.Results: Repeated measure analysis of variance revealed that the mean difference between the three groups was significant (P<0.05 and that acceptance and commitment therapy group showed improvement relative to the NA and control groups on psychological well-being and psychological flexibility.Conclusion: The results of this study revealed that acceptance and commitment therapy can be helpful in enhancing positive emotions and increasing psychological well-being of addicts who seek treatment.

  4. Comparing Acceptance and Commitment Group Therapy and 12-Steps Narcotics Anonymous in Addict’s Rehabilitation Process: A Randomized Controlled Trial

    Science.gov (United States)

    Azkhosh, Manoochehr; Farhoudianm, Ali; Saadati, Hemn; Shoaee, Fateme; Lashani, Leila

    2016-01-01

    Objective: Substance abuse is a socio-psychological disorder. The aim of this study was to compare the effectiveness of acceptance and commitment therapy with 12-steps Narcotics Anonymous on psychological well-being of opiate dependent individuals in addiction treatment centers in Shiraz, Iran. Method: This was a randomized controlled trial. Data were collected at entry into the study and at post-test and follow-up visits. The participants were selected from opiate addicted individuals who referred to addiction treatment centers in Shiraz. Sixty individuals were evaluated according to inclusion/ exclusion criteria and were divided into three equal groups randomly (20 participants per group). One group received acceptance and commitment group therapy (Twelve 90-minute sessions) and the other group was provided with the 12-steps Narcotics Anonymous program and the control group received the usual methadone maintenance treatment. During the treatment process, seven participants dropped out. Data were collected using the psychological well-being questionnaire and AAQ questionnaire in the three groups at pre-test, post-test and follow-up visits. Data were analyzed using repeated measure analysis of variance. Results: Repeated measure analysis of variance revealed that the mean difference between the three groups was significant (Pacceptance and commitment therapy group showed improvement relative to the NA and control groups on psychological well-being and psychological flexibility. Conclusion: The results of this study revealed that acceptance and commitment therapy can be helpful in enhancing positive emotions and increasing psychological well-being of addicts who seek treatment. PMID:28050185

  5. High-Grade Color Offset Paper of Xinya Paper Group Started Operation Successfully

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    On March 5th, the 3150 mm paper machine of Xinya Paper Group started the operation successfully. Originally, the paper machine produced ordinary culture paper, using mixed straw and wood pulp as the raw material. With the market demand shift toward higher quality, the original products produced can no longer meet the requirements.

  6. An Anonymity Revocation Technology for Anonymous Communication

    Science.gov (United States)

    Antoniou, Giannakis; Batten, Lynn; Parampalli, Udaya

    A number of privacy-enhancing technologies (PETs) have been proposed in the last three decades offering unconditional communication anonymity to their users. Unconditional anonymity can, however, be a security threat because it allows users to employ a PET in order to act maliciously while hiding their identity. In the last few years, several technologies which revoke the identity of users who use PETs have been proposed. These are known as anonymity revocation technologies (ARTs). However, the construction of ARTs has been developed in an ad hoc manner without a theoretical basis outlining the goals and underlying principles. In this chapter we present a set of fundamental principles and requirements for construction of an ART, identifying the necessary features. We then propose an abstract scheme for construction of an ART based on these features.

  7. A Parallelism-Based Approach to Network Anonymization

    CERN Document Server

    Margasinski, Igor

    2009-01-01

    Considering topologies of anonymous networks we used to organizing anonymous communication into hard to trace paths hiding its origin or destination. In anonymity the company is crucial, however the serial transportation imposes a costly tradeoff between a level of privacy and a speed of communication. This paper introduces a framework of a novel architecture for anonymous networks that hides initiators of communications by parallelization of anonymous links. The new approach, which is based on the grounds of the anonymous P2P network called P2Priv, does not require content forwarding via a chain of proxy nodes to assure high degree of anonymity. Contrary to P2Priv, the new architecture can be suited to anonymization of various network communications, including anonymous access to distributed as well as client-server services. In particular, it can be considered as an anonymization platform for these network applications where both privacy and low delays are required.

  8. Anonymization of Court Orders

    DEFF Research Database (Denmark)

    Povlsen, Claus; Jongejan, Bart; Hansen, Dorte Haltrup;

    We describe an anonymization tool that was commissioned by and specified together with Schultz, a publishing company specialized in Danish law related publications. Unavailability of training data and the need to guarantee compliance with pre-existing anonymization guidelines forced us to implement...

  9. Predictors of engagement in the Alcoholics Anonymous group or to psychotherapy among Brazilian alcoholics : a six-month follow-up study.

    Science.gov (United States)

    Terra, Mauro Barbosa; Barros, Helena Maria Tannhauser; Stein, Airton Tetelbom; Figueira, Ivan; Athayde, Luciana Dias; Palermo, Luiz Henrique; Tergolina, Letícia Piccoli; Rovani, Joana Stela; da Silveira, Dartiu Xavier

    2007-06-01

    To ascertain factors associated with engagement of patients with alcohol dependence in Alcoholics Anonymous (AA) groups and psychotherapy. About 300 hospitalized alcoholics were interviewed at hospitalization and again 3 and 6 months thereafter. Assessment included the administration of standardized instruments. Determinants of engagement in both interventions were assessed through logistic regression analysis. Higher educational level was predictive of engagement in AA after 6 months (OR = 2.19; CI 1.08-4.41). Engagement in psychotherapy after 6 months was related to having a university degree (OR = 3.60; CI 1.6-7.9), to a co-morbid depressive disorder (OR = 3.47; CI 1.8-6.5), to the use of other drugs together with alcohol (OR = 3.08; CI 1.5-6.19), to previous treatment (OR = 2.87; CI 1.29-6.40), and to having a high school degree (OR = 2.44; CI 1.24-4.80). The presence of substance-induced anxiety disorder was associated with non-engagement in psychotherapy (OR = 0.27; CI 0.63-0.003). The identification of predictors of engagement is important to guide clinicians in the choice of the treatment strategies that are more likely to be successful.

  10. Movement Data Anonymity through Generalization

    Directory of Open Access Journals (Sweden)

    Anna Monreale

    2010-08-01

    Full Text Available Wireless networks and mobile devices, such as mobile phones and GPS receivers, sense and track the movements of people and vehicles, producing society-wide mobility databases. This is a challenging scenario for data analysis and mining. On the one hand, exciting opportunities arise out of discovering new knowledge about human mobile behavior, and thus fuel intelligent info-mobility applications. On other hand, new privacy concerns arise when mobility data are published. The risk is particularly high for GPS trajectories, which represent movement of a very high precision and spatio-temporal resolution: the de-identification of such trajectories (i.e., forgetting the ID of their associated owners is only a weak protection, as generally it is possible to re-identify a person by observing her routine movements. In this paper we propose a method for achieving true anonymity in a dataset of published trajectories, by defining a transformation of the original GPS trajectories based on spatial generalization and k-anonymity. The proposed method offers a formal data protection safeguard, quantified as a theoretical upper bound to the probability of re-identification. We conduct a thorough study on a real-life GPS trajectory dataset, and provide strong empirical evidence that the proposed anonymity techniques achieve the conflicting goals of data utility and data privacy. In practice, the achieved anonymity protection is much stronger than the theoretical worst case, while the quality of the cluster analysis on the trajectory data is preserved.

  11. Towards a Theory of Anonymous Networking

    CERN Document Server

    Ghaderi, J

    2009-01-01

    The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination nodes, and paths of information flow in the network. One way to achieve such an anonymity is to use mixers. Mixers are nodes that receive packets from multiple sources and change the timing of packets, by mixing packets at the output links, to prevent the eavesdropper from finding sources of outgoing packets. In this paper, we consider two simple but fundamental scenarios: double input-single output mixer and double input-double output mixer. For the first case, we use the information-theoretic definition of the anonymity, based on average entropy per packet, and find an optimal mixing strategy under a strict latency constraint. For the second case, perfect anonymity is considered, and a maximal throughput strategy with perfect anonymity is found that minimizes the average delay.

  12. Big Data: Laying the Groundwork. ECAR Working Group Paper

    Science.gov (United States)

    Almes, Guy T.; Hillegas, Curtis W.; Lance, Timothy; Lynch, Clifford A.; Monaco, Gregory E.; Mundrane, Michael R.; Zottola, Ralph J.

    2014-01-01

    This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…

  13. Big Data: Laying the Groundwork. ECAR Working Group Paper

    Science.gov (United States)

    Almes, Guy T.; Hillegas, Curtis W.; Lance, Timothy; Lynch, Clifford A.; Monaco, Gregory E.; Mundrane, Michael R.; Zottola, Ralph J.

    2014-01-01

    This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…

  14. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...... a solution for anonymous yet reliable access control and account-ability based on ring and group signatures....

  15. A Novel Multi-Receiver Signcryption Scheme with Complete Anonymity.

    Science.gov (United States)

    Pang, Liaojun; Yan, Xuxia; Zhao, Huiyang; Hu, Yufei; Li, Huixian

    2016-01-01

    Anonymity, which is more and more important to multi-receiver schemes, has been taken into consideration by many researchers recently. To protect the receiver anonymity, in 2010, the first multi-receiver scheme based on the Lagrange interpolating polynomial was proposed. To ensure the sender's anonymity, the concept of the ring signature was proposed in 2005, but afterwards, this scheme was proven to has some weakness and at the same time, a completely anonymous multi-receiver signcryption scheme is proposed. In this completely anonymous scheme, the sender anonymity is achieved by improving the ring signature, and the receiver anonymity is achieved by also using the Lagrange interpolating polynomial. Unfortunately, the Lagrange interpolation method was proven a failure to protect the anonymity of receivers, because each authorized receiver could judge whether anyone else is authorized or not. Therefore, the completely anonymous multi-receiver signcryption mentioned above can only protect the sender anonymity. In this paper, we propose a new completely anonymous multi-receiver signcryption scheme with a new polynomial technology used to replace the Lagrange interpolating polynomial, which can mix the identity information of receivers to save it as a ciphertext element and prevent the authorized receivers from verifying others. With the receiver anonymity, the proposed scheme also owns the anonymity of the sender at the same time. Meanwhile, the decryption fairness and public verification are also provided.

  16. Anonymous Quantum Communication

    Science.gov (United States)

    Brassard, Gilles; Broadbent, Anne; Fitzsimons, Joseph; Gambs, Sébastien; Tapp, Alain

    We introduce the first protocol for the anonymous transmission of a quantum state that is information-theoretically secure against an active adversary, without any assumption on the number of corrupt participants. The anonymity of the sender and receiver is perfectly preserved, and the privacy of the quantum state is protected except with exponentially small probability. Even though a single corrupt participant can cause the protocol to abort, the quantum state can only be destroyed with exponentially small probability: if the protocol succeeds, the state is transferred to the receiver and otherwise it remains in the hands of the sender (provided the receiver is honest).

  17. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    We ask whether it is possible to anonymously communicate a large amount of data using only public (non-anonymous) communication together with a small anonymous channel. We think this is a central question in the theory of anonymous communication and to the best of our knowledge this is the first...... formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... defining anonymous steganography, - A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), - A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  18. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    We ask whether it is possible to anonymously communicate a large amount of data using only public (non-anonymous) communication together with a small anonymous channel. We think this is a central question in the theory of anonymous communication and to the best of our knowledge this is the rst...... formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... anonymous steganography, { A construction showing that anonymous steganography is possible (which uses recent results in circuits obfuscation), { A lower bound on the number of bits which are needed to bootstrap anonymous communication....

  19. Groups of Groups: The Role of Group Learning in Building Social Capital. CRLRA Discussion Paper Series.

    Science.gov (United States)

    Kilpatrick, Sue; Bell, Rowena; Falk, Ian

    The Centre for Research and Learning in Regional Australia is investigating the elements of social capital and developing a set of indicators that show when social capital is building. The indicators can be used where groups or organizations with a shared purpose engage in productive interactions that benefit not only the individual member groups…

  20. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    Science.gov (United States)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  1. Selected papers on harmonic analysis, groups, and invariants

    CERN Document Server

    Nomizu, Katsumi

    1997-01-01

    This volume contains papers that originally appeared in Japanese in the journal Sūgaku. Ordinarily the papers would appear in the AMS translation of that journal, but to expedite publication the Society has chosen to publish them as a volume of selected papers. The papers range over a variety of topics, including representation theory, differential geometry, invariant theory, and complex analysis.

  2. On the Anonymity of Identity-Based Encryption

    Directory of Open Access Journals (Sweden)

    Song Luo

    2013-01-01

    Full Text Available Anonymity of identity-based encryption (IBE means that given a ciphertext, one cannot distinguish the target identity from a random identity. In this paper, we thoroughly discuss the anonymity of IBE systems. We found that the current definition of anonymity is obscure to describe some IBE systems, such as Gentry IBE system. Furthermore, current definition cannot express the degree of anonymity. So we divide the degree of anonymity into weak anonymity and strong anonymity based on indistinguishability between different games. For weakly anonymous IBE systems, the target identity in a ciphertext cannot be distinguished from a random identity. For strongly anonymous IBE systems, the whole ciphertext cannot be distinguished from a random tuple. We also discuss the type of anonymity and divide it into two types. Type 1 means that a random tuple can be seen as a valid ciphertext, while type 2 cannot. Based on our new definitions, we show that three famous IBE systems, Gentry IBE system, Boyen-Waters IBE system, and Lewko IBE system, have strong but different types of anonymity.

  3. Anonymous Web Browsing and Hosting

    Directory of Open Access Journals (Sweden)

    MANOJ KUMAR

    2013-02-01

    Full Text Available In today’s high tech environment every organization, individual computer users use internet for accessing web data. To maintain high confidentiality and security of the data secure web solutions are required. In this paper we described dedicated anonymous web browsing solutions which makes our browsing faster and secure. Web application which play important role for transferring our secret information including like email need more and more security concerns. This paper also describes that how we can choose safe web hosting solutions and what the main functions are which provides more security over server data. With the browser security network security is also important which can be implemented using cryptography solutions, VPN and by implementing firewalls on the network. Hackers always try to steal our identity and data, they track our activities using the network application software’s and do harmful activities. So in this paper we described that how we can monitor them from security purposes.

  4. Altruism and anonymity: A behavioral analysis.

    Science.gov (United States)

    Locey, Matthew L; Rachlin, Howard

    2015-09-01

    The effect of anonymity on altruism was examined in a social discounting task with hypothetical rewards. Social discounting - the rate at which increases in social distance decrease value to the participant - was compared across three groups. Participants in the Anonymous group were told that recipients would not know who they were. Participants in the Observed group were asked to imagine that each of their choices was being observed by the recipient. Participants in the Standard group were given no special instructions with respect to anonymity or identity. Social discounting was measured at each of 7 social distances ranging from first closest friend or relative to the 100th closest. Social discount rates for all three groups were well described by hyperbolic functions. Participants in the Observed group were willing to forgo more money for the benefit of others (were more altruistic) than were those in the other two groups. Although participants in the Anonymous group, with no prospect of reciprocation, were willing to forgo less money for the sake of others than were those in the Observed group, they did express willingness to forgo significant amounts. This is some evidence that individual altruistic acts cannot be explained wholly by the possibility of reciprocation. Copyright © 2015 Elsevier B.V. All rights reserved.

  5. Altruism and Anonymity: A Behavioral Analysis

    Science.gov (United States)

    Locey, Matthew L.; Rachlin, Howard

    2015-01-01

    The effect of anonymity on altruism was examined in a social discounting task with hypothetical rewards. Social discounting – the rate at which increases in social distance decrease value to the participant – was compared across three groups. Participants in the Anonymous group were told that recipients would not know who they were. Participants in the Observed group were asked to imagine that each of their choices was being observed by the recipient. Participants in the Standard group were given no special instructions with respect to anonymity or identity. Social discounting was measured at each of 7 social distances ranging from first closest friend or relative to the 100th closest. Social discount rates for all three groups were well described by hyperbolic functions. Participants in the Observed group were willing to forgo more money for the benefit of others (were more altruistic) than were those in the other two groups. Although participants in the Anonymous group, with no prospect of reciprocation, were willing to forgo less money for the sake of others than were those in the Observed group, they did express willingness to forgo significant amounts. This is some evidence that individual altruistic acts cannot be explained wholly by the possibility of reciprocation. PMID:26051191

  6. The Metadata Anonymization Toolkit

    OpenAIRE

    Voisin, Julien; Guyeux, Christophe; Bahi, Jacques M.

    2012-01-01

    This document summarizes the experience of Julien Voisin during the 2011 edition of the well-known \\emph{Google Summer of Code}. This project is a first step in the domain of metadata anonymization in Free Software. This article is articulated in three parts. First, a state of the art and a categorization of usual metadata, then the privacy policy is exposed/discussed in order to find the right balance between information lost and privacy enhancement. Finally, the specification of the Metadat...

  7. The Metadata Anonymization Toolkit

    OpenAIRE

    2012-01-01

    This document summarizes the experience of Julien Voisin during the 2011 edition of the well-known \\emph{Google Summer of Code}. This project is a first step in the domain of metadata anonymization in Free Software. This article is articulated in three parts. First, a state of the art and a categorization of usual metadata, then the privacy policy is exposed/discussed in order to find the right balance between information lost and privacy enhancement. Finally, the specification of the Metadat...

  8. Performance evaluation of various K- anonymity techniques

    Science.gov (United States)

    Maheshwarkar, Nidhi; Pathak, Kshitij; Chourey, Vivekanand

    2011-12-01

    Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked with the private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. This paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. This paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.

  9. Computing on Anonymous Quantum Network

    CERN Document Server

    Kobayashi, Hirotada; Tani, Seiichiro

    2010-01-01

    This paper considers distributed computing on an anonymous quantum network, a network in which no party has a unique identifier and quantum communication and computation are available. It is proved that the leader election problem can exactly (i.e., without error in bounded time) be solved with at most the same complexity up to a constant factor as that of exactly computing symmetric functions (without intermediate measurements for a distributed and superposed input), if the number of parties is given to every party. A corollary of this result is a more efficient quantum leader election algorithm than existing ones: the new quantum algorithm runs in O(n) rounds with bit complexity O(mn^2), on an anonymous quantum network with n parties and m communication links. Another corollary is the first quantum algorithm that exactly computes any computable Boolean function with round complexity O(n) and with smaller bit complexity than that of existing classical algorithms in the worst case over all (computable) Boolea...

  10. Compromising Tor Anonymity Exploiting P2P Information Leakage

    CERN Document Server

    Manils, Pere; Blond, Stevens Le; Kaafar, Mohamed Ali; Castelluccia, Claude; Legout, Arnaud; Dabbous, Walid

    2010-01-01

    Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak information that may compromise the identity of its users. In this paper, we first present three attacks targeting BitTorrent users on top of Tor that reveal their real IP addresses. In a second step, we analyze the Tor usage by BitTorrent users and compare it to its usage outside of Tor. Finally, we depict the risks induced by this de-anonymization and show that users' privacy violation goes beyond BitTorrent traffic and contaminates other protocols such as HTTP.

  11. Secure Electronic Cash Scheme with Anonymity Revocation

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2016-01-01

    Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.

  12. Anonymous Fingerprinting Based on Electronic Cash

    Institute of Scientific and Technical Information of China (English)

    CHENXiaofeng; ZHANGFangguo; WANGJilin; WANGYumin

    2003-01-01

    A new anonymous fingerprinting protocol based on the principle of electronic cash is proposed in this paper.Redistributing a data item is equal to doublespending electronic cash.Contrasting with the previous coin-based anonymous fingerprinting protocol,we use the real electronic cash to trace traitors instead of the "coins" which serve only as a cryptographic primitive and have no monetary value,so it is easily understood and the bank does not need key-distribution and registration to prepare the "coina".

  13. Deterministic Leader Election Among Disoriented Anonymous Sensors

    CERN Document Server

    dieudonné, Yoann; Petit, Franck; Villain, Vincent

    2012-01-01

    We address the Leader Election (LE) problem in networks of anonymous sensors sharing no kind of common coordinate system. Leader Election is a fundamental symmetry breaking problem in distributed computing. Its goal is to assign value 1 (leader) to one of the entities and value 0 (non-leader) to all others. In this paper, assuming n > 1 disoriented anonymous sensors, we provide a complete charac- terization on the sensors positions to deterministically elect a leader, provided that all the sensors' positions are known by every sensor. More precisely, our contribution is twofold: First, assuming n anonymous sensors agreeing on a common handedness (chirality) of their own coordinate system, we provide a complete characterization on the sensors positions to deterministically elect a leader. Second, we also provide such a complete chararacterization for sensors devoided of a common handedness. Both characterizations rely on a particular object from combinatorics on words, namely the Lyndon Words.

  14. Anonymity and Openness in Donor Conception: the New Danish Model

    DEFF Research Database (Denmark)

    Herrmann, Janne Rothmar

    2013-01-01

    model in donor conception which offers women/couples a choice of anonymity or openness in donation.This paper is based on my talk on June 20, 2013 at London School of Economics at the conference “New Families and Genetic Identities: Developments in law, policy and research” organised by the Morgan...... bank is based in Denmark and consequently anonymous sperm is also exported abroad, even into jurisdictions where anonymity is banned illegal. This commentary traces the raison d’être of anonymity in Danish law, accounts for the legal framework for the internet sale of sperm and examines the new Danish...

  15. Anonymous Broadcast Messages

    Directory of Open Access Journals (Sweden)

    Dragan Lazic

    2013-01-01

    Full Text Available The Dining Cryptographer network (or DC-net is a privacy preserving communication protocol devised by David Chaum for anonymous message publication. A very attractive feature of DC-nets is the strength of its security, which is inherent in the protocol and is not dependent on other schemes, like encryption. Unfortunately the DC-net protocol has a level of complexity that causes it to suffer from exceptional communication overhead and implementation difficulty that precludes its use in many real-world use-cases. We have designed and created a DC-net implementation that uses a pure client-server model, which successfully avoids much of the complexity inherent in the DC-net protocol. We describe the theory of DC-nets and our pure client-server implementation, as well as the compromises that were made to reduce the protocol’s level of complexity. Discussion centers around the details of our implementation of DC-net.

  16. 76 FR 14105 - International Paper Company, Pineville Mill Industrial Packaging Group; Pineville, LA; Notice of...

    Science.gov (United States)

    2011-03-15

    ... Employment and Training Administration International Paper Company, Pineville Mill Industrial Packaging Group... workers and former workers of International Paper Company, Pineville Mill, Industrial Packaging Group... International Paper Company (subject firm) nor any of its customers imported articles like or...

  17. Anonymity control in electronic check systems

    Institute of Scientific and Technical Information of China (English)

    Ma Chunguang; Yang Yixian; Hu Zhengming

    2005-01-01

    Electronic check systems, as one of electronic payment systems, are more desirable than other electronic cash systems. In the system, only a single check is used to pay any price that is not more than the face value. The main problem in check systems is to design an efficient refund mechanism that makes refund checks undistinguished from initial checks during payment and deposit. The problem of anonymity control also called fairness is also an important issue in check systems. All check systems yet are unconditional anonymity that opens the door to misuse for crime such as laundering and blackmailing. In this paper, the notion of anonymity revocation is introduced to electronic check system for the first time, and a model of fair electronic check system is proposed. An efficient fair online electronic check system with reusable refund is presented. In the system, a passive trustee is employed to revoke the anonymity of un-honest users. Moreover, the system solves the reusability problem of refunds thanks to the RSA-based partially signature. The system is efficient and meets all basic security requirements.

  18. Anonymous publication of sensitive transactional data

    KAUST Repository

    Ghinita, Gabriel

    2011-02-01

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ℓ-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing of transactional data (or basket data), which involve hundreds or even thousands of dimensions, rendering existing methods unusable. We propose two categories of novel anonymization methods for sparse high-dimensional data. The first category is based on approximate nearest-neighbor (NN) search in high-dimensional spaces, which is efficiently performed through locality-sensitive hashing (LSH). In the second category, we propose two data transformations that capture the correlation in the underlying data: 1) reduction to a band matrix and 2) Gray encoding-based sorting. These representations facilitate the formation of anonymized groups with low information loss, through an efficient linear-time heuristic. We show experimentally, using real-life data sets, that all our methods clearly outperform existing state of the art. Among the proposed techniques, NN-search yields superior data utility compared to the band matrix transformation, but incurs higher computational overhead. The data transformation based on Gray code sorting performs best in terms of both data utility and execution time. © 2006 IEEE.

  19. Probabilistic Anonymity and Admissible Schedulers

    CERN Document Server

    Garcia, Flavio D; Sokolova, Ana

    2007-01-01

    When studying safety properties of (formal) protocol models, it is customary to view the scheduler as an adversary: an entity trying to falsify the safety property. We show that in the context of security protocols, and in particular of anonymizing protocols, this gives the adversary too much power; for instance, the contents of encrypted messages and internal computations by the parties should be considered invisible to the adversary. We restrict the class of schedulers to a class of admissible schedulers which better model adversarial behaviour. These admissible schedulers base their decision solely on the past behaviour of the system that is visible to the adversary. Using this, we propose a definition of anonymity: for all admissible schedulers the identity of the users and the observations of the adversary are independent stochastic variables. We also develop a proof technique for typical cases that can be used to proof anonymity: a system is anonymous if it is possible to `exchange' the behaviour of two...

  20. On the Utility of Anonymized Flow Traces for Anomaly Detection

    CERN Document Server

    Burkhart, Martin; May, Martin

    2008-01-01

    The sharing of network traces is an important prerequisite for the development and evaluation of efficient anomaly detection mechanisms. Unfortunately, privacy concerns and data protection laws prevent network operators from sharing these data. Anonymization is a promising solution in this context; however, it is unclear if the sanitization of data preserves the traffic characteristics or introduces artifacts that may falsify traffic analysis results. In this paper, we examine the utility of anonymized flow traces for anomaly detection. We quantitatively evaluate the impact of IP address anonymization, namely variations of permutation and truncation, on the detectability of large-scale anomalies. Specifically, we analyze three weeks of un-sampled and non-anonymized network traces from a medium-sized backbone network. We find that all anonymization techniques, except prefix-preserving permutation, degrade the utility of data for anomaly detection. We show that the degree of degradation depends to a large exten...

  1. Alcohol & drug abuse: Dual Diagnosis Anonymous of Oregon.

    Science.gov (United States)

    Monica, Corbett; Nikkel, Robert E; Drake, Robert E

    2010-08-01

    Many people with addictions report that support from peer groups fosters recovery. For people with co-occurring mental illnesses, dual-diagnosis peer support groups are considered helpful, but they are often unavailable. Recently, Dual Diagnosis Anonymous peer support groups have spread widely throughout Oregon as a complement to integrated dual diagnosis treatments. This column describes Dual Diagnosis Anonymous and its rapid implementation in Oregon.

  2. Constructions for Anonymous Secret Sharing Schemes Using Combinatorial Designs

    Institute of Scientific and Technical Information of China (English)

    Ying-pu Deng; Li-feng Guo; Mu-lan Liu

    2007-01-01

    In an anonymous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold which shares. In this paper some constructions of anonymous secret sharing schemes with 2 thresholds by using combinatorial designs are given. Let υ(t, ω, q) denote the minimum size of the set of shares of a perfect anonymous (t, ω) threshold secret sharing scheme with q secrets. In this paper we prove that υ(t, ω, q) = Θ(q) if t and ω are fixed and that the lower bound of the size of the set of shares in [4] is not optimal under certain condition.

  3. Access to fracture risk assessment by FRAX and linked National Osteoporosis Guideline Group (NOGG) guidance in the UK-an analysis of anonymous website activity.

    Science.gov (United States)

    McCloskey, E V; Johansson, H; Harvey, N C; Compston, J; Kanis, J A

    2017-01-01

    In the UK, fracture risk guidance is provided by the National Osteoporosis Guideline Group (NOGG). NOGG usage showed widespread access through direct web-based linkage to FRAX. The facilitated interaction between fracture risk assessment and clinical guidelines could usefully be adopted in other countries.

  4. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  5. Anonymous electronic trading versus floor trading

    OpenAIRE

    Franke, Günter; Hess, Dieter

    1995-01-01

    This paper compares the attractiveness of floor trading and anonymous electronic trading systems. It is argued that in times of low information intensity the insight into the order book of the electronic trading system provides more valuable information than floor trading, but in times of high information intensity the reverse is true. Thus, the electronic system's market share in trading activity should decline in times of high information intensity. This hypothesis is tested by data on BUND...

  6. Papers

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle

    The chapters in this Volume 7 of a series of PAPERS are based on papers published in the period 2004 - 2008 authored/co-authored by Palle Thoft-Christensen......The chapters in this Volume 7 of a series of PAPERS are based on papers published in the period 2004 - 2008 authored/co-authored by Palle Thoft-Christensen...

  7. Papers

    DEFF Research Database (Denmark)

    Thoft-Christensen, Palle

    The chapters in this Volume 7 of a series of PAPERS are based on papers published in the period 2004 - 2008 authored/co-authored by Palle Thoft-Christensen......The chapters in this Volume 7 of a series of PAPERS are based on papers published in the period 2004 - 2008 authored/co-authored by Palle Thoft-Christensen...

  8. Anonymous authenticated communications

    Science.gov (United States)

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  9. An Internet Based Anonymous Electronic Cash System

    Directory of Open Access Journals (Sweden)

    Israt Jahan

    2015-04-01

    Full Text Available There is an increase activity in research to improve the current electronic payment system which is parallel with the progress of internet. Electronic cash system is a cryptographic payment system which offers anonymity during withdrawal and purchase. Electronic cash displays serial numbers which can be recorded to allow further tracing. Contrary to their physical counterparts, e-cash have an inherent limitation; they are easy to copy and reuse (double-spending. An observer is a tamper-resistant device, issued by the Internet bank, which is incorporated with the Internet user’s computer that prevents double-spending physically, i.e., the user has no access to her e-cash and therefore he cannot copy them. In this paper, we shall present an anonymous electronic cash scheme on the internet which incorporates tamper-resistant device with user-module.

  10. Anonymity And Accountability In Web Based Transactions

    Directory of Open Access Journals (Sweden)

    H.Jayasree

    2012-04-01

    Full Text Available Decreased privacy is an unavoidable consequence in the drive to make the world a more secure, safer place, according to some analysts. In the on-line world, the conflict between privacy and security manifests itself in a debate between anonymity and accountability. Balance between Anonymity and Accountability is a major concern in web based transactions. The protection of users’ privacy when performing web-based transactions is an important factor in the acceptance and use of Internet and web services. There is a tremendous improvement in the automation of the way we pay for goods and services by the variety and growth of electronic banking services available to the consumers. Hence there is a need for the ultimate structure of the new electronic transaction system that has a substantial impact on the personal privacy as well as on the nature and extent of criminal use of E- transactions. This paper presents an approach for such structure.

  11. A NEW ANONYMITY CONTROLLED E-CASH SCHEME

    Institute of Scientific and Technical Information of China (English)

    Zhang Fangguo; Wang Changjie; Wang Yumin

    2002-01-01

    E-cash is a type of very important electronic payment systems. The complete anonymity of E-cash can be used for criminal activities, so E-cash should be anonymity controlled.Moreover, Elliptic Curve Cryptography(ECC) has been regard as the mainstream of current public cryptography . In this paper, a new anonymity controlled E-cash scheme based on ECC for the first time and using a new technology-one-time key pairs digital signature is designed, and its security and efficiency are analyzed. In our scheme, the coin tracing and owner tracing can be implemented.

  12. Alcoholics Anonymous: cult or cure?

    Science.gov (United States)

    Vaillant, George E

    2005-06-01

    To discuss the mechanism of action, the efficacy and the safety of Alcoholics Anonymous (AA) in the treatment of alcoholism. The published works on effective treatments for alcoholism is briefly reviewed and a prospective multidisciplinary follow-up of recovery from alcoholism in two community cohorts of adolescent males followed from 1940 until the present day is reviewed. The suggested mechanism of action of AA is that it employs four factors widely shown to be effective in relapse prevention in addictions: external supervision, substitute dependency, new caring relationships and increased spirituality. In addition, AA serendipitously follows the principles of cognitive behaviour therapy in relapse prevention. Alcoholics Anonymous appears equal to or superior to conventional treatments for alcoholism, and the skepticism of some professionals regarding AA as a first rank treatment for alcoholism would appear to be unwarranted. Alcoholics Anonymous is probably without serious side-effects.

  13. Data Retention and Anonymity Services

    Science.gov (United States)

    Berthold, Stefan; Böhme, Rainer; Köpsell, Stefan

    The recently introduced legislation on data retention to aid prosecuting cyber-related crime in Europe also affects the achievable security of systems for anonymous communication on the Internet. We argue that data retention requires a review of existing security evaluations against a new class of realistic adversary models. In particular, we present theoretical results and first empirical evidence for intersection attacks by law enforcement authorities. The reference architecture for our study is the anonymity service AN.ON, from which we also collect empirical data. Our adversary model reflects an interpretation of the current implementation of the EC Directive on Data Retention in Germany.

  14. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key k which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: { Introducing and formally dening...

  15. How to Bootstrap Anonymous Communication

    DEFF Research Database (Denmark)

    Jakobsen, Sune K.; Orlandi, Claudio

    2015-01-01

    formal study in this direction. To solve this problem, we introduce the concept of anonymous steganography: think of a leaker Lea who wants to leak a large document to Joe the journalist. Using anonymous steganography Lea can embed this document in innocent looking communication on some popular website...... (such as cat videos on YouTube or funny memes on 9GAG). Then Lea provides Joe with a short key $k$ which, when applied to the entire website, recovers the document while hiding the identity of Lea among the large number of users of the website. Our contributions include: - Introducing and formally...

  16. satisfies probabilistic k-anonymity criterion

    Directory of Open Access Journals (Sweden)

    Anna Oganian

    2017-04-01

    Full Text Available Before releasing databases which contain sensitive information about individuals, data publishers must apply Statistical Disclosure Limitation (SDL methods to them, in order to avoid disclosure of sensitive information on any identifiable data subject. SDL methods often consist of masking or synthesizing the original data records in such a way as to minimize the risk of disclosure of the sensitive information while providing data users with accurate information about the population of interest. In this paper we propose a new scheme for disclosure limitation, based on the idea of local synthesis of data. Our approach is predicated on model-based clustering. The proposed method satisfies the requirements of k-anonymity; in particular we use a variant of the k-anonymity privacy model, namely probabilistic k-anonymity, by incorporating constraints on cluster cardinality. Regarding data utility, for continuous attributes, we exactly preserve means and covariances of the original data, while approximately preserving higher-order moments and analyses on subdomains (defined by clusters and cluster combinations. For both continuous and categorical data, our experiments with medical data sets show that, from the point of view of data utility, local synthesis compares very favorably with other methods of disclosure limitation including the sequential regression approach for synthetic data generation.

  17. Universally composable anonymous Hash certification model

    Institute of Scientific and Technical Information of China (English)

    ZHANG Fan; MA JianFeng; SangJae MOON

    2007-01-01

    Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore,inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives.

  18. Unraveling an Old Cloak: k-anonymity for Location Privacy

    OpenAIRE

    Shokri, Reza; Troncoso, Carmela; Diaz, Claudia; Freudiger, Julien; Hubaux, Jean-Pierre

    2010-01-01

    There is a rich collection of literature that aims at protecting the privacy of users querying location-based services. One of the most popular location privacy techniques consists in cloaking users' locations such that k users appear as potential senders of a query, thus achieving k-anonymity. This paper analyzes the effectiveness of k-anonymity approaches for protecting location privacy in the presence of various types of adversaries. The unraveling of the scheme unfolds the inconsistency b...

  19. New Project in Huacheng Paper of Guangxi State Farms Sugar Group Laid the Foundation Stone

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ The foundation-stone laying ceremony of 200,000 t/y culture paper project in Huacheng Paper, a member of Guangxi State Farms Sugar Group, was held in Laibin, Guangxi Zhuang Autonomous Region, on October 18, 2009.

  20. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  1. Anonymous Boh avatud kunsti maastikul / Raivo Kelomees

    Index Scriptorium Estoniae

    Kelomees, Raivo, 1960-

    2010-01-01

    Anonymous Bohi näitus Tartu Kunstimajas, avatud 30. juulini 2010. Anonymous Boh on koos Non Grataga läbi viinud performance´id Euroopas, Ameerikas ja Aasias. Anonymous Bohi vastused oma näituse ja loominguga seotud küsimustele

  2. A review of Alcoholics Anonymous/ Narcotics Anonymous programs for teens.

    Science.gov (United States)

    Sussman, Steve

    2010-03-01

    The investigation of the applicability of Alcoholics Anonymous/Narcotics Anonymous (AA/NA) for teens has only been a subject of empirical research investigation since the early 1990s. In the present review, the author describes teen involvement in AA/NA programming, provides an exhaustive review of the outcomes of 19 studies that used an AA/NA model as part of their formal teen substance abuse treatment programs, and provides data on the effects of AA/NA attendance on abstinence at follow-up, on which youth tend to become involved in AA/NA, and on mediation of the benefits of AA/NA participation. In addition, the author suggests the reasons for somewhat limited participation by teens in more informal, community-based 12-step meetings, and makes suggestions for maximizing participation at meetings in the community. The author concludes that AA/ NA participation is a valuable modality of substance abuse treatment for teens and that much can be done to increase teen participation, though more research is needed.

  3. 75 FR 66795 - International Paper, Pineville Mill, Industrial Packaging Group, Pineville, LA; Notice of...

    Science.gov (United States)

    2010-10-29

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF LABOR Employment and Training Administration International Paper, Pineville Mill, Industrial Packaging Group, Pineville, LA; Notice of Affirmative Determination Regarding Application for Reconsideration By...

  4. Student Feedback, Anonymity, Observable Change and Course Barometers.

    Science.gov (United States)

    Jones, David

    A Course Barometer is a method for addressing the loss of informal feedback in a distance education setting. Originally proposed and used at the University of Trollhattan Uddevella this paper describes how the idea of a course barometer has been adopted by Central Queensland University. The paper suggests connections between anonymity, observable…

  5. Key papers by the Working Group on Energy. Hauptvortraege des Arbeitskreises Energie; 56. Physikertagung Berlin

    Energy Technology Data Exchange (ETDEWEB)

    Unger, H. (ed.) (Bochum Univ. (Germany))

    1992-01-01

    The eight key papers given by the Working Group on Energy at the 56 th conference of physicists in Berlin, 30th March to 3rd April 1992, focussed on issues of future energy supply, while using polluting fuels at a reduced rate. Each of the papers was abstracted separately. (BWI)

  6. Preparation of Novel Derivatives Containing Bi-Perfluorooctane-Sulfonamide Groups and Their Surface Properties on Paper

    Institute of Scientific and Technical Information of China (English)

    XIE Kong-liang; SHI Ya-qi; WU Zhong-jie

    2007-01-01

    Novel derivatives containing bi-perfluorooctane-sulfonamide group were designed and synthesized. The19FNMR, FTIR were used to characterize derivativesstructures. The compounds were applied to paper for oil-repellency. The results show that treated paper hadexcellent oil-repellency at very low concentration of bi-perfluorooctane-sulfonamide derivatives. When novelcompounds, polyvinyl alcohol(PVA) and oxidized starchwere applied together as coat sizing, the oxidized starch andPVA did not affect the oil repellency properties of paper.

  7. Radical Reeducation: Alcoholics Anonymous as a Model in Adult Education.

    Science.gov (United States)

    Crossman, Lenard H.

    1980-01-01

    The peer self-help group approach used by Alcoholics Anonymous can be a model for other types of adult learning. The group's power, solidarity, experience sharing, and values clarification can provide positive social and educational experiences to others such as the chronically unemployed, illiterate adults, and high school dropouts. (SK)

  8. Authority and Hierarchy within Anonymous Internet Relay Chat Networks

    Directory of Open Access Journals (Sweden)

    Stewart Kenton Bertram

    2015-09-01

    Full Text Available 'The protest group Anonymous has emerged as one of the most significant social movements of recent years, announcing their arrival as a globally recognized brand with regular disruptive cyber attacks and the leak of large volumes of sensitive data. Despite the obvious significance of Anonymous, to date, little academic research has been focused on what role hierarchy and internal authority play (if any within the group. Bespoke software was used to structure over 5000 examples of IRC log files, so that a base line descriptive statistical picture could be drawn, as well as a more granular enumeration of the privileges associated with individual users.'

  9. Complete Bipartite Anonymity for Location Privacy

    Institute of Scientific and Technical Information of China (English)

    董恺; 顾涛; 陶先平; 吕建

    2014-01-01

    Users are vulnerable to privacy risks when providing their location information to location-based services (LBS). Existing work sacrifices the quality of LBS by degrading spatial and temporal accuracy for ensuring user privacy. In this paper, we propose a novel approach, Complete Bipartite Anonymity (CBA), aiming to achieve both user privacy and quality of service. The theoretical basis of CBA is that: if the bipartite graph of k nearby users’ paths can be transformed into a complete bipartite graph, then these users achieve k-anonymity since the set of “end points connecting to a specific start point in a graph”is an equivalence class. To achieve CBA, we design a Collaborative Path Confusion (CPC) protocol which enables nearby users to discover and authenticate each other without knowing their real identities or accurate locations, predict the encounter location using users’ moving pattern information, and generate fake traces obfuscating the real ones. We evaluate CBA using a real-world dataset, and compare its privacy performance with existing path confusion approach. The results show that CBA enhances location privacy by increasing the chance for a user confusing his/her path with others by 4 to 16 times in low user density areas. We also demonstrate that CBA is secure under the trace identification attack.

  10. Persona: Network Layer Anonymity and Accountability for Next Generation Internet

    Science.gov (United States)

    Mallios, Yannis; Modi, Sudeep; Agarwala, Aditya; Johns, Christina

    Individual privacy has become a major concern, due to the intrusive nature of the services and websites that collect increasing amounts of private information. One of the notions that can lead towards privacy protection is that of anonymity. Unfortunately, anonymity can also be maliciously exploited by attackers to hide their actions and identity. Thus some sort of accountability is also required. The current Internet has failed to provide both properties, as anonymity techniques are difficult to fully deploy and thus are easily attacked, while the Internet provides limited level of accountability. The Next Generation Internet (NGI) provides us with the opportunity to examine how these conflicting properties could be efficiently applied and thus protect users’ privacy while holding malicious users accountable. In this paper we present the design of a scheme, called Persona that can provide anonymity and accountability in the network layer of NGI. More specifically, our design requirements are to combine these two conflicting desires in a stateless manner within routers. Persona allows users to choose different levels of anonymity, while it allows the discovery of malicious nodes.

  11. Octopus: A Secure and Anonymous DHT Lookup

    CERN Document Server

    Wang, Qiyan

    2012-01-01

    Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup mechanism achieving both security and anonymity, heretofore an open problem. We present Octopus, a novel DHT lookup which provides strong guarantees for both security and anonymity. Octopus uses attacker identification mechanisms to discover and remove malicious nodes, severely limiting an adversary's ability to carry out active attacks, and splits lookup queries over separate anonymous paths and introduces dummy queries to achieve high levels of anonymity. We analyze the security of Octopus by developing an event-based simulator to show that the attacker discovery mechanisms can rapidly identify malicious nodes with low error rate. We calculate the anonymity of Octopus using probabilistic modeling and show that Octopus can achieve near-optimal anonymity. We evaluate ...

  12. Impact of Knowledge on Election Time in Anonymous Networks

    OpenAIRE

    Dieudonné, Yoann; Pelc, Andrzej

    2016-01-01

    Leader election is one of the basic problems in distributed computing. For anonymous networks, the task of leader election is formulated as follows: every node v of the network must output a simple path, which is coded as a sequence of port numbers, such that all these paths end at a common node, the leader. In this paper, we study deterministic leader election in arbitrary anonymous networks. It is well known that leader election is impossible in some networks, regardless of the allocated am...

  13. Evaluation of Anonymized ONS Queries

    CERN Document Server

    Garcia-Alfaro, Joaquin; Kranakis, Evangelos

    2009-01-01

    Electronic Product Code (EPC) is the basis of a pervasive infrastructure for the automatic identification of objects on supply chain applications (e.g., pharmaceutical or military applications). This infrastructure relies on the use of the (1) Radio Frequency Identification (RFID) technology to tag objects in motion and (2) distributed services providing information about objects via the Internet. A lookup service, called the Object Name Service (ONS) and based on the use of the Domain Name System (DNS), can be publicly accessed by EPC applications looking for information associated with tagged objects. Privacy issues may affect corporate infrastructures based on EPC technologies if their lookup service is not properly protected. A possible solution to mitigate these issues is the use of online anonymity. We present an evaluation experiment that compares the of use of Tor (The second generation Onion Router) on a global ONS/DNS setup, with respect to benefits, limitations, and latency.

  14. Papers from the NSU Summer session of 2014 - study group 3

    DEFF Research Database (Denmark)

    Rendtorff, Jacob Dahl

    2014-01-01

    In this special issue we present the conference papers by the study group “Crisis and Crisis Scenarios: Normativity, Possibilities and Dilemmas” at the 2014 NSU Summer Session, held between 24th July and 31st July 2014 in Sauðárkrókur, Northern Iceland.......In this special issue we present the conference papers by the study group “Crisis and Crisis Scenarios: Normativity, Possibilities and Dilemmas” at the 2014 NSU Summer Session, held between 24th July and 31st July 2014 in Sauðárkrókur, Northern Iceland....

  15. Application of Steganography for Anonymity through the Internet

    CERN Document Server

    Bahi, Jacques M; Friot, Nicolas; Guyeux, Christophe

    2012-01-01

    In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too. To guarantee such an anonymity, it should be possible to set up a secret communication channel into a web page, being both secure and robust. To achieve this goal, we propose an information hiding scheme being stego-secure, which is the highest level of security in a well defined and studied category of attacks called "watermark-only attack". This category of attacks is the best context to study steganography-based anonymity through the Internet. The steganalysis of our steganographic process is also studied in order to show it security in a real test framework.

  16. Collecting substance use data with an anonymous mailed survey.

    Science.gov (United States)

    Trinkoff, A M; Storr, C L

    1997-10-25

    Because mailed surveys minimize personal contact, they are useful for collecting sensitive data on substance use, as long as the problems of achieving adequate response rates can be conquered. To address these issues, we report on an anonymous mailed survey of substance use with a 78% response rate, including data collection and survey methods. Analysis of sociodemographic effects on responding found certain groups required additional contacts. Substance use estimates were not affected by non-response bias, suggesting that anonymous mailed surveys can be a feasible means of collecting data on substance use.

  17. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    van Drie, A.; Ganzevoort, R.R.; Spiering, M.

    2014-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria o

  18. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    van Drie, A.; Ganzevoort, R.R.; Spiering, M.

    2014-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria o

  19. Anonymous pastoral care for problems pertaining to sexuality

    NARCIS (Netherlands)

    A. van Drie; R.R. Ganzevoort; M. Spiering

    2013-01-01

    Anonymous pastoral care is one of the options for help in problems pertaining to sexuality. This paper explores the topics they seek help for, the religious aspects involved, and the relation between the normativity of their church tradition on the one hand and sexual and spiritual health criteria o

  20. Anonymously Productive and Socially Engaged While Learning at Work

    Science.gov (United States)

    Magni, Luca

    2016-01-01

    Many concurrent variables appear to influence people when they interact anonymously, either face-to-face (F2F) or in computer-mediated communications (CMC).This paper presents the results of a small exploratory research, conducted in a medical company in Italy, to investigate how the use of pseudonyms influences CMC behaviours. The study involved…

  1. Practical anonymity hiding in plain sight online

    CERN Document Server

    Loshin, Peter

    2013-01-01

    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be l

  2. Design of Anonymous Attribute Authentication Mechanism

    Science.gov (United States)

    Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki

    Privacy remains an issue for IT services. Users are concerned that their history of service use may be traceable since each user is assigned a single identifier as a means of authentication.In this paper, we propose a perfectly anonymous attribute authentication scheme that is both unidentifiable and untraceable. Then, we present the evaluation results of a prototype system using a PC and mobile phone with the scheme. The proposed scheme employs a self-blindable certificate that a user can change randomly; thus the certificate is modified for each authentication, and the authentication scheme is unidentifiable and untraceable. Furthermore, our scheme can revoke self-blindable certificates without leaks of confidential private information and check the revocation status without online access.

  3. Understanding Responsive Web Design in Higher Education. ECAR Working Group Paper

    Science.gov (United States)

    Bollens, Eric; Rocchio, Rosemary A.; Peterson, Jill Eleanor; Pollack, Brett; Tirpak, Lori; Ward, Christopher Matthew

    2014-01-01

    This paper is a publication of the EDUCAUSE Center for Analysis and Research (ECAR) Mobile Strategy and Application Development (MSAD) Working Group. In higher education, nearly every user interaction that takes place on a desktop or laptop browser is also attempted using phones, tablets, watches, and more. As students, faculty, and staff…

  4. Research Data Storage: A Framework for Success. ECAR Working Group Paper

    Science.gov (United States)

    Blair, Douglas; Dawson, Barbara E.; Fary, Michael; Hillegas, Curtis W.; Hopkins, Brian W.; Lyons, Yolanda; McCullough, Heather; McMullen, Donald F.; Owen, Kim; Ratliff, Mark; Williams, Harry

    2014-01-01

    The EDUCAUSE Center for Analysis and Research Data Management Working Group (ECAR-DM) has created a framework for research data storage as an aid for higher education institutions establishing and evaluating their institution's research data storage efforts. This paper describes areas for consideration and suggests graduated criteria to assist in…

  5. A Comparative Study of Collaborative Learning in "Paper Scribbles" and "Group Scribbles"

    Science.gov (United States)

    Hao, Chen Fang

    2010-01-01

    "Paper Scribbles" (PS) consisting of markers, vanguard sheets and 3M "Post-It" notes, is a pedagogical tool to harness collective intelligence of groups for collaborative learning in the classroom. Borrowing the key features of PS and yet avoiding some of their physical limitations, a computer-based tool called "Group…

  6. Big Data in the Campus Landscape: Basic Infrastructure Support. ECAR Working Group Paper

    Science.gov (United States)

    Almes, Guy T.; Zottola, Ralph J.

    2014-01-01

    This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…

  7. Big Data in the Campus Landscape: Security and Privacy. ECAR Working Group Paper

    Science.gov (United States)

    Barnett, William; Corn, Mike; Hillegas, Curt; Wada, Kent

    2015-01-01

    This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…

  8. Big Data in the Campus Landscape: Curation. ECAR Working Group Paper

    Science.gov (United States)

    Lynch, Clifford A.

    2015-01-01

    This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…

  9. Understanding Responsive Web Design in Higher Education. ECAR Working Group Paper

    Science.gov (United States)

    Bollens, Eric; Rocchio, Rosemary A.; Peterson, Jill Eleanor; Pollack, Brett; Tirpak, Lori; Ward, Christopher Matthew

    2014-01-01

    This paper is a publication of the EDUCAUSE Center for Analysis and Research (ECAR) Mobile Strategy and Application Development (MSAD) Working Group. In higher education, nearly every user interaction that takes place on a desktop or laptop browser is also attempted using phones, tablets, watches, and more. As students, faculty, and staff…

  10. Big Data in the Campus Landscape: Basic Infrastructure Support. ECAR Working Group Paper

    Science.gov (United States)

    Almes, Guy T.; Zottola, Ralph J.

    2014-01-01

    This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…

  11. Big Data in the Campus Landscape: Curation. ECAR Working Group Paper

    Science.gov (United States)

    Lynch, Clifford A.

    2015-01-01

    This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…

  12. Big Data in the Campus Landscape: Security and Privacy. ECAR Working Group Paper

    Science.gov (United States)

    Barnett, William; Corn, Mike; Hillegas, Curt; Wada, Kent

    2015-01-01

    This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…

  13. ANONYMOUS OFF-LINE ELECTRONIC PAYMENT SYSTEM WITH MULTIPLE BANKS

    Institute of Scientific and Technical Information of China (English)

    Liang Jian; Ao Qingyun; Chen Ying

    2001-01-01

    This letter presents an anonymous off-line electronic payment model with multiple issuing-banks and gives an implementation scheme based on the discrete logarithm problem and the random oracle model. Comparing with previous works, the proposed scheme benefits from no involvement of customer group authority and its security depends on the known difficulty of resolving general discrete logarithm problem.

  14. Effects of Help, Anonymity, and Privacy on Children's Academic Expectations.

    Science.gov (United States)

    Bird, Lisa

    This study examined the effect of three aspects of the testing context--physical privacy, anonymity, and offers of help from a tester--on children's expectations. Performance of 96 11-year-old boys and girls on a pictorial recall memory task in a simulated test was evaluated. The subjects were divided into eight different groups varying on the…

  15. The Role of Anonymity in Peer Assessment

    Science.gov (United States)

    Li, Lan

    2017-01-01

    This quasi-experimental study aimed to examine the impact of anonymity and training (an alternative strategy when anonymity was unattainable) on students' performance and perceptions in formative peer assessment. The training in this study focused on educating students to understand and appreciate formative peer assessment. A sample of 77 students…

  16. Is it OK to be an Anonymous?

    NARCIS (Netherlands)

    Serracino Inglott, P.

    2013-01-01

    Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterio

  17. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    A receiver-anonymous channel allows a sender to send a message to a receiver without an adversary learning for whom the message is intended. Wireless broadcast channels naturally provide receiver anonymity, as does multi-casting one message to a receiver population containing the intended receive...

  18. Anonymity in Classroom Voting and Debating

    Science.gov (United States)

    Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie

    2011-01-01

    The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…

  19. Anonymous-address-resolution model

    Institute of Scientific and Technical Information of China (English)

    Guang-jia SONG; Zhen-zhou JI

    2016-01-01

    Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditional ARPs (address-resolution and neighbor-discovery protocols) do not consider the existence of malicious nodes, which reveals destination addresses in the resolution process. Thus, these traditional protocols allow malicious nodes to easily carry out attacks, such as man-in-the-middle attack and denial-of-service attack. To overcome these weaknesses, we propose an anonymous-address-resolution (AS-AR) protocol. AS-AR does not publicize the destination address in the address-resolution process and hides the IP and MAC addresses of the source node. The malicious node cannot obtain the addresses of the destination and the node which initiates the address resolution; thus, it cannot attack. Analyses and experiments show that AS-AR has a higher security level than existing security methods, such as secure-neighbor discovery.

  20. On Enhancing Data Utility in K-Anonymization for Data without Hierarchical Taxonomies

    Directory of Open Access Journals (Sweden)

    Mohammad Rasool Sarrafi Aghdam

    2015-05-01

    Full Text Available K-anonymity is the model that is widely used to protect the privacy of individuals in publishing micro-data. It could be defined as clustering with constrain of minimum k tuples in each group. K-anonymity cuts down the linking confidence between sensitive information and specific individual by the ration of 1/k. However, the accuracy of the data in k-anonymous dataset decreases due to information loss. Moreover, most of the current approaches are for numerical attributes or in case of categorical attributes they require extra information such as attribute hierarchical taxonomies which often do not exist. In this paper we propose a new model, based on clustering, defining the distance between tuples including numerical and categorical attributes which does not require extra information and present the SpatialDistance (SD heuristic algorithm. Comparisons of experimental results on real datasets between SD algorithm and existing well-known algorithms show that SD performs the best and offers much higher data utility and reduces the information loss significantly.

  1. Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

    DEFF Research Database (Denmark)

    Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni

    2010-01-01

    To avoid the risk of long-term storage of secrets on a portable device, an online credential system supports the roaming user in retrieving securely at various locations his private key and other material to generate anonymous signatures. The protocol proposed here allows a roaming mobile user...... to access anonymously services such as whistle blowing and net-counselling. Our approach: (1) allows a mobile user, remembering a short password, to anonymously and securely retrieve the credentials necessary for his anonymous communication without assuming a pre-established anonymous channel...

  2. A Generic Framework for Anonymous Authentication in Mobile Networks

    Institute of Scientific and Technical Information of China (English)

    Jing Xu; Wen-Tao Zhu

    2013-01-01

    Designing an anonymous user authentication scheme in global mobility networks is a non-trivial task because wireless networks are susceptible to attacks and mobile devices powered by batteries have limited communication,processing and storage capabilities.In this paper,we present a generic construction that converts any existing secure password authentication scheme based on a smart card into an anonymous authentication scheme for roaming services.The security proof of our construction can be derived from the underlying password authentication scheme employing the same assumptions.Compared with the original password authentication scheme,the transformed scheme does not sacrifice the authentication efficiency,and additionally,an agreed session key can be securely established between an anonymous mobile user and the foreign agent in charge of the network being visited.Furthermore,we present an instantiation of the proposed generic construction.The performance analysis shows that compared with other related anonymous authentication schemes,our instantiation is more efficient.

  3. Role Engagement and Anonymity in Synchronous Online Role Play

    Directory of Open Access Journals (Sweden)

    Sarah Cornelius

    2011-06-01

    Full Text Available Role play activities provide opportunities for learners to adopt unfamiliar roles, engage in interactions with others, and get involved in realistic tasks. They are often recommended to foster the development of soft skills and a wider perspective of the world. Such activities are widely used as an online teaching approach, with examples ranging from the simple use of email to the employment of virtual worlds and Web 2.0 technologies.This paper provides a case study of a role play activity which employs real-time anonymous discussion forums and aims to improve our understanding of effective role play and the impact of anonymity. This role play has been effective in educating learners about different perspectives on the issue of Quality in Further Education. The context and implementation of the role play are outlined, and the learners’ interactions and experiences are explored using an investigative analysis of discussion transcripts and semi-structured interviews with participants. The findings suggest that role engagement and anonymity are important components for success in synchronous online role play. Evidence is presented that provides an insight into the factors which encourage role engagement, including prior experiences and contributions from peers. The impact of anonymity is also explored since many participants did not regard the study environment as real and attempted to identify their peers.

  4. Adolescents' participation in Alcoholics Anonymous and Narcotics Anonymous: review, implications and future directions.

    Science.gov (United States)

    Kelly, John F; Myers, Mark G

    2007-09-01

    Youth treatment programs frequently employ 12-Step concepts and encourage participation in Alcoholics Anonymous (AA) and Narcotics Anonymous (NA). Since AA/NA groups are easily accessible at no charge and provide flexible support at times of high relapse risk they hold promise as a treatment adjunct in an increasingly cost-constricting economic climate. Yet, due to concerns related to adolescents' developmental status, skepticism exists regarding the utility of AA/NA for youth. This review evaluates the empirical evidence in this regard, identifies and discusses knowledge gaps, and recommends areas for future research. Searches were conducted in PsychINFO, Medline, relevant literature and by personal correspondence. Findings suggest youth may benefit from AA/NA participation following treatment, but conclusions are limited by four important factors: (1) a small number of studies; (2) no studies with outpatients; (3) existing evidence is solely observational; and (4) only partial measurement of the 12-Step construct. While surveys of adolescent SUD treatment programs indicate widespread clinical interest and application of adult-derived 12-Step approaches this level of enthusiasm has not been reflected in the research community. Qualitative research is needed to improve our understanding of youth-specific AA/NA barriers, and efficacy, comparative effectiveness, and process studies are still needed to inform clinical practice guidelines for youth providers.

  5. Anonymous Agencies, Backstreet Businesses and Covert Collectives

    DEFF Research Database (Denmark)

    Krause Hansen, Hans; Schoeneborn, Dennis

    2015-01-01

    Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381......Book review of: Anonymous Agencies, Backstreet Businesses and Covert Collectives: rethinking Organizations in the 21st Century, C. R. Scott. Stanford, CA: Stanford University Press, 2013. 272 pp. £45.90. ISBN 9780804781381...

  6. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    Directory of Open Access Journals (Sweden)

    Balázs Bodó

    2014-11-01

    Full Text Available This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs. Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of online political activism. Through the short summary of the ad-hoc vigilante group Anonymous, this article describes hacktivism 1.0 as electronic civil disobedience conducted by outsiders. Through the analysis of Wikileaks, the anonymous whistleblowing website, it describes how strong PETs enable the development of hacktivism 2.0, where the source of threat is shifted from outsiders to insiders. Insiders have access to documents with which power can be exposed, and who, by using PETs, can anonymously engage in political action. We also describe the emergence of a third generation of hacktivists who use PETs to disengage and create their own autonomous spaces rather than to engage with power through anonymous whistleblowing.

  7. About group digital signatures

    Directory of Open Access Journals (Sweden)

    Adriana Cristina Enache

    2012-09-01

    Full Text Available

    Group signatures try to combine security (no framing, no cheating and privacy(anonymity, unlinkability.A group digital signature is a digital signature with enhanced privacy features that allows members of a given group to anonymously sign messages on behalf of the group, producing a group signature. However, in the case of dispute the identity of the signature's originator can be revealed by a designated entity (group manager. The present paper describes the main concepts about group signatures, along with a brief state of the art and shows a personal cryptographic library implemented in Java that includes two group signatures.

  8. Concurrent Engineering Working Group White Paper Distributed Collaborative Design: The Next Step in Aerospace Concurrent Engineering

    Science.gov (United States)

    Hihn, Jairus; Chattopadhyay, Debarati; Karpati, Gabriel; McGuire, Melissa; Panek, John; Warfield, Keith; Borden, Chester

    2011-01-01

    As aerospace missions grow larger and more technically complex in the face of ever tighter budgets, it will become increasingly important to use concurrent engineering methods in the development of early conceptual designs because of their ability to facilitate rapid assessments and trades of performance, cost and schedule. To successfully accomplish these complex missions with limited funding, it is essential to effectively leverage the strengths of individuals and teams across government, industry, academia, and international agencies by increased cooperation between organizations. As a result, the existing concurrent engineering teams will need to increasingly engage in distributed collaborative concurrent design. The purpose of this white paper is to identify a near-term vision for the future of distributed collaborative concurrent engineering design for aerospace missions as well as discuss the challenges to achieving that vision. The white paper also documents the advantages of creating a working group to investigate how to engage the expertise of different teams in joint design sessions while enabling organizations to maintain their organizations competitive advantage.

  9. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    OpenAIRE

    Tomas A. Lipinski

    2002-01-01

    This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has alte...

  10. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  11. Secure Web Transaction with Anonymous Mobile Agent over Internet

    Institute of Scientific and Technical Information of China (English)

    WANG ChangJie(王常杰); ZHANG FangGuo(张方国); WANG YuMin(王育民)

    2003-01-01

    A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, a new secure anonymous mobile agent scheme is proposed for the prevention of agent tempering without compromising the mobility or autonomy of the agent. In the scheme, a mobile agent can produce valid signature on website's bid (it means to transact a contact with the web site) on behalf of its customer, without revealing the customer's real private key. In addition, the anonymity of the customer is also achieved when its agent transacts with the websites. Furthermore, the customer who issues a malicious agent or denies the transaction can be identified and detected by Agent Management Center (AMC). Therefore, the scheme is practical in the future electronic commerce over Internet.

  12. How Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) Work: Cross-Disciplinary Perspectives.

    Science.gov (United States)

    Krentzman, Amy R; Robinson, Elizabeth A R; Moore, Barbara C; Kelly, John F; Laudet, Alexandre B; White, William L; Zemore, Sarah E; Kurtz, Ernest; Strobbe, Stephen

    2010-12-01

    Evidence from multiple lines of research supports the effectiveness and practical importance of Alcoholics Anonymous and Narcotics Anonymous. Conference presenters discussed the relationship between 12-Step participation and abstinence among various populations, including adolescents, women, and urban drug users. Insight from the arts and humanities placed empirical findings in a holistic context.

  13. Privacy preserving data anonymization of spontaneous ADE reporting system dataset.

    Science.gov (United States)

    Lin, Wen-Yang; Yang, Duen-Chuan; Wang, Jie-Teng

    2016-07-18

    To facilitate long-term safety surveillance of marketing drugs, many spontaneously reporting systems (SRSs) of ADR events have been established world-wide. Since the data collected by SRSs contain sensitive personal health information that should be protected to prevent the identification of individuals, it procures the issue of privacy preserving data publishing (PPDP), that is, how to sanitize (anonymize) raw data before publishing. Although much work has been done on PPDP, very few studies have focused on protecting privacy of SRS data and none of the anonymization methods is favorable for SRS datasets, due to which contain some characteristics such as rare events, multiple individual records, and multi-valued sensitive attributes. We propose a new privacy model called MS(k, θ (*) )-bounding for protecting published spontaneous ADE reporting data from privacy attacks. Our model has the flexibility of varying privacy thresholds, i.e., θ (*) , for different sensitive values and takes the characteristics of SRS data into consideration. We also propose an anonymization algorithm for sanitizing the raw data to meet the requirements specified through the proposed model. Our algorithm adopts a greedy-based clustering strategy to group the records into clusters, conforming to an innovative anonymization metric aiming to minimize the privacy risk as well as maintain the data utility for ADR detection. Empirical study was conducted using FAERS dataset from 2004Q1 to 2011Q4. We compared our model with four prevailing methods, including k-anonymity, (X, Y)-anonymity, Multi-sensitive l-diversity, and (α, k)-anonymity, evaluated via two measures, Danger Ratio (DR) and Information Loss (IL), and considered three different scenarios of threshold setting for θ (*) , including uniform setting, level-wise setting and frequency-based setting. We also conducted experiments to inspect the impact of anonymized data on the strengths of discovered ADR signals. With all three

  14. Desensitization in delayed drug hypersensitivity reactions -- an EAACI position paper of the Drug Allergy Interest Group.

    Science.gov (United States)

    Scherer, K; Brockow, K; Aberer, W; Gooi, J H C; Demoly, P; Romano, A; Schnyder, B; Whitaker, P; Cernadas, J S R; Bircher, A J

    2013-07-01

    Drug hypersensitivity may deprive patients of drug therapy, and occasionally no effective alternative treatment is available. Successful desensitization has been well documented in delayed drug hypersensitivity reactions. In certain situations, such as sulfonamide hypersensitivity in HIV-positive patients or hypersensitivity to antibiotics in patients with cystic fibrosis, published success rates reach 80%, and this procedure appears helpful for the patient management. A state of clinical tolerance may be achieved by the administration of increasing doses of the previously offending drug. However, in most cases, a pre-existent sensitization has not been proven by positive skin tests. Successful re-administration may have occurred in nonsensitized patients. A better understanding of the underlying mechanisms of desensitization is needed. Currently, desensitization in delayed hypersensitivity reactions is restricted to mild, uncomplicated exanthems and fixed drug eruptions. The published success rates vary depending on clinical manifestations, drugs, and applied protocols. Slower protocols tend to be more effective than rush protocols; however, underreporting of unsuccessful procedures is very probable. The decision to desensitize a patient must always be made on an individual basis, balancing risks and benefits. This paper reviews the literature and presents the expert experience of the Drug Hypersensitivity Interest Group of the European Academy of Allergy and Clinical Immunology. © 2013 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  15. Alcoholics Anonymous and Family Therapy.

    Science.gov (United States)

    Davis, Donald I.

    1980-01-01

    Change in an alcoholics' drinking behavior is often brought about by change in the alcoholic's family members. Focuses on ways in which family therapy and the A.A. self-help groups add to, rather than detract from, one another. (Author)

  16. Authentication Without Identification using Anonymous Credential System

    CERN Document Server

    Damodaram, A

    2009-01-01

    Privacy and security are often intertwined. For example, identity theft is rampant because we have become accustomed to authentication by identification. To obtain some service, we provide enough information about our identity for an unscrupulous person to steal it (for example, we give our credit card number to Amazon.com). One of the consequences is that many people avoid e-commerce entirely due to privacy and security concerns. The solution is to perform authentication without identification. In fact, all on-line actions should be as anonymous as possible, for this is the only way to guarantee security for the overall system. A credential system is a system in which users can obtain credentials from organizations and demonstrate possession of these credentials. Such a system is anonymous when transactions carried out by the same user cannot be linked. An anonymous credential system is of significant practical relevance because it is the best means of providing privacy for users.

  17. Is it OK to be an Anonymous?

    Directory of Open Access Journals (Sweden)

    Philip Serracino-Inglott

    2013-12-01

    Full Text Available Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition of vigilantism that includes reprobative punishment rather than violence as a key element, Anonymous are vigilantes. Many of its Ops can be justified in view of the mismatch between formal norm enforcement practice and Internet natives’ experience of it. Anons are more like eco-warriors than terrorists. While their actions are contentious, their force is framed in a vision of common good that is not unreasonable. Engaging with online deviants is shown to be a productive way of identifying the weaknesses in concepts underpinning moral evaluation of Internet-enabled phenomena.

  18. Community engagement research and dual diagnosis anonymous.

    Science.gov (United States)

    Roush, Sean; Monica, Corbett; Pavlovich, Danny; Drake, Robert E

    2015-01-01

    Community engagement research is widely discussed but rarely implemented. This article describes the implementation of a community engagement research project on Dual Diagnosis Anonymous, a rapidly spreading peer support program in Oregon for people with co-occurring mental illness and substance use disorders. After three years of discussions, overcoming barriers, and involving several institutions, this grassroots research project has been implemented and is expanding. Active participants in Dual Diagnosis Anonymous inspired and instructed policy makers, professionals, and students. Community engagement research requires frontline participants, community members, and professional collaborators to overcome multiple barriers with persistence and steadfastness. Building trust, collaboration, and structures for community engagement research takes time and a community effort.

  19. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  20. Reversible Anonymization of DICOM Images using Cryptography and Digital Watermarking

    Directory of Open Access Journals (Sweden)

    Lhoussain ELFADIL

    2012-04-01

    Full Text Available Digital Imaging and Communications in Medicine (DICOM is a standard for handling, storing, printing, and transmitting information in medical images. The DICOM file contains the image data and a number of attributes such as identified patient data (name, age, insurance ID card,…, and non-identified patient data (doctor’s interpretation, image type,…. Medical images serve not only for examination, but can also be used for research and education purposes. For research they are used to prevent illegal use of information; before authorizing researchers to use these images, the medical staff deletes all the data which would reveal the patient identity to prevent patient privacy. This manipulation is called anonymization. In this paper, we propose a reversible anonymization of DICOM images. Identifying patient data with image digest, computed by the well-known SHA-256 hash function, are encrypted using the proposed probabilistic public key crypto-system. After compressing the Least Significant Bit (LSB bitplan of the image using Hofmann coding algorithm, the encrypted data is inserted into a liberated zone of the LSB bitplan of the image. The proposed method allows researchers to use anonymous DICOM images and keep to authorized staff -if necessary- the possibility to return to the original image with all related patient data.

  1. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  2. AATCT: Anonymously Authenticated Transmission on the Cloud with Traceability

    Directory of Open Access Journals (Sweden)

    Maged Hamada Ibrahim

    2015-09-01

    Full Text Available In Cloud computing, anonymous authentication is an important service that must be available to users in the Cloud. Users have the right to remain anonymous as long as they behave honestly. However, in case a malicious behavior is detected, the system – under court order – must be able to trace the user to his clear identity. Most of the proposed authentication schemes for the Cloud are either password-based authentication schemes that are vulnerable to offline dictionary attacks, or biometric-based authentication schemes that take a long time of execution specially in case of high security requirements. In this paper, we propose an efficient and secure scheme to non-interactively authenticate the users on the Cloud to the remote servers while preserving their anonymity. In case of accusations, the registration authority is able to trace any user to his clear identity. We avoid using low entropy passwords or biometric mechanisms, instead, we employ pseudonym systems in our design. The computation complexity and storage requirements are efficient and suitable to be implemented on smart cards/devices. Our proposed scheme withstands challenging adversarial attacks such as, stolen databases attacks, databases insertion attacks, impersonation attacks, replay attacks and malicious users/servers collaboration attacks.

  3. An Analysis of Anonymity in the Bitcoin System

    CERN Document Server

    Reid, Fergal

    2011-01-01

    Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the oneto- many mapping between users and public-keys and associate information external to the system with the users. Bitcoin frustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approx...

  4. Probabilistic Adaptive Anonymous Authentication in Vehicular Networks

    Institute of Scientific and Technical Information of China (English)

    Yong Xi; Ke-Wei Sha; Wei-Song Shi; Loren Schwiebert; Tao Zhang

    2008-01-01

    Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on designing the media access and physical layer protocols.Privacy issues in vehicular systems have not been well addressed. We argue that privacy is a user-specific concept, and a good privacy protection mechanism should allow users to select the levels of privacy they wish to have. To address this requirement, we propose an adaptive anonymous authentication mechanism that can trade off the anonymity level with computational and communication overheads (resource usage). This mechanism, to our knowledge, is the first effort on adaptive anonymous authentication. The resources used by our protocol are few. A high traffic volume of 2000 vehicles per hour consumes about 60kbps bandwidth, which is less than one percent of the bandwidth of DSRC (Dedicated Short Range Communications). By using adaptive anonymity, the protocol response time can further be improved 2~4 times with lessthan 20% bandwidth overheads.

  5. Alcoholics Anonymous Meetings for Teaching Sociology.

    Science.gov (United States)

    Schwartz, T. P.

    1992-01-01

    Discusses using open Alcoholics Anonymous meetings for teaching sociology courses. Suggests that the meetings provide excellent case studies and can exemplify a variety of topics. Stresses that three conditions must be present: (1) easy access to meetings and high student interest; (2) meeting experience is integrated into course; and (3) student…

  6. Dissent in Numbers: Making Strong Anonymity Scale

    Science.gov (United States)

    2012-10-01

    transmit anonymously in each bit-time with- out colliding and yielding garbled output, an arbitration or scheduling mechanism is needed. Second, any misbe...http://www.nytimes.com/2010/05/ 14/technology/personaltech/14talk.html. [62] J. Wright, T. de Souza, and I. Brown. Fine-grained censorship mapping information sources, legality and ethics . In FOCI, Aug. 2011. 14

  7. The Anonymity vs. Utility Dilemma

    Science.gov (United States)

    Bezzi, Michele; Pazzaglia, Jean-Christophe

    The number, the type of users and their usage of the internet, computers and phones have evolved considerably, due to the emergence of the web 2.0, the decreasing cost of portable devices, the expansion of wired and wireless internet access and the digitalization of the main entertainment media. Protecting the assets of service and software providers has been the main driver for the development of security solutions in the past ten years. However, the users/customers/citizen rights have been too often neglected since the risk related to the wrong usage of personal related information was not considered by the other stakeholders. Today, the Right to Privacy is appearing on everyone’s radar and factors as regulations, increasing number of news stories on privacy breaches, brand damages, are forcing organizations to address user privacy as a priority. In this paper, we will briefly review the main business drivers behind the raising of privacy concerns, and outline some of the current technology solutions to address privacy requirements. Finally, we will describe some of the future challenges in the area of privacy.

  8. Resisting stigma, embracing solidarity: An ethnographic study of shopaholics anonymous

    Directory of Open Access Journals (Sweden)

    Rachel Demerling

    2011-03-01

    Full Text Available In recent years, an increased interest in the phenomenon of compulsive buying, which is better known as “shopaholism”, has occurred. This behaviour has been conceptualized as being an uncontrollable urge to purchase things which is pleasurable for an individual or relieves their distress and which results in negative consequences for that individual. This article examines the experiences of individuals within a Shopaholics Anonymous group to understand why individuals decide to join a support group and explore the dynamics of interaction among participants and how that shapes the outcome of their addiction.

  9. To Speak or Not to Speak: Developing Legal Standards for Anonymous Speech on the Internet

    Directory of Open Access Journals (Sweden)

    Tomas A. Lipinski

    2002-01-01

    Full Text Available This paper explores recent developments in the regulation of Internet speech, in specific, injurious or defamatory speech and the impact such speech has on the rights of anonymous speakers to remain anonymous as opposed to having their identity revealed to plaintiffs or other third parties. The paper proceeds in four sections.  First, a brief history of the legal attempts to regulate defamatory Internet speech in the United States is presented. As discussed below this regulation has altered the traditional legal paradigm of responsibility and as a result creates potential problems for the future of anonymous speech on the Internet.  As a result plaintiffs are no longer pursuing litigation against service providers but taking their dispute directly to the anonymous speaker. Second, several cases have arisen in the United States where plaintiffs have requested that the identity of an anonymous Internet speaker be revealed.  These cases are surveyed.  Third, the cases are analyzed in order to determine the factors that courts require to be present before the identity of an anonymous speaker will be revealed.  The release is typically accomplished by the enforcement of a discovery subpoena instigated by the party seeking the identity of the anonymous speaker. The factors courts have used are as follows: jurisdiction, good faith (both internal and external, necessity (basic and sometimes absolute, and at times proprietary interest. Finally, these factors are applied in three scenarios--e-commerce, education, and employment--to guide institutions when adopting policies that regulate when the identity of an anonymous speaker--a customer, a student or an employee--would be released as part of an internal initiative, but would nonetheless be consistent with developing legal standards.

  10. The Work Group on Early Childhood Briefing Paper Six: Funding Streams.

    Science.gov (United States)

    Wroblewski, Roberta A.; Bassler, Elissa J.

    Families undergo difficulties in trying to negotiate the labyrinth of early childhood services offered in Illinois. Because of the multiplicity of programs and scarce funding, many children and families do not receive the services they need. Coordination among programs and services is also limited. This paper offers background on how the…

  11. A MULTIPLE BALLOTS ELECTION SCHEME USING ANONYMOUS DISTRIBUTION

    Directory of Open Access Journals (Sweden)

    Manabu Okamoto

    2011-10-01

    Full Text Available Electronic voting is an important application for security protocols. Most existing voting schemes aredesigned for elections in which each voter has only one ballot. However, some elections permit voters tocast multiple ballots. In this paper, we present a new voting scheme in which each voter can havemultiple ballots, and can vote for multiple candidates. The proposed scheme allows the voter to simplypick their candidates and post a single encrypted message. Anonymous distribution of secret informationis used so that no one knows which information is being passed to whom.

  12. Academic freedom, public reactions, and anonymity.

    Science.gov (United States)

    Häyry, Matti

    2014-05-01

    Academic freedom can be defined as immunity against adverse reactions from the general public, designed to keep scholars unintimidated and productive even after they have published controversial ideas. Francesca Minerva claims that this notion of strict instrumental academic freedom is supported by Ronald Dworkin, and that anonymity would effectively defend the sphere of immunity implied by it. Against this, I argue that the idea defended by Minerva finds no support in the work by Dworkin referred to; that anonymity would not in most cases effectively protect the kind of immunity sought after; and that in some cases it would not even be desirable to protect scholars from public reactions to their controversial claims. © 2014 John Wiley & Sons Ltd.

  13. Remote Electronic Voting with Revocable Anonymity

    Science.gov (United States)

    Smart, Matt; Ritter, Eike

    We present a new remote, coercion-free electronic voting protocol which satisfies a number of properties previously considered contradictory. We introduce (and justify) the idea of revocable anonymity in electronic voting, on the grounds of it being a legal requirement in the United Kingdom, and show a method of proving the validity of a ballot to a verifier in zero knowledge, by extension of known two-candidate proofs.

  14. Structure Preserving Anonymization of Router Configuration Data

    Science.gov (United States)

    2009-04-01

    2009 IEEE Authorized licensed use limited to: Naval Postgraduate School. Downloaded on December 18, 2009 at 13:53 from IEEE Xplore . Restrictions apply... IEEE Xplore . Restrictions apply. MALTZ et al.: STRUCTURE PRESERVING ANONYMIZATION OF ROUTER CONFIGURATION DATA 351 1 hostname cr1.lax.foo.com 2 ! 3... IEEE Xplore . Restrictions apply. 352 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 3, APRIL 2009 lines 14 and 30 (255.255.255.252

  15. Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge

    CERN Document Server

    Narayanan, Arvind; Rubinstein, Benjamin I P

    2011-01-01

    This paper describes the winning entry to the IJCNN 2011 Social Network Challenge run by Kaggle.com. The goal of the contest was to promote research on real-world link prediction, and the dataset was a graph obtained by crawling the popular Flickr social photo sharing website, with user identities scrubbed. By de-anonymizing much of the competition test set using our own Flickr crawl, we were able to effectively game the competition. Our attack represents a new application of de-anonymization to gaming machine learning contests, suggesting changes in how future competitions should be run. We introduce a new simulated annealing-based weighted graph matching algorithm for the seeding step of de-anonymization. We also show how to combine de-anonymization with link prediction---the latter is required to achieve good performance on the portion of the test set not de-anonymized---for example by training the predictor on the de-anonymized portion of the test set, and combining probabilistic predictions from de-anony...

  16. An Enhanced Lightweight Anonymous Authentication Scheme for a Scalable Localization Roaming Service in Wireless Sensor Networks.

    Science.gov (United States)

    Chung, Youngseok; Choi, Seokjin; Lee, Youngsook; Park, Namje; Won, Dongho

    2016-10-07

    More security concerns and complicated requirements arise in wireless sensor networks than in wired networks, due to the vulnerability caused by their openness. To address this vulnerability, anonymous authentication is an essential security mechanism for preserving privacy and providing security. Over recent years, various anonymous authentication schemes have been proposed. Most of them reveal both strengths and weaknesses in terms of security and efficiency. Recently, Farash et al. proposed a lightweight anonymous authentication scheme in ubiquitous networks, which remedies the security faults of previous schemes. However, their scheme still suffers from certain weaknesses. In this paper, we prove that Farash et al.'s scheme fails to provide anonymity, authentication, or password replacement. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Considering the limited capability of sensor nodes, we utilize only low-cost functions, such as one-way hash functions and bit-wise exclusive-OR operations. The security and lightness of the proposed scheme mean that it can be applied to roaming service in localized domains of wireless sensor networks, to provide anonymous authentication of sensor nodes.

  17. Cardiometabolic risk in Canada: a detailed analysis and position paper by the cardiometabolic risk working group.

    Science.gov (United States)

    Leiter, Lawrence A; Fitchett, David H; Gilbert, Richard E; Gupta, Milan; Mancini, G B John; McFarlane, Philip A; Ross, Robert; Teoh, Hwee; Verma, Subodh; Anand, Sonia; Camelon, Kathryn; Chow, Chi-Ming; Cox, Jafna L; Després, Jean-Pierre; Genest, Jacques; Harris, Stewart B; Lau, David C W; Lewanczuk, Richard; Liu, Peter P; Lonn, Eva M; McPherson, Ruth; Poirier, Paul; Qaadri, Shafiq; Rabasa-Lhoret, Rémi; Rabkin, Simon W; Sharma, Arya M; Steele, Andrew W; Stone, James A; Tardif, Jean-Claude; Tobe, Sheldon; Ur, Ehud

    2011-01-01

    The concepts of "cardiometabolic risk," "metabolic syndrome," and "risk stratification" overlap and relate to the atherogenic process and development of type 2 diabetes. There is confusion about what these terms mean and how they can best be used to improve our understanding of cardiovascular disease treatment and prevention. With the objectives of clarifying these concepts and presenting practical strategies to identify and reduce cardiovascular risk in multiethnic patient populations, the Cardiometabolic Working Group reviewed the evidence related to emerging cardiovascular risk factors and Canadian guideline recommendations in order to present a detailed analysis and consolidated approach to the identification and management of cardiometabolic risk. The concepts related to cardiometabolic risk, pathophysiology, and strategies for identification and management (including health behaviours, pharmacotherapy, and surgery) in the multiethnic Canadian population are presented. "Global cardiometabolic risk" is proposed as an umbrella term for a comprehensive list of existing and emerging factors that predict cardiovascular disease and/or type 2 diabetes. Health behaviour interventions (weight loss, physical activity, diet, smoking cessation) in people identified at high cardiometabolic risk are of critical importance given the emerging crisis of obesity and the consequent epidemic of type 2 diabetes. Vascular protective measures (health behaviours for all patients and pharmacotherapy in appropriate patients) are essential to reduce cardiometabolic risk, and there is growing consensus that a multidisciplinary approach is needed to adequately address cardiometabolic risk factors. Health care professionals must also consider risk factors related to ethnicity in order to appropriately evaluate everyone in their diverse patient populations.

  18. Nonexposure Accurate Location K-Anonymity Algorithm in LBS

    Directory of Open Access Journals (Sweden)

    Jinying Jia

    2014-01-01

    Full Text Available This paper tackles location privacy protection in current location-based services (LBS where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. Location cloaking has been proposed and well studied to protect user privacy. It blurs the user’s accurate coordinate and replaces it with a well-shaped cloaked region. However, to obtain such an anonymous spatial region (ASR, nearly all existent cloaking algorithms require knowing the accurate locations of all users. Therefore, location cloaking without exposing the user’s accurate location to any party is urgently needed. In this paper, we present such two nonexposure accurate location cloaking algorithms. They are designed for K-anonymity, and cloaking is performed based on the identifications (IDs of the grid areas which were reported by all the users, instead of directly on their accurate coordinates. Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.

  19. Nonexposure accurate location K-anonymity algorithm in LBS.

    Science.gov (United States)

    Jia, Jinying; Zhang, Fengli

    2014-01-01

    This paper tackles location privacy protection in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. Location cloaking has been proposed and well studied to protect user privacy. It blurs the user's accurate coordinate and replaces it with a well-shaped cloaked region. However, to obtain such an anonymous spatial region (ASR), nearly all existent cloaking algorithms require knowing the accurate locations of all users. Therefore, location cloaking without exposing the user's accurate location to any party is urgently needed. In this paper, we present such two nonexposure accurate location cloaking algorithms. They are designed for K-anonymity, and cloaking is performed based on the identifications (IDs) of the grid areas which were reported by all the users, instead of directly on their accurate coordinates. Experimental results show that our algorithms are more secure than the existent cloaking algorithms, need not have all the users reporting their locations all the time, and can generate smaller ASR.

  20. Private anonymous fingerprinting for color images in the wavelet domain

    Science.gov (United States)

    Abdul, W.; Gaborit, P.; Carré, P.

    2010-01-01

    An online buyer of multimedia content does not want to reveal his identity or his choice of multimedia content whereas the seller or owner of the content does not want the buyer to further distribute the content illegally. To address these issues we present a new private anonymous fingerprinting protocol. It is based on superposed sending for communication security, group signature for anonymity and traceability and single database private information retrieval (PIR) to allow the user to get an element of the database without giving any information about the acquired element. In the presence of a semi-honest model, the protocol is implemented using a blind, wavelet based color image watermarking scheme. The main advantage of the proposed protocol is that both the user identity and the acquired database element are unknown to any third party and in the case of piracy, the pirate can be identified using the group signature scheme. The robustness of the watermarking scheme against Additive White Gaussian Noise is also shown.

  1. Griffith Edwards' rigorous sympathy with Alcoholics Anonymous.

    Science.gov (United States)

    Humphreys, Keith

    2015-07-01

    Griffith Edwards made empirical contributions early in his career to the literature on Alcoholics Anonymous (AA), but the attitude he adopted towards AA and other peer-led mutual help initiatives constitutes an even more important legacy. Unlike many treatment professionals who dismissed the value of AA or were threatened by its non-professional approach, Edwards was consistently respectful of the organization. However, he never became an uncritical booster of AA or overgeneralized what could be learnt from it. Future scholarly and clinical endeavors concerning addiction-related mutual help initiatives will benefit by continuing Edwards' tradition of 'rigorous sympathy'. © 2015 Society for the Study of Addiction.

  2. Repercusión social y análisis bioético del alcoholismo en pacientes del Grupo de Alcohólicos Anónimos de La Habana Social repercussion and bioethical analysis in patients from the Anonymous Alcoholic Group

    Directory of Open Access Journals (Sweden)

    Germán Brito Sosa

    2011-09-01

    observational, descriptive, longitudinal and prospective study was conducted. Informed consent was requested. The researches techniques used were of qualitative and quantitative types, as instrument it was used a questionnaire designed by authors and validated by psychologists allowed us to perform the bioethical assessment. Universe included 200 patients belong to Anonymous Alcoholic Group from Ciudad de La Habana province, 50 of them were care in the "Julio Trigo López": Hospital with the coordination and the cooperation of its seat, located in the Vedado , Plaza Municipality. Surveys were administered between January and December, 2007. RESULTS: The 100 % of patients consider that its way of drink is provoking difficulty with its health, its family, its neighbor's relationships and in its job; the 98 % have difficulties to control itself when drink. The time elapsed from the appearance of complications is of 73.5 % months, in the 17 % of years and in the 9.5 % of days. The 94 % considers that alcoholism is a disease. The 89.5 % of patients seen in the different health levels consider that they have been well treated. Total of the persons polled think that they are discriminated by society. CONCLUSIONS: The bioethical principles are infringed in a variable way in a group of alcoholic patients. Anonymous Alcoholics represent for patients involved of alcoholism an organization offering them support, hope and help them to maintain in abstinence

  3. A Remote User Authentication Scheme with Anonymity for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Soobok Shin

    2012-04-01

    Full Text Available With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.

  4. Browsing the Internet: good-bye anonymity!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Do you consider browsing the Internet to be your private business? When visiting random web-sites, how far do you assume you are anonymous? Would it matter to you that Google or Facebook can profile your browsing behaviour in order to better target you with advertisements? Did you notice that you already get targeted ads when you are logged on to Google or Facebook even if you are visiting completely different websites? If matters to you, note that browsing anonymously on the Internet is far from easy.   When you are connected to the Internet, you give away a variety of information: your PC’s IP address, some browser settings like language or screen size, and, probably, your login information. So how private is private? You might argue that your current IP address has been picked from a pool of addresses and therefore regularly changes, so it does not necessarily always pinpoint you. On the other hand, with the dawn of IPv6 there is no need any more for shared IP addresses as the...

  5. Agribusiness Group Paper

    Science.gov (United States)

    2002-11-21

    Research Council Infruitec-Nietvoorbij, Capetown , South Africa Agricultural Research Council - Roodeplaat, Elsenburg, South Africa AgriPAC...Consultores, Buenos Aires, Argentina Biotechnology Division, Dept of Economic Affairs, Dept of Agriculture and Tourism Western Cape, Capetown , South Africa...Bodega y Cavas de Weinert S.A., Buenos Aires, Argentina Fresh Produce Terminals, Capetown , South Africa Giraldi Dairy Farm, Chilcoy, Argentina Hartenberg

  6. Applying Stylometric Analysis Techniques to Counter Anonymity in Cyberspace

    Directory of Open Access Journals (Sweden)

    Jianwen Sun

    2012-02-01

    Full Text Available Due to the ubiquitous nature and anonymity abuses in cyberspace, it’s difficult to make criminal identity tracing in cybercrime investigation. Writeprint identification offers a valuable tool to counter anonymity by applying stylometric analysis technique to help identify individuals based on textual traces. In this study, a framework for online writeprint identification is proposed. Variable length character n-gram is used to represent the author’s writing style. The technique of IG seeded GA based feature selection for Ensemble (IGAE is also developed to build an identification model based on individual author level features. Several specific components for dealing with the individual feature set are integrated to improve the performance. The proposed feature and technique are evaluated on a real world data set encompassing reviews posted by 50 Amazon customers. The experimental results show the effectiveness of the proposed framework, with accuracy over 94% for 20 authors and over 80% for 50 ones. Compared with the baseline technique (Support Vector Machine, a higher performance is achieved by using IGAE, resulting in a 2% and 8% improvement over SVM for 20 and 50 authors respectively. Moreover, it has been shown that IGAE is more scalable in terms of the number of authors, than author group level based methods.

  7. Simultaneous forward and reverse ABO blood group typing using a paper-based device and barcode-like interpretation.

    Science.gov (United States)

    Songjaroen, Temsiri; Laiwattanapaisal, Wanida

    2016-05-19

    A new platform of a paper-based analytical device (PAD) for simultaneous forward and reverse ABO blood group typing has been reported. This platform can overcome the discrepancy results as influenced by the individual haematocrit. The test and the control of non-haemagglutination on each channel were performed in parallel. The PAD was fabricated by printing six parallel channels with wax onto Whatman No. 4 filter paper. An LF1 blood separation membrane was used for the separation of plasma from whole blood for reverse grouping. The blood group was identified by haemagglutination of the corresponding antigen-antibody. For forward grouping, Anti-A, -B and -A,B were treated on the test line of PAD, and inactivated Anti-A, -B and -A,B were immobilized on the control line. For reverse grouping, 30% standard A-cells, B- and O- were added to the test channel after plasma separation, and O-cells were used as a control. Then, 0.9% normal saline (NSS) containing 1% Tween-20 was bi-functionally used for dilution of the blood sample and elution of the non-agglutinated RBCs within the channels. The distance of agglutinated RBCs in each test line was compared with the distance of non-agglutinated RBCs in the parallel control line. The forward and reverse patterns of blood groups A, B, AB and O were a barcode-like chart in which the results can be visually analysed. The PAD has excellent reproducibility when 10 replications of the A, B, AB or O blood groups were performed. The results of both forward and reverse grouping were highly correlated with conventional methods compared with the slide method and tube method, respectively (n = 76). Thus, this ABO typing PAD holds great potential for future applications in blood typing point-of-care testing.

  8. 可追踪的匿名证书%The Traceable Anonymous Certificate

    Institute of Scientific and Technical Information of China (English)

    王兵

    2014-01-01

    This paper introduces the traceable anonymous certificate, and analyzes the proposed traceable anonymous certificate is⁃suing and tracing protocol in detail, the traceable anonymous certificate should possess two core characteristics: anonymity and non-repudiation, the two features ensure that users can prove the identity himself but without revealing his true identity, this certificate can be used to provide anonymous service in network application.%该文介绍了可追踪匿名证书,并对提出的可追踪匿名证书的发布和追踪协议进行了详细的分析,可追踪匿名证书应该具有匿名性和不可否认性两个核心特点,这两个特点保证了用户可以在不泄露自己的真实身份的情况下来证明用户的身份,这样的证书可以被用于需要提供匿名服务的网络应用中。

  9. Formal Security-Proved Mobile Anonymous Authentication Protocols with Credit-Based Chargeability and Controllable Privacy

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2016-06-01

    Full Text Available Smart mobile phones are widely popularized and advanced mobile communication services are provided increasingly often, such that ubiquitous computing environments will soon be a reality. However, there are many security threats to mobile networks and their impact on security is more serious than that in wireline networks owing to the features of wireless transmissions and the ubiquity property. The secret information which mobile users carry may be stolen by malicious entities. To guarantee the quality of advanced services, security and privacy would be important issues when users roam within various mobile networks. In this manuscript, an anonymous authentication scheme will be proposed to protect the security of the network system and the privacy of users. Not only does the proposed scheme provide mutual authentication between each user and the system, but also each user’s identity is kept secret against anyone else, including the system. Although the system anonymously authenticates the users, it can still generate correct bills to charge these anonymous users via a credit-based solution instead of debit-based ones. Furthermore, our protocols also achieve fair privacy which allows the judge to revoke the anonymity and trace the illegal users when they have misused the anonymity property, for example, if they have committed crimes. Finally, in this paper, we also carry out complete theoretical proofs on each claimed security property.

  10. A novel paper-based assay for the simultaneous determination of Rh typing and forward and reverse ABO blood groups.

    Science.gov (United States)

    Noiphung, Julaluk; Talalak, Kwanrutai; Hongwarittorrn, Irin; Pupinyo, Naricha; Thirabowonkitphithan, Pannawich; Laiwattanapaisal, Wanida

    2015-05-15

    We propose a new, paper-based analytical device (PAD) for blood typing that allows for the simultaneous determination of ABO and Rh blood groups on the same device. The device was successfully fabricated by using a combination of wax printing and wax dipping methods. A 1:2 blood dilution was used for forward grouping, whereas whole blood could be used for reverse grouping. A 30% cell suspension of A-cells or B-cells was used for haemagglutination on the reverse grouping side. The total assay time was 10 min. The ratio between the distance of red blood cell movement and plasma separation is the criterion for agglutination and indicates the presence of the corresponding antigen or antibody. The proposed PAD has excellent reproducibility in that the same blood groups, namely A, AB, and O, were reported by using different PADs that were fabricated on the same day (n=10). The accuracy for detecting blood group A (n=12), B (n=13), AB (n=9), O (n=14), and Rh (n=48) typing were 92%, 85%, 89%, 93%, and 96%, respectively, in comparison with the conventional slide test method. The haematocrit of the sample affects the accuracy of the results, and appropriate dilution is suggested before typing. In conclusion, this study proposes a novel method that is straightforward, time-saving, and inexpensive for the simultaneous determination of ABO and Rh blood groups, which is promising for use in developing countries. Copyright © 2015 Elsevier B.V. All rights reserved.

  11. 7-year trajectories of Alcoholics Anonymous attendance and associations with treatment.

    Science.gov (United States)

    Kaskutas, Lee Ann; Bond, Jason; Avalos, Lyndsay Ammon

    2009-12-01

    Although many members of Alcoholics Anonymous (AA) are introduced to AA during treatment, the relationship between treatment and AA attendance over time is unknown. This paper describes four latent classes of AA attendance among 586 dependent alcoholics interviewed by telephone 1, 3, 5 and 7 years after baseline, and models the relationship between treatment exposure and AA attendance in each class. There was a low AA group (averaging fewer than 5 meetings at most follow-ups), a medium AA group (about 50 meetings a year at each follow-up), a descending AA group (about 150 meetings year 1, then decreasing steeply), and a high AA group (about 200 meetings at 1 year, then decreasing gradually by year 7). Declines in meeting attendance were not always accompanied by decreases in abstinence. After accounting for the effect of time on AA attendance (i.e., the "ups-and-downs" that occur over time), treatment exposure was minimally related to AA attendance in all but the descending AA group, where it was negatively associated (p<0.001). Considering AA patterns over time highlights a different role for treatment in AA attendance than what is gleaned from analyses at single timepoints.

  12. Classification via Clustering for Anonymization Data

    Directory of Open Access Journals (Sweden)

    Sridhar Mandapati

    2014-02-01

    Full Text Available Due to the exponential growth of hardware technology particularly in the field of electronic data storage media and processing such data, has raised serious issues related in order to protect the individual privacy like ethical, philosophical and legal. Data mining techniques are employed to ensure the privacy. Privacy Preserving Data Mining (PPDM techniques aim at protecting the sensitive data and mining results. In this study, the different Clustering techniques via classification with and without anonymization data using mining tool WEKA is presented. The aim of this study is to investigate the performance of different clustering methods for the diabetic data set and to compare the efficiency of privacy preserving mining. The accuracy of classification via clustering is evaluated using K-means, Expectation-Maximization (EM and Density based clustering methods.

  13. Gregory Bateson, Alcoholics Anonymous, and stoicism.

    Science.gov (United States)

    Brundage, V

    1985-02-01

    In 1971 Gregory Bateson put forward an "entirely new epistemology," or view of the world, that he described as cybernetic. In a very influential article, which appeared in this journal, Bateson claimed that his cybernetic epistemology "coincides closely" with the epistemology of Alcoholics Anonymous (AA), for which he claimed "the only outstanding record of success" in the treatment of alcoholism (1971, p. 310). However, Bateson's discussion of AA dealt with only four of the Twelve Steps of AA's program. Although the epistemology of cybernetics and AA congrue in some respects, they contradict each other in many others. Common ground is found in the ancient philosophical tradition of Stoicism. In Stoicism the contradictions between the two are sources for an ethics and psychology of great power. Stoicism offers the cybernetic epistemologist a solid base for theory. It offers the clinician who deals with chemical dependency practical insights into the process of recovery.

  14. Employee Anonymous Online Dissent: Dynamics and Ethical Challenges for Employees, Targeted Organisations, Online Outlets and Audiences

    DEFF Research Database (Denmark)

    Ravazzani, Silvia; Mazzei, Alessandra

    2015-01-01

    ethical challenges that take into consideration the perspectives of employees, targeted organisations, online outlet administrators and audiences. The ethical challenge for employees is to disclose problems for organisational and societal changes in a safe context and supported by a large audience, while......This paper aims to enhance understanding of dissent expressive acts that employees voice via anonymous online public contexts. Based on literature on organisational dissent, anonymity and online disclosure, we first point out key dynamics of employee anonymous online dissent, and then present...... remaining accountable for them and avoiding emotion-focused and defensive disclosure. Targeted organisations need to prevent external disclosure while ensuring freedom of speech and employee privacy, and to respond effectively when overt criticism is found online. Other tensions concern online outlet...

  15. Anonymity and informed consent in artificial procreation: a report from Denmark

    DEFF Research Database (Denmark)

    Lebech, Anne Mette

    1997-01-01

    a problem concerning its application when dealing with people having a serious mental, social or even physical disability. Within the field of artificial procreation there are even more problems. Informed written consent is often demanded from anonymous donors of gametes in order to ensure their consent...... to the legal and moral consequences of their anonymity. The child resulting from the artificial procreation, on the contrary, cannot consent to, nor be informed before being conceived, of the secrecy laid on the identity of its genetic parents. Some countries resolve this problem by allowing the children, when...... be regarded as invalid. The paper will argue that a law ensuring the complete anonymity of the parents is disregarding the informed consent and the interests of the children resulting from artificial procreation, and is thus doing more damage to society than good....

  16. RSSI-Based User Centric Anonymization for Location Privacy in Vehicular Networks

    Science.gov (United States)

    Wei, Yu-Chih; Chen, Yi-Ming; Shan, Hwai-Ling

    In Vehicular Networks, for enhancing driving safety as well as supporting other applications, vehicles periodically broadcast safety messages with their precise position information to neighbors. However, these broadcast messages make it easy to track specific vehicles and will likely lead to compromise of personal privacy. Unfortunately, current location privacy enhancement methodologies in VANET, including Pseudonymization, K-anonymity, Random silent period, Mix-zones and path confusion, all suffer some shortcomings. In this paper, we propose a RSSI (Received Signal Strength Indicator)-based user centric anonymization model, which can significantly enhance the location privacy and at the same time ensure traffic safety. Simulations are performed to show the advantages of the proposed method. In comparison with traditional random silent period method, our method can increase at least 47% of anonymity in both simple and correlation tracking.

  17. Between control and hacker activism: the political actions of Anonymous Brasil.

    Science.gov (United States)

    Machado, Murilo Bansi

    2015-12-01

    This paper addresses the political actions of Anonymous, the principal expression of current hacker activism, arguing that hacktivism is a form of political resistance in control societies. To this end, it focuses on studying the Brazilian, hacktivist facet of the collective. In order to stress its political character, it scrutinizes the principal expressions of hacking in the literature. It describes motivations, methods and the ethics of its political actions, based on a comparative analysis of two operations carried out by Brazilian Anonymous adherents in 2012: #OpWeeksPayment and #OpGlobo. And it finishes by identifying four of its main forms of political engagement: promotion of anonymity; "evangelization;" the formation of distributed networks; and the fact that the collective carries out and facilitates several types of political actions.

  18. How To Break Anonymity of the Netflix Prize Dataset

    OpenAIRE

    Narayanan, Arvind; Shmatikov, Vitaly

    2006-01-01

    We present a new class of statistical de-anonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on. Our techniques are robust to perturbation in the data and tolerate some mistakes in the adversary's background knowledge. We apply our de-anonymization methodology to the Netflix Prize dataset, which contains anonymous movie ratings of 500,000 subscribers of Netflix, the world's largest online movie rental service. ...

  19. Design and Implement of the Anonymous Communications in the Mobile IP Networks%移动IP中通信匿名技术的设计与实现

    Institute of Scientific and Technical Information of China (English)

    康凯; 郭伟; 吴诗其

    2002-01-01

    One of the key problems in the mobile communication is the anonymous communication. The mobile userwants to hide his real identifying information to the visiting domain and the public network which he does not trust,and prevent from being tracked and located. In this paper, we have discoursed the anonymous communications in themobile IP, and presented a novel strategy of the dynamic address allocation and the routing with anonymity. The sug-gested method enables any identifying information can be carried over the anonymous and secure connections, andprovide end-to-end security. The implements of the mobile host and the mobile subnet are also presented.

  20. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...

  1. About group digital signatures

    National Research Council Canada - National Science Library

    Adriana Cristina Enache

    2012-01-01

    ...).A group digital signature is a digital signature with enhanced privacy features that allows members of a given group to anonymously sign messages on behalf of the group, producing a group signature...

  2. ANDaNA: Anonymous Named Data Networking Application

    CERN Document Server

    DiBenedetto, Steven; Tsudik, Gene; Uzun, Ersin

    2011-01-01

    Content-centric networking -- also known as information-centric networking (ICN) -- shifts emphasis from hosts and interfaces (as in today's Internet) to data. Named data becomes addressable and routable, while locations that currently store that data become irrelevant to applications. Named Data Networking (NDN) is a large collaborative research effort that exemplifies the content-centric approach to networking. NDN has some innate privacy-friendly features, such as lack of source and destination addresses on packets. However, as discussed in this paper, NDN architecture prompts some privacy concerns mainly stemming from the semantic richness of names. We examine privacy-relevant characteristics of NDN and present an initial attempt to achieve communication privacy. Specifically, we design an NDN add-on tool, called ANDaNA, that borrows a number of features from Tor. As we demonstrate via experiments, it provides comparable anonymity with lower relative overhead.

  3. [Representations of alcoholism in a former alcoholics' association: Alcoholics Anonymous].

    Science.gov (United States)

    Campos, Edemilson Antunes de

    2004-01-01

    This article is designed to review the representations of alcoholism provided by members of an association of former alcoholics, namely Alcoholics Anonymous (AA), based on partial results from a qualitative survey conducted in the Sapopemba group of AA in a neighborhood on the outskirts of the city of Sao Paulo, Brazil. The article thus analyzes alcoholism from an emic perspective, i.e., how it is conceived and managed by those who acknowledge themselves as being "sick as alcoholics", how they explain the sickness, how they experience it, and how they endeavor to overcome it. The purpose is to present AA and its treatment strategy and to highlight the link made by the association by conceiving of alcoholism as a physical, moral, and spiritual illness.

  4. Open and Anonymous Peer Review in a Digital Online Environment Compared in Academic Writing Context

    Science.gov (United States)

    Razi, Salim

    2016-01-01

    This study compares the impact of "open" and "anonymous" peer feedback as an adjunct to teacher-mediated feedback in a digital online environment utilising data gathered on an academic writing course at a Turkish university. Students were divided into two groups with similar writing proficiencies. Students peer reviewed papers…

  5. Counselling Problem Drinkers: The Realm of Specialists, Alcoholics Anonymous or Generic Counsellors?

    Science.gov (United States)

    Wheeler, Sue; Turner, Linda

    1997-01-01

    Investigated counselors' (N=94) attitudes in working with people with drinking problems and their opinions of Alcoholics Anonymous (AA). Results indicate that generic counselors did not feel competent working with these clients; feelings of competence increased with greater experience of the client group. Counselors knew of AA but understood…

  6. A Psychological Rationale in Support of the Alcoholics Anonymous' Concept of Fellowship.

    Science.gov (United States)

    Machell, David F.

    1992-01-01

    Develops a theoretical rationale in support of the concept of "fellowship," the healing cornerstone of Alcoholics Anonymous (AA). Reviews supporting literature from the areas of personality theory, group psychotherapy, alcoholism psychopathology, and alcoholism psychological treatment. Suggests a common premise and common ground of…

  7. RadioNet3 Study Group White Paper on: The Future Organisation and Coordination of Radio Astronomy in Europe

    CERN Document Server

    Garrett, M A; Garrington, S T; Klöckner, H-R; van Langevelde, H; Mantovani, F; Russel, A; Schuster, K; Vermeulen, R C; Zensus, A

    2016-01-01

    The QueSERA Study Group (QSG) have been tasked by the RadioNet Board to produce a White Paper on the future organisation and coordination of radio astronomy in Europe. This White Paper describes the options discussed by the QSG, and our conclusions on how to move forward. We propose, that as a first step, RadioNet-work, be established as an entity that persists between EC contracts, and that takes responsibility for preparing or coordinating responses to EC opportunities specific to the field of radio astronomy research infrastructures. RadioNet-work should provide a safety net that ensures that cooperation and collaboration between the various radio astronomy partners in Europe is maintained with or without EC funding.

  8. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  9. 电子投票匿名性分析%Anonymity Analysis of Electronic Voting

    Institute of Scientific and Technical Information of China (English)

    黄福人; 屈玉贵

    2011-01-01

    电子投票公布计票结果会影响投票者的匿名性.针对该问题,定义匿名性为投票选择的不确定度,利用熵衡量投票系统的投票者匿名性,比较计票结果公布前后投票者的匿名性变化.分析结果表明,投票规模越小,投票者匿名性在结果公布后受到的损失越大;在小规模电子投票情况下,计票结果应该选择只公布获胜者,不公布具体得票数,以减少投票者匿名的损失.%The disclosure of the number of votes can compromise the voters' anonymity of the electronic voting. Aiming at this problem, this paper defines anonymity by using the uncertainty of the voting choices and measures the anonymity of the whole voting system by entropy. It compares the anonymity after the release of the voting results with that before releasing the voting results. Analysis result shows that the smaller the voting scale is, the more the voters' anonymity loses. In the design of small-scale electronic-voting scheme, releasing the winner instead of the number of votes that candidates gained decreases the loss of anonymity.

  10. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.

    Science.gov (United States)

    Bushnag, Anas; Abuzneid, Abdelshakour; Mahmood, Ausif

    2016-06-27

    Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP). The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP) employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD), Dummy Adaptive Distribution (DAD) and Controlled Dummy Adaptive Distribution (CAD) were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network). Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  11. Focus on Methodology: Beyond paper and pencil: Conducting computer-assisted data collection with adolescents in group settings.

    Science.gov (United States)

    Raffaelli, Marcela; Armstrong, Jessica; Tran, Steve P; Griffith, Aisha N; Walker, Kathrin; Gutierrez, Vanessa

    2016-06-01

    Computer-assisted data collection offers advantages over traditional paper and pencil measures; however, little guidance is available regarding the logistics of conducting computer-assisted data collection with adolescents in group settings. To address this gap, we draw on our experiences conducting a multi-site longitudinal study of adolescent development. Structured questionnaires programmed on laptop computers using Audio Computer Assisted Self-Interviewing (ACASI) were administered to groups of adolescents in community-based and afterschool programs. Although implementing ACASI required additional work before entering the field, we benefited from reduced data processing time, high data quality, and high levels of youth motivation. Preliminary findings from an ethnically diverse sample of 265 youth indicate favorable perceptions of using ACASI. Using our experiences as a case study, we provide recommendations on selecting an appropriate data collection device (including hardware and software), preparing and testing the ACASI, conducting data collection in the field, and managing data.

  12. An Applet-based Anonymous Distributed Computing System.

    Science.gov (United States)

    Finkel, David; Wills, Craig E.; Ciaraldi, Michael J.; Amorin, Kevin; Covati, Adam; Lee, Michael

    2001-01-01

    Defines anonymous distributed computing systems and focuses on the specifics of a Java, applet-based approach for large-scale, anonymous, distributed computing on the Internet. Explains the possibility of a large number of computers participating in a single computation and describes a test of the functionality of the system. (Author/LRW)

  13. Strategies for improving patient recruitment to focus groups in primary care: a case study reflective paper using an analytical framework

    Directory of Open Access Journals (Sweden)

    Tilling Michelle

    2009-09-01

    Full Text Available Abstract Background Recruiting to primary care studies is complex. With the current drive to increase numbers of patients involved in primary care studies, we need to know more about successful recruitment approaches. There is limited evidence on recruitment to focus group studies, particularly when no natural grouping exists and where participants do not regularly meet. The aim of this paper is to reflect on recruitment to a focus group study comparing the methods used with existing evidence using a resource for research recruitment, PROSPeR (Planning Recruitment Options: Strategies for Primary Care. Methods The focus group formed part of modelling a complex intervention in primary care in the Resources for Effective Sleep Treatment (REST study. Despite a considered approach at the design stage, there were a number of difficulties with recruitment. The recruitment strategy and subsequent revisions are detailed. Results The researchers' modifications to recruitment, justifications and evidence from the literature in support of them are presented. Contrary evidence is used to analyse why some aspects were unsuccessful and evidence is used to suggest improvements. Recruitment to focus group studies should be considered in two distinct phases; getting potential participants to contact the researcher, and converting those contacts into attendance. The difficulty of recruitment in primary care is underemphasised in the literature especially where people do not regularly come together, typified by this case study of patients with sleep problems. Conclusion We recommend training GPs and nurses to recruit patients during consultations. Multiple recruitment methods should be employed from the outset and the need to build topic related non-financial incentives into the group meeting should be considered. Recruitment should be monitored regularly with barriers addressed iteratively as a study progresses.

  14. Recipient screening in IVF: First data from women undergoing anonymous oocyte donation in Dublin

    LENUS (Irish Health Repository)

    Walsh, Anthony PH

    2011-04-20

    Abstract Background Guidelines for safe gamete donation have emphasised donor screening, although none exist specifically for testing oocyte recipients. Pre-treatment assessment of anonymous donor oocyte IVF treatment in Ireland must comply with the European Union Tissues and Cells Directive (Directive 2004\\/23\\/EC). To determine the effectiveness of this Directive when applied to anonymous oocyte recipients in IVF, we reviewed data derived from selected screening tests performed in this clinical setting. Methods Data from tests conducted at baseline for all women enrolling as recipients (n = 225) in the anonymous oocyte donor IVF programme at an urban IVF referral centre during a 24-month period were analysed. Patient age at programme entry and clinical pregnancy rate were also tabulated. All recipients had at least one prior negative test for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis performed by her GP or other primary care provider before reproductive endocrinology consultation. Results Mean (±SD) age for donor egg IVF recipients was 40.7 ± 4.2 yrs. No baseline positive chlamydia, gonorrhoea or syphilis screening results were identified among recipients for anonymous oocyte donation IVF during the assessment interval. Mean pregnancy rate (per embryo transfer) in this group was 50.5%. Conclusion When tests for HIV, Hepatitis B\\/C, chlamydia, gonorrhoea and syphilis already have been confirmed to be negative before starting the anonymous donor oocyte IVF sequence, additional (repeat) testing on the recipient contributes no new clinical information that would influence treatment in this setting. Patient safety does not appear to be enhanced by application of Directive 2004\\/23\\/EC to recipients of anonymous donor oocyte IVF treatment. Given the absence of evidence to quantify risk, this practice is difficult to justify when applied to this low-risk population.

  15. Alcoholics anonymous effectiveness: faith meets science.

    Science.gov (United States)

    Kaskutas, Lee Ann

    2009-01-01

    Research on the effectiveness of Alcoholics Anonymous (AA) is controversial and subject to widely divergent interpretations. The goal of this article is to provide a focused review of the literature on AA effectiveness that will allow readers to judge the evidence effectiveness of AA for themselves. The review organizes the research on AA effectiveness according to six criterion required for establishing causation: (1) magnitude of effect; (2) dose response effect; (3) consistent effect; (4) temporally accurate effects; (5) specific effects; (6) plausibility. The evidence for criteria 1- 4 and 6 is strong: rates of abstinence are about twice as high among those who attend AA (criteria 1, magnitude); higher levels of attendance are related to higher rates of abstinence (criteria 2, dose-response); these relationships are found for different samples and follow-up periods (criteria 3, consistency); prior AA attendance is predictive of subsequent abstinence (criteria 4, temporal); and mechanisms of action predicted by theories of behavior change are present in AA (criteria 6, plausibility). However, rigorous experimental evidence establishing the specificity of an effect for AA or Twelve Step Facilitation/TSF (criteria 5) is mixed, with 2 trials finding a positive effect for AA, 1 trial finding a negative effect for AA, and 1 trial finding a null effect. Studies addressing specificity using statistical approaches have had two contradictory findings, and two that reported significant effects for AA after adjusting for potential confounders such as motivation to change.

  16. “We are Anonymous.” Anonymity in the Public Sphere – Challenges of Free and Open Communication

    Directory of Open Access Journals (Sweden)

    Saskia Sell

    2013-05-01

    Full Text Available Anonymity, the stealth mode of public communication, challenges different actors who deal with freedom of communication issues in their day to day life – be it professional journalists, information and communication scientists, technicians or political activists. This article aims to deliver theoretical background on the concept of anonymity on the macro-level, as well as to shed light on how different communicators deal with anonymity on the micro-level. Based on the example of the Anonymous movement, communicative actions are put in relation to media technological artifacts and their surrounding media environment with a focus on journalistic practice and public response to the phenomenon. The analysis concludes with the need for a preservation of options for anonymous public communication as a dimension of freedom of communication after carefully considering both the advantages and the potential risks connected to that mode of private-public communication.

  17. Means to facilitate Smart Grid. Issue paper - working group 2; Denmark. Smart Grid Network; Virkemidler til fremme af Smart Grid. Issue paper, arbejdsgruppe 2

    Energy Technology Data Exchange (ETDEWEB)

    Hjortkjaer, A.-G. (DONG Energy, Fredericia (Denmark)); Madsen, Claus (ABB A/S, Skovlunde (Denmark)); Tang, J. (Dansk Fjernvarme, Kolding (Denmark)) (and others)

    2011-07-01

    The Smart Grid Network was established in 2010 by the Danish climate and energy minister tasked with developing recommendations for future actions and initiatives that make it possible to handle up to 50% electricity from wind energy in the power system in 2020. The task of working group 2 of the Smart Grid Network is stated as: ''The group will, building on existing surveys and analyses propose what new tools are needed in the years to 2020 to ensure intelligence in both transmission and distribution systems for the power grid in Denmark. Moreover, how public and private investments can be effectively brought into play. Among the measures envisaged are e.g. tariffs and charges''. The working group 2 identifies four areas that will promote the development of a smart grid. The proposed tools and means are related to: 1) Price signals to customers that reflect the value of consumption flexibility; 2) New economic regulation of network utilities' smart grid activities; 3) Taxes that support an effective electrification; 4) Effective activation of distributed storage and production. (LN)

  18. Business potentials related to smart grid. Issue paper - working group 5; Denmark. Smart Grid Network; Erhvervspotentialer i Smart Grid. Issue paper, arbejdsgruppe 5

    Energy Technology Data Exchange (ETDEWEB)

    Hauge, B. (Villawatt, Taastrup (Denmark)); Mortensen, E. (DI Energibranchen, Copenhagen (Denmark)); Lyck, L.L. (DONG Energy A/S, Fredericia (Denmark)); Hillingsoee Stubberup, M. (Udenrigsministeriet. Invest in Denmark, Copenhagen (Denmark)); Baadsgaard Trolle, M. (Dansk Energi, Frederiksberg (Denmark)); Lomholt Svensson, N. (Klima- og Energiministeriet, Copenhagen (Denmark)); Roemer Kofod, P. (ABB A/S, Skovlunde); Hauch, R. (IBM A/S, Kgs. Lyngby (Denmark)); Cajus, S. (DI ITEK, Copenhagen (Denmark)); Stroem, S. (Vindmoelleindustrien, Frederiksberg (Denmark))

    2011-07-01

    The Smart Grid Network was established in 2010 by the Danish climate and energy minister tasked with developing recommendations for future actions and initiatives that make it possible to handle up to 50% electricity from wind energy in the power system in 2020. The task of working group 5 provides an immediate assessment of business potential at the sector level based on the recommendations contained in the reports of the working groups 1-4. The working group has only drawn preliminary conclusions regarding business opportunities that may arise as a result of the other network groups' recommendations. In particular three areas, Denmark has at present the potential to strengthen the Danish business potential: 1) System Solutions. The intelligent energy system is more about interaction between different system components than the components themselves. Here Denmark belongs to the world elite, including the extensive use of cogeneration and wind power; 2) Market Solutions. The Nordic electricity trading system ''Nord Pool'' is the most efficient market-based electricity system in the world, and Denmark has thus a good basis for creating market-based solutions for future power systems; 3) Large-scale demonstration environments creates opportunities for companies to test and refine their products, solutions and services. In Denmark, Energinet.dk and utility companies have opened up for companies to use the Danish network for testing solutions to real customers. More foreign players thus regard Denmark as an attractive market to test new technologies, partly because the Danish market is homogeneous and clear, and partly because Denmark in relation to the power system has a robust and well-managed network. Finally, the high share of fluctuating energy production helps to clarify the need for a flexible and intelligent power system. It is this combination of strengths that make Denmark a unique market for international companies to locate their

  19. Extended K-Anonymity Model for Privacy Preserving on Micro Data

    Directory of Open Access Journals (Sweden)

    Masoud Rahimi

    2015-11-01

    Full Text Available Today, information collectors, particularly statistical organizations, are faced with two conflicting issues. On one hand, according to their natural responsibilities and the increasing demand for the collected data, they are committed to propagate the information more extensively and with higher quality and on the other hand, due to the public concern about the privacy of personal information and the legal responsibility of these organizations in protecting the private information of their users, they should guarantee that while providing all the information to the population, the privacy is reasonably preserved. This issue becomes more crucial when the datasets published by data mining methods are at risk of attribute and identity disclosure attacks. In order to overcome this problem, several approaches, called p-sensitive k-anonymity, p+-sensitive k-anonymity, and (p, α-sensitive k-anonymity, were proposed. The drawbacks of these methods include the inability to protect micro datasets against attribute disclosure and the high value of the distortion ratio. In order to eliminate these drawbacks, this paper proposes an algorithm that fully protects the propagated micro data against identity and attribute disclosure and significantly reduces the distortion ratio during the anonymity process.

  20. HOP: Achieving Efficient Anonymity in MANETs by Combining HIP, OLSR, and Pseudonyms

    Directory of Open Access Journals (Sweden)

    Campos Javier

    2011-01-01

    Full Text Available Offering secure and anonymous communications in mobile ad hoc networking environments is essential to achieve confidence and privacy, thus promoting widespread adoption of this kind of networks. In addition, some minimum performance levels must be achieved for any solution to be practical and become widely adopted. In this paper, we propose and implement HOP, a novel solution based on cryptographic Host Identity Protocol (HIP that offers security and user-level anonymity in MANET environments while maintaining good performance levels. In particular, we introduce enhancements to the authentication process to achieve Host Identity Tag (HIT relationship anonymity, along with source/destination HIT anonymity when combined with multihoming. Afterward we detail how we integrate our improved version of HIP with the OLSR routing protocol to achieve efficient support for pseudonyms. We implemented our proposal in an experimental testbed, and the results obtained show that performance levels achieved are quite good, and that the integration with OLSR is achieved with a low overhead.

  1. Unison as a Self-Stabilizing Wave Stream Algorithm in Asynchronous Anonymous Networks

    CERN Document Server

    Boulinier, Christian

    2007-01-01

    How to pass from local to global scales in anonymous networks? How to organize a selfstabilizing propagation of information with feedback. From the Angluin impossibility results, we cannot elect a leader in a general anonymous network. Thus, it is impossible to build a rooted spanning tree. Many problems can only be solved by probabilistic methods. In this paper we show how to use Unison to design a self-stabilizing barrier synchronization in an anonymous network. We show that the commuication structure of this barrier synchronization designs a self-stabilizing wave-stream, or pipelining wave, in anonymous networks. We introduce two variants of Wave: the strong waves and the wavelets. A strong wave can be used to solve the idempotent r-operator parametrized computation problem. A wavelet deals with k-distance computation. We show how to use Unison to design a self-stabilizing wave stream, a self-stabilizing strong wave stream and a self-stabilizing wavelet stream.

  2. Anonymous Search Histories Featuring Personalized Advertisement - Balancing Privacy with Economic Interests

    Directory of Open Access Journals (Sweden)

    Thorben Burghardt

    2011-04-01

    Full Text Available Search engines are key to finding information on the web. Search presently is free for users financed by targeted advertisement. Today, the current search terms determine the ad placement. In the near future, search-engine providers will make use of detailed user profiles for better ad placement. This puts user privacy at risk. Anonymizing search histories, which is a solution in principle, gives way to a trade-off between privacy and the usability of the data for ad placement. This paper studies this tradeoff systematically. To this end, we implement an algorithm for the anonymization of search histories which is flexible regarding the target function. It can retain frequent terms or terms where corresponding ads are clicked with a high probability, keep up the number of users it can derive interests for, etc. We quantify the usefulness of the anonymized log for ad placement in a broad way, e.g., by estimating the number of ad clicks or of ad impressions, based on marketing data from Yahoo! As a result, anonymized search logs are still useful for ad placement, but this very much depends on the target function.

  3. Survey on Anonymity in Unstructured Peer-to-Peer Systems

    Institute of Scientific and Technical Information of China (English)

    Ren-Yi Xiao

    2008-01-01

    Although anonymizing Peer-to-Peer (P2P) networks often means extra cost in terms of transfer efficiency, many systems try to mask the identities of their users for privacy consideration. By comparison and analysis of existing approaches,we investigate the properties of unstructured P2P anonymity, and summarize current attack models on these designs. Most of these approaches are path-based, which require peers to pre-construct anonymous paths before transmission, thus suffering significant overhead and poor reliability. We also discuss the open problems in this field and propose several future research directions.

  4. Research, development and demonstration. Issue paper - working group 3; Denmark. Smart Grid Network; Forskning, udvikling og demonstration. Issue paper, arbejdsgruppe 3

    Energy Technology Data Exchange (ETDEWEB)

    Balasiu, A. (Siemens A/S, Ballerup (Denmark)); Troi, A. (Danmarks Tekniske Univ.. Risoe Nationallaboratoriet for Baeredygtig Energi, Roskilde (Denmark)); Andersen, Casper (DI Energibranchen, Copenhagen (Denmark)) (and others)

    2011-07-01

    The Smart Grid Network was established in 2010 by the Danish climate and energy minister tasked with developing recommendations for future actions and initiatives that make it possible to handle up to 50% electricity from wind energy in the power system in 2020. The task of working group 3 was defined as: - An overview of the Danish research and development of smart grids and related areas; - Conducting an analysis of the research and development needs required for the introduction of a smart grid in Denmark. Based on this analysis, provide suggestions for new large research and development projects; - Provide recommendations on how the activities are best carried out taking into account innovation, economic growth and jobs. In the analysis it is explained that Denmark so far has a strong position in several elements of RD and D activities. This position will soon be threatened as several European countries have launched ambitious initiatives to strengthen the national position. The working group recommends that Denmark gives priority to Smart Grids as a national action in order to solve the challenge of technically and economically efficient integration of renewable energy. Smart Grid is a catalyst that strengthens a new green growth industry (cleantech) in Denmark. Research and development has an important role to play in this development. A common vision and roadmap must be established for research institutions, energy companies and industries related to research, development and demonstration of Smart Grid, which can maintain and expand Denmark's global leadership position. As part of this, there is a need to strengthen and market research infrastructures, which can turn Denmark into a global hub for smart grid development. There is a current need to strengthen the advanced technical and scientific research in the complexities of the power system, research on market design, user behavior and smart grid interoperability. (LN)

  5. Parameterized Complexity of the k-anonymity Problem

    CERN Document Server

    Bonizzoni, Paola; Dondi, Riccardo; Pirola, Yuri

    2009-01-01

    The problem of publishing personal data without giving up privacy is becoming increasingly important. An interesting formalization that has been recently proposed is the $k$-anonymity. This approach requires that the rows of a table are partitioned in clusters of size at least $k$ and that all the rows in a cluster become the same tuple, after the suppression of some entries. The natural optimization problem, where the goal is to minimize the number of suppressed entries, is known to be APX-hard even when the records values are over a binary alphabet and $k=3$, and when the records have length at most 8 and $k=4$ . In this paper we study how the complexity of the problem is influenced by different parameters. In this paper we follow this direction of research, first showing that the problem is W[1]-hard when parameterized by the size of the solution (and the value $k$). Then we exhibit a fixed parameter algorithm, when the problem is parameterized by the size of the alphabet and the number of columns. Finally...

  6. Social network variables in alcoholics anonymous: a literature review.

    Science.gov (United States)

    Groh, D R; Jason, L A; Keys, C B

    2008-03-01

    Alcoholics Anonymous (AA) is the most commonly used program for substance abuse recovery and one of the few models to demonstrate positive abstinence outcomes. Although little is known regarding the underlying mechanisms that make this program effective, one frequently cited aspect is social support. In order to gain insight into the processes at work in AA, this paper reviewed 24 papers examining the relationship between AA and social network variables. Various types of social support were included in the review such as structural support, functional support, general support, alcohol-specific support, and recovery helping. Overall, this review found that AA involvement is related to a variety of positive qualitative and quantitative changes in social support networks. Although AA had the greatest impact on friend networks, it had less influence on networks consisting of family members or others. In addition, support from others in AA was found to be of great value to recovery, and individuals with harmful social networks supportive of drinking actually benefited the most from AA involvement. Furthermore, social support variables consistently mediated AA's impact on abstinence, suggesting that social support is a mechanism in the effectiveness of AA in promoting a sober lifestyle. Recommendations are made for future research and clinical practice.

  7. A historical review of perceptions of key aspects of spirituality and religion within alcoholics anonymous.

    Science.gov (United States)

    Feigenbaum, Janice Cooke

    2013-01-01

    This historical research aimed to develop an accurate perception of the role of spirituality and religion within the history of Alcoholics Anonymous. Primary and secondary sources were reviewed. The study identified that Bill W. and Dr. Bob established the format for the support group based on the ideas of William James, which formed the base for the Oxford Groups. Alcoholics Anonymous was clearly viewed as a spiritual group and not a religion. The review also showed that the two founders had each experienced one of the two types of spiritual awakenings that James had addressed. These findings will help nurses clarify their own perceptions of this organization so they may accurately educate individuals who they are encouraging to participate in this program while recovering from an addiction.

  8. Quantum group blind signature scheme without entanglement

    Science.gov (United States)

    Xu, Rui; Huang, Liusheng; Yang, Wei; He, Libao

    2011-07-01

    In this paper we propose a quantum group blind signature scheme designed for distributed e-voting system. Our scheme combines the properties of group signature and blind signature to provide anonymity of voters in an e-voting system. The unconditional security of our scheme is ensured by quantum mechanics. Without employing entanglement, the proposed scheme is easier to be realized comparing with other quantum signature schemes.

  9. Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model

    Science.gov (United States)

    Libert, Benoît; Vergnaud, Damien

    Group signatures allow users to anonymously sign messages in the name of a group. Membership revocation has always been a critical issue in such systems. In 2004, Boneh and Shacham formalized the concept of group signatures with verifier-local revocation where revocation messages are only sent to signature verifiers (as opposed to both signers and verifiers). This paper presents an efficient verifier-local revocation group signature (VLR-GS) providing backward unlinkability (i.e. previously issued signatures remain anonymous even after the signer's revocation) with a security proof in the standard model (i.e. without resorting to the random oracle heuristic).

  10. Design and analysis of two-layer anonymous communication system

    Institute of Scientific and Technical Information of China (English)

    WANG Wei-ping; WANG Jian-xin

    2007-01-01

    A new architecture for scalable anonymous communication system(SACS) was proposed. The users were divided into several subgroups managed by different sub-blenders, and all sub-blenders were managed by the main-blender using two layers management scheme. The identity information of members are distributed on different sub-blenders, which makes each member keep much less information and network overload greatly reduce. The anonymity and the overhead of the new scheme were analyzed and compared with that of Crowds, which shows the cost of storage and network overhead for the new scheme largely decreases while the anonymity is little degraded. The experiment results also show that the new system architecture is well scalable. The ratio of management cost of SACS to that of Crowds is about 1:25 while the value of P(I|H1+) only increases by 0.001-0.020, which shows that SACS keeps almost the same anonymity with Crowds.

  11. Anonymity and verifiability in multi-attribute reverse auction

    CERN Document Server

    Srinath, T R; Pais, Alwyn Roshan; 10.5121/ijitcs.2011.1401

    2011-01-01

    The use of e-Auction services has been increasing in recent years. Security requirements in conducting e-Auctions are mainly bid privacy, anonymity and public verifiability. Most of the secure protocols concentrate on privacy and anonymity, which are achieved through bidder-resolved multi-party computation, assuming two or more trusted third parties, either through numerous auctioneers or with asymmetric models in which the commercial entity of an auction issuer or registration manager is assumed in addition to the auctioneer. Multi-attribute reverse auctions promise higher market efficiency and effective information exchange. This work extends and uses the existing schemes. This scheme uses scoring function, winner determination in multi-attribute auctions to implement public verifiability. Anonymity is achieved through bidder side pseudonym generation. By results and analysis we say this is very simple and effective scheme. This scheme ensures public verifiability and anonymity in multi-attribute auctions w...

  12. Measuring Perceived Anonymity: The Development of a Context Independent Instrument

    Directory of Open Access Journals (Sweden)

    Dwight M. Hite

    2014-09-01

    Full Text Available In order to assess relationships between perceptions of anonymity and behaviors, a context independent instrument is required for measuring the perceptions of anonymity held by individuals.  To date, no such measurement instrument exists that has been shown to be reliable and valid.  The authors employ a rigorous design methodology to develop, test, and substantiate a reliable and valid instrument for measuring perceptions of anonymity across different contexts. The PA measure presented is a five item Likert scale designed to measure perceptions of anonymity across multiple contexts. Results from two separate EFA pilot tests (n=61 and n=60, a test-retest, and a CFA final test (n=292 indicate that the PA measure has good internal consistency reliability (a=.82, test-retest reliability, factorial validity, and a single factor structure. DOI: 10.2458/azu_jmmss.v5i1.18305

  13. Theoretical Results on De-Anonymization via Linkage Attacks

    Directory of Open Access Journals (Sweden)

    Martin M. Merener

    2012-08-01

    Full Text Available Consider a database D with records containing history of individuals' transactions, that has been de-identified, i.e., the variables that uniquely associate records with individuals have been removed from the data. An adversary de-anonymizes D via a linkage attack if using some auxiliary information about a certain individual in the database, it can determine which record of D corresponds to such individual. One example of this is given in the article Robust De-anonymization of Large Sparse Datasets, by Narayanan and Shmatikov [19], which shows that an anonymized database containing records with ratings of different movies rented by customers of Netflix, could in fact be de-anonymized using very little auxiliary information, even with errors. Besides the heuristic de-anonymization of the Netflix database, Narayanan and Shmatikov provide interesting theoretical results about database de-anonymization that an adversary can produce under general conditions. In this article we revisit these theoretical results, and work them further. Our first contribution is to exhibit different simple cases in which the algorithm Scoreboard, meant to produce the theoretical de-anonymization in [19], fails to do so. By requiring 1-sim to be a pseudo-metric, and that the algorithm producing the de-anonymization outputs a record with minimum support among the candidates, we obtain and prove deanonymization results similar to those described in [19]. We then consider a new hypothesis, motivated by the fact (observed in heuristic de-anonymizations that when the auxiliary information contains values corresponding to rare attributes, the de-anonymization achieved is stronger. We formalize this using the notion on long tail [4], and give new theorems expressing the level of de-anonymization in terms of the parameters of the tail of the database D. The improvement in the deanonymization is reflected in the fact that when at least one value in the auxiliary information

  14. An Anonymous Payment Protocol with Mobile Agents in Hostile Environments

    Institute of Scientific and Technical Information of China (English)

    LIU Yi; XIANG Ming-sen; WANG Yu-min

    2005-01-01

    By using Pedersen' s verifiable secret sharing scheme and the theory of cross validation, we propose an anonymous payment protocol which have following features:protecting the confidentiality of sensitive payment information from spying by malicious hosts; using a trusted third party in a minimal way; verifying the validity of the share by the merchant; allowing agent to verify that the product which it is about to receive is the one it is paying for; keeping the customer anonymous.

  15. A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier

    OpenAIRE

    Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa

    2009-01-01

    In IEEE ISI 2008, an anonymous attribute authentication scheme has been proposed using a self-blindable certificate scheme. This scheme enables the anonymity and certificate revocation. A Certificate Revocation List (CRL) is used in the revocation check. Even if an attacker can obtain a CRL, the attacker cannot execute the revocation check. This means that this scheme enables the designated revocation. However, this scheme is not secure, namely, a user can make a forged proof using a public v...

  16. Identification and management of cardiometabolic risk in Canada: a position paper by the cardiometabolic risk working group (executive summary).

    Science.gov (United States)

    Leiter, Lawrence A; Fitchett, David H; Gilbert, Richard E; Gupta, Milan; Mancini, G B John; McFarlane, Philip A; Ross, Robert; Teoh, Hwee; Verma, Subodh; Anand, Sonia; Camelon, Kathryn; Chow, Chi-Ming; Cox, Jafna L; Després, Jean-Pierre; Genest, Jacques; Harris, Stewart B; Lau, David C W; Lewanczuk, Richard; Liu, Peter P; Lonn, Eva M; McPherson, Ruth; Poirier, Paul; Qaadri, Shafiq; Rabasa-Lhoret, Rémi; Rabkin, Simon W; Sharma, Arya M; Steele, Andrew W; Stone, James A; Tardif, Jean-Claude; Tobe, Sheldon; Ur, Ehud

    2011-01-01

    With the objectives of clarifying the concepts related to "cardiometabolic risk," "metabolic syndrome" and "risk stratification" and presenting practical strategies to identify and reduce cardiovascular risk in multiethnic patient populations, the Cardiometabolic Working Group presents an executive summary of a detailed analysis and position paper that offers a comprehensive and consolidated approach to the identification and management of cardiometabolic risk. The above concepts overlap and relate to the atherogenic process and development of type 2 diabetes. However, there is confusion about what these terms mean and how they can best be used to improve our understanding of cardiovascular disease treatment and prevention. The concepts related to cardiometabolic risk, pathophysiology, and strategies for identification and management (including health behaviours, pharmacotherapy, and surgery) in the multiethnic Canadian population are presented. "Global cardiometabolic risk" is proposed as an umbrella term for a comprehensive list of existing and emerging factors that predict cardiovascular disease and/or type 2 diabetes. Health behaviour interventions (weight loss, physical activity, diet, smoking cessation) in people identified at high cardiometabolic risk are of critical importance given the emerging crisis of obesity and the consequent epidemic of type 2 diabetes. Vascular protective measures (health behaviours for all patients and pharmacotherapy in appropriate patients) are essential to reduce cardiometabolic risk, and there is growing consensus that a multidisciplinary approach is needed to adequately address cardiometabolic risk factors. Health care professionals must also consider ethnicity-related risk factors in order to appropriately evaluate all individuals in their diverse patient populations.

  17. Towards a respondent-preferred ki-anonymity model

    Institute of Scientific and Technical Information of China (English)

    Kok-Seng WONG; Myung Ho KIM

    2015-01-01

    Recently, privacy concerns about data collection have received an increasing amount of attention. In data collection process, a data collector (an agency) assumed that all respondents would be comfortable with submitting their data if the published data was anonymous. We believe that this assumption is not realistic because the increase in privacy concerns causes some re-spondents to refuse participation or to submit inaccurate data to such agencies. If respondents submit inaccurate data, then the usefulness of the results from analysis of the collected data cannot be guaranteed. Furthermore, we note that the level of anonymity (i.e., k-anonymity) guaranteed by an agency cannot be verified by respondents since they generally do not have access to all of the data that is released. Therefore, we introduce the notion of ki-anonymity, where ki is the level of anonymity preferred by each respondent i. Instead of placing full trust in an agency, our solution increases respondent confidence by allowing each to decide the preferred level of protection. As such, our protocol ensures that respondents achieve their preferred ki-anonymity during data collection and guarantees that the collected records are genuine and useful for data analysis.

  18. Lessons in Fluidity: Anonymous and the Communicative Formation of Organizational Identity

    OpenAIRE

    Schoeneborn, Dennis; Dobusch, Leonhard

    2013-01-01

    Most research on organizational identity tends to take an essentialist perspective, differentiating between an identity construed internally by members of the organization and an image construed by external actors. However, the duality of identity and image struggles with capturing more fluid, open, or partial organizational arrangements, where it is difficult to uphold this distinction. Looking at the case of the hacker collective Anonymous as an extreme example of organization, this paper p...

  19. A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial

    Institute of Scientific and Technical Information of China (English)

    CAO Feng; CAO Zhenfu

    2006-01-01

    In this paper, we use the polynomial function and Chaum's RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not need to be revealed in the tallying phase. The ballot number of each candidate gets is counted by computing the degrees of two polynomials' greatest common divisor. Our scheme does not require a special voting channel and communication can occur entirely over the current internet.

  20. Delineating social network data anonymization via random edge perturbation

    KAUST Repository

    Xue, Mingqiang

    2012-01-01

    Social network data analysis raises concerns about the privacy of related entities or individuals. To address this issue, organizations can publish data after simply replacing the identities of individuals with pseudonyms, leaving the overall structure of the social network unchanged. However, it has been shown that attacks based on structural identification (e.g., a walk-based attack) enable an adversary to re-identify selected individuals in an anonymized network. In this paper we explore the capacity of techniques based on random edge perturbation to thwart such attacks. We theoretically establish that any kind of structural identification attack can effectively be prevented using random edge perturbation and show that, surprisingly, important properties of the whole network, as well as of subgraphs thereof, can be accurately calculated and hence data analysis tasks performed on the perturbed data, given that the legitimate data recipient knows the perturbation probability as well. Yet we also examine ways to enhance the walk-based attack, proposing a variant we call probabilistic attack. Nevertheless, we demonstrate that such probabilistic attacks can also be prevented under sufficient perturbation. Eventually, we conduct a thorough theoretical study of the probability of success of any}structural attack as a function of the perturbation probability. Our analysis provides a powerful tool for delineating the identification risk of perturbed social network data; our extensive experiments with synthetic and real datasets confirm our expectations. © 2012 ACM.

  1. Summarized data to achieve population-wide anonymized wellness measures.

    Science.gov (United States)

    Clarke, Andrew; Steele, Robert

    2012-01-01

    The growth in smartphone market share has seen the increasing emergence of individuals collecting quantitative wellness data. Beyond the potential health benefits for the individual in regards to managing their own health, the data is highly related to preventative and risk factors for a number of lifestyle related diseases. This data has often been a component of public health data collection and epidemiological studies due to its large impact on the health system with chronic and lifestyle diseases increasingly being a major burden for the health service. However, collection of this kind of information from large segments of the community in a usable fashion has not been specifically explored in previous work. In this paper we discuss some of the technologies that increase the ease and capability of gathering quantitative wellness data via smartphones, how specific and detailed this data needs to be for public health use and the challenges of such anonymized data collection for public health. Additionally, we propose a conceptual architecture that includes the necessary components to support this approach to data collection.

  2. Teaching college students about Alcoholics Anonymous: an experiential approach.

    Science.gov (United States)

    Strobbe, Stephen; Thompson, Stephanie M; Zucker, Robert A

    2013-01-01

    Alcohol use disorders and their related consequences continue to be among the nation's most prevalent and persistent healthcare problems across the lifespan. The vast majority of treatment facilities for substance use disorders in the United States report using some form of 12-step facilitation to help direct their patients to mutual help groups such as Alcoholics Anonymous (AA). Yet, many students in various healthcare disciplines may lack familiarity and direct experience with this readily accessible and potentially lifesaving, low-cost resource. AA has a long-standing tradition of extending an open invitation to professionals and providing educational materials about this worldwide program of recovery. The purpose of this article is to describe an experiential, interdisciplinary approach that has been used to teach undergraduate psychology students about AA. Associated activities included (a) selected readings, (b) attendance at an open AA meeting, (c) the formulation of thoughtful questions by the students, and (d) a single, interactive didactic session. Undergraduate psychology students responded positively when principles of experiential learning were applied to educational activities related to AA.

  3. Cardinality Estimation Algorithm in Large-Scale Anonymous Wireless Sensor Networks

    KAUST Repository

    Douik, Ahmed

    2017-08-30

    Consider a large-scale anonymous wireless sensor network with unknown cardinality. In such graphs, each node has no information about the network topology and only possesses a unique identifier. This paper introduces a novel distributed algorithm for cardinality estimation and topology discovery, i.e., estimating the number of node and structure of the graph, by querying a small number of nodes and performing statistical inference methods. While the cardinality estimation allows the design of more efficient coding schemes for the network, the topology discovery provides a reliable way for routing packets. The proposed algorithm is shown to produce a cardinality estimate proportional to the best linear unbiased estimator for dense graphs and specific running times. Simulation results attest the theoretical results and reveal that, for a reasonable running time, querying a small group of nodes is sufficient to perform an estimation of 95% of the whole network. Applications of this work include estimating the number of Internet of Things (IoT) sensor devices, online social users, active protein cells, etc.

  4. Mutual support and recovery in the Russian Alcoholics Anonymous online community

    Directory of Open Access Journals (Sweden)

    Lyytikäinen Laura

    2016-04-01

    Full Text Available AIMS – In Russia the paradigm of alcoholism as a disease is still in contrast to the general perception of alcoholics as weak-willed. This article studies alcoholism and recovery in Russia through the case study of the Russian Alcoholics Anonymous online group. It studies how people who are seeking help for their drinking problems in this online community come to incorporate a new self-understanding of being ill with alcoholism.

  5. Probability-based location anonymity algorithm%利用概率的位置匿名算法

    Institute of Scientific and Technical Information of China (English)

    闫玉双; 谭示崇; 赵大为

    2015-01-01

    k匿名模型是一种有效的位置隐私保护技术,通过构造包含需要保护的用户在内的 k 个正在发送请求的用户的匿名区域,达到保护用户位置的目的。但是现有的 k匿名模型仅能利用当前正在发送请求的用户,当同时发送请求用户较少时,就会导致匿名区域过大。为此,提出一种利用概率的位置匿名算法来保护路网中的移动用户的位置,利用当前时刻的不活跃用户的历史位置轨迹,计算出进入匿名路段的概率,可明显减小匿名路段长度。实验结果证明,基于概率的位置匿名算法与一般的 k 匿名模型相比较,提高了匿名效率。%As one of the most effective location privacy preservation technologies , the k‐anonymity model provides safeguards for location privacy of the mobile client against vulnerabilities for abuse by constructing an anonymous area of k users including the protected one . However , most existing k‐anonymity models only utilize the users who are sending requests at recent time . If there are not enough requesting users , the generated anonymous area of the k‐anonymity model will be larger than expected . In this paper , a Probability‐based Location Anonymity ( PLA ) algorithm is proposed for protecting location privacy of the mobile users in a road network . The PLA model takes advantage of the historical path track of the users who are not sending the request currently , and then computes the probability into the anonymous section so that it can greatly reduce the size of the anonymous area . Experimental results show that the PLA algorithm is superior to the k‐anonymity and it increases its anonymous efficiency enormously .

  6. Development and validation of the Alcoholics Anonymous Intention Measure (AAIM).

    Science.gov (United States)

    Zemore, Sarah E; Kaskutas, Lee Ann

    2009-10-01

    Drop-out from 12-step groups is notoriously high, yet the field lacks strong models and scales for addressing this problem. We aim to determine whether the theory of planned behavior (TPB) can be applied to 12-step involvement, and to develop and validate a scale of 12-step readiness based on that theory: the Alcoholics Anonymous Intention Measure (AAIM). Data were from a longitudinal trial of a manual-guided 12-step facilitation intervention called Making AA Easier (MAAEZ) involving two treatment programs in California (N=508). Participants completed surveys at baseline, 7 weeks, 6 months, and 12 months. Surveys included the preliminary AAIM, a 12-step involvement measure, other readiness measures, and substance use outcomes. The final, 17-item AAIM measured Attitude (5-item alpha's=.75-.83), Subjective Norm (4-item alpha's=.56-.81), Perceived Control (5-item alpha's=.78-.85), and Intention (3-item alpha's=.80-.95) regarding attendance at 12-step groups. Components were correlated with each other and other readiness measures as expected, supporting the AAIM's validity. Scale components predicted 31% of the variance in Intention to attend 12-step groups at 6 months and 41% of the variance in 12-step involvement at 12 months. Social factors were among the strongest predictors of 12-step involvement. Results did not support the expectancy-value formulation of the TPB, as unweighted (vs. weighted) belief items performed optimally. Results generally support the TPB as a model of 12-step involvement and suggest specific targets for 12-step facilitation interventions within attitude, norm, and control components. Findings also support the AAIM as a tool for identifying drop-out risks and tailoring individual interventions.

  7. Anonymous three-party password-authenticated key exchange scheme for Telecare Medical Information Systems.

    Directory of Open Access Journals (Sweden)

    Qi Xie

    Full Text Available Telecare Medical Information Systems (TMIS provide an effective way to enhance the medical process between doctors, nurses and patients. For enhancing the security and privacy of TMIS, it is important while challenging to enhance the TMIS so that a patient and a doctor can perform mutual authentication and session key establishment using a third-party medical server while the privacy of the patient can be ensured. In this paper, we propose an anonymous three-party password-authenticated key exchange (3PAKE protocol for TMIS. The protocol is based on the efficient elliptic curve cryptosystem. For security, we apply the pi calculus based formal verification tool ProVerif to show that our 3PAKE protocol for TMIS can provide anonymity for patient and doctor while at the same time achieves mutual authentication and session key security. The proposed scheme is secure and efficient, and can be used in TMIS.

  8. Anonymous three-party password-authenticated key exchange scheme for Telecare Medical Information Systems.

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Dong, Na; Wong, Duncan S

    2014-01-01

    Telecare Medical Information Systems (TMIS) provide an effective way to enhance the medical process between doctors, nurses and patients. For enhancing the security and privacy of TMIS, it is important while challenging to enhance the TMIS so that a patient and a doctor can perform mutual authentication and session key establishment using a third-party medical server while the privacy of the patient can be ensured. In this paper, we propose an anonymous three-party password-authenticated key exchange (3PAKE) protocol for TMIS. The protocol is based on the efficient elliptic curve cryptosystem. For security, we apply the pi calculus based formal verification tool ProVerif to show that our 3PAKE protocol for TMIS can provide anonymity for patient and doctor while at the same time achieves mutual authentication and session key security. The proposed scheme is secure and efficient, and can be used in TMIS.

  9. Distributed anonymous data perturbation method for privacy-preserving data mining

    Institute of Scientific and Technical Information of China (English)

    Feng LI; Jin MA; Jian-hua LI

    2009-01-01

    Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment.

  10. Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Xiong Li

    2013-01-01

    Full Text Available We apply LU decomposition of matrices to present an anonymous bilateral authentication scheme. This paper aims at improving security and providing more excellent performances for remote user authentication scheme. The proposed scheme can provide bilateral authentication and session key agreement, can quickly check the validity of the input password, and can really protect the user anonymity. The security of the proposed scheme is based on the discrete logarithm problem (DLP, Diffie-Hellman problem (DHP, and the one-way hash function. It can resist various attacks such as insider attack, impersonation attack, server spoofing attack, and stolen smart card attack. Moreover, the presented scheme is computationally efficient for real-life implementation.

  11. Design on PKI-Based Anonymous Mobile Agent Security in E-Commerce

    Institute of Scientific and Technical Information of China (English)

    MENG Xiangsong; HAN Fengwu

    2006-01-01

    The security of mobile agent directly decides its usage width in e-commerce. Especially, to protect users' private information is becoming more important now and future. So an anonymous mobile agent security mechanism with the secure authentication infrastructure based on PKI(public key infrastructure) is proposed in the paper. The multi-agent system is programmed by java language and every agent must register itself in CA(certificate authority) before working in the net and express his legit identity which is temptly produced and used only once. The CA ensures the legal of all agents' identity which take part in communicaiton or trade. And every user agent identity only is used once which makes other agents cannot decipher users' private information. The security mechanism of the multi-agent system implements anonymity, integrity, data confidentiality of mobile agent based on the MH(multiple hop) integrity protection regard to PKI limit.

  12. Restricted common data in anonymous E-cash system

    Institute of Scientific and Technical Information of China (English)

    ZHANG Xiang-jun; CHEN Ke-fei

    2006-01-01

    Discuss the problem of infinite increasing coin list in anonymous E-cash systems, which reduce the efficiency of whole system greatly. Though some methods are suggested, no one can solve the problem with high efficiency and flexibility. Here, we use the technique of adding information in blind signatures to deal with this problem. Through adding timestamp in signatures, we can separate the valid period of all used coins into pieces. Only the coins in the last stage are recorded. So the scale of the coins list is controlled. We also analyze the anonymity of these data, and add some indispensable restrictions to them. These restrictions can ensure that the imported data don't break the anonymity of the customers. In order to fulfill these qualifications, we lead to the concept of restricted common data (RCD). Furthermore, we propose two schemes to add RCD in the blind signature. The simple one is easy to implement, while the complex one can note the value of the coin. The usage of RCD leads to little additional cost, as well as maintaining the anonymity of customers. This method fits for most kinds of anonymous E-cash systems.

  13. A Multiple Group Measurement Model of Children's Reports of Parental Socioeconomic Status. Discussion Papers No. 531-78.

    Science.gov (United States)

    Mare, Robert D.; Mason, William M.

    An important class of applications of measurement error or constrained factor analytic models consists of comparing models for several populations. In such cases, it is appropriate to make explicit statistical tests of model similarity across groups and to constrain some parameters of the models to be equal across groups using a priori substantive…

  14. Structure and Anonymity of the Bitcoin Transaction Graph

    Directory of Open Access Journals (Sweden)

    Kay Hamacher

    2013-05-01

    Full Text Available The Bitcoin network of decentralized payment transactions has attracted a lot of attention from both Internet users and researchers in recent years. Bitcoin utilizes a peer-to-peer network to issue anonymous payment transactions between different users. In the currently used Bitcoin clients, the full transaction history is available at each node of the network to prevent double spending without the need for a central authority, forming a valuable source for empirical research on network structure, network dynamics, and the implied anonymity challenges, as well as guidance on the future evolution of complex payment systems. We found dynamical effects of which some increase anonymity while others decrease it. Most importantly, several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months. We discuss the implications.

  15. Symmetry adaptation of spherical tensor quantities in cubic point groups: comments on a paper by M. Rey et al.

    Science.gov (United States)

    Michelot, F.

    2004-04-01

    We underline some inconsistencies in the work [J. Mol. Spectrosc. 219 (2003) 313] concerning symmetry adaptation in cubic groups. Also we show that some rather complicated methods presented can be easily avoided.

  16. Completely anonymous multi-recipient signcryption scheme with public verification.

    Science.gov (United States)

    Pang, Liaojun; Li, Huixian; Gao, Lu; Wang, Yumin

    2013-01-01

    Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant.

  17. Completely anonymous multi-recipient signcryption scheme with public verification.

    Directory of Open Access Journals (Sweden)

    Liaojun Pang

    Full Text Available Most of the existing multi-recipient signcryption schemes do not take the anonymity of recipients into consideration because the list of the identities of all recipients must be included in the ciphertext as a necessary element for decryption. Although the signer's anonymity has been taken into account in several alternative schemes, these schemes often suffer from the cross-comparison attack and joint conspiracy attack. That is to say, there are few schemes that can achieve complete anonymity for both the signer and the recipient. However, in many practical applications, such as network conference, both the signer's and the recipient's anonymity should be considered carefully. Motivated by these concerns, we propose a novel multi-recipient signcryption scheme with complete anonymity. The new scheme can achieve both the signer's and the recipient's anonymity at the same time. Each recipient can easily judge whether the received ciphertext is from an authorized source, but cannot determine the real identity of the sender, and at the same time, each participant can easily check decryption permission, but cannot determine the identity of any other recipient. The scheme also provides a public verification method which enables anyone to publicly verify the validity of the ciphertext. Analyses show that the proposed scheme is more efficient in terms of computation complexity and ciphertext length and possesses more advantages than existing schemes, which makes it suitable for practical applications. The proposed scheme could be used for network conferences, paid-TV or DVD broadcasting applications to solve the secure communication problem without violating the privacy of each participant.

  18. Invited and contributed papers presented by the theory group at the joint Varenna-Lausanne international workshop `theory of fusion plasmas`

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-09-01

    In this report eight invited and contributed papers of the theory group are included which were presented at joint Varenna-Lausanne international workshop on `theory of fusion plasmas`. (author) figs., tabs., refs.

  19. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET

    Directory of Open Access Journals (Sweden)

    Weidong Fang

    2017-06-01

    Full Text Available Fog-based MANET (Mobile Ad hoc networks is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV’s research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  20. A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET.

    Science.gov (United States)

    Fang, Weidong; Zhang, Wuxiong; Xiao, Jinchao; Yang, Yang; Chen, Wei

    2017-06-17

    Fog-based MANET (Mobile Ad hoc networks) is a novel paradigm of a mobile ad hoc network with the advantages of both mobility and fog computing. Meanwhile, as traditional routing protocol, ad hoc on-demand distance vector (AODV) routing protocol has been applied widely in fog-based MANET. Currently, how to improve the transmission performance and enhance security are the two major aspects in AODV's research field. However, the researches on joint energy efficiency and security seem to be seldom considered. In this paper, we propose a source anonymity-based lightweight secure AODV (SAL-SAODV) routing protocol to meet the above requirements. In SAL-SAODV protocol, source anonymous and secure transmitting schemes are proposed and applied. The scheme involves the following three parts: the source anonymity algorithm is employed to achieve the source node, without being tracked and located; the improved secure scheme based on the polynomial of CRC-4 is applied to substitute the RSA digital signature of SAODV and guarantee the data integrity, in addition to reducing the computation and energy consumption; the random delayed transmitting scheme (RDTM) is implemented to separate the check code and transmitted data, and achieve tamper-proof results. The simulation results show that the comprehensive performance of the proposed SAL-SAODV is a trade-off of the transmission performance, energy efficiency, and security, and better than AODV and SAODV.

  1. Skin test concentrations for systemically administered drugs -- an ENDA/EAACI Drug Allergy Interest Group position paper

    DEFF Research Database (Denmark)

    Brockow, K; Garvey, L H; Aberer, W

    2013-01-01

    search on skin test drug concentration in MEDLINE and EMBASE, reviewed and evaluated the literature in five languages using the GRADE system for quality of evidence and strength of recommendation. Where the literature is poor, we have taken into consideration the collective experience of the group...

  2. The Tavistock Group Relations Conference: Description and Comparison with Laboratory Training. A CRUSK-ISR Working Paper.

    Science.gov (United States)

    Crowfoot, James E.

    Laboratory training and the Tavistock Conference, two types of experiential learning, contrast in important ways. They are designed to respond to different societal issues and make different types of responses to these issues. Tavistock conferences focus consciously and exclusively on group operation, role, role relationships, intergroup…

  3. Factors Influencing the Decision To Return to Graduate School in One Professional Group, Physical Therapy. ASHE 1988 Annual Meeting Paper.

    Science.gov (United States)

    Stoecker, Judith L.

    The factors influencing the decision to return to graduate school in an emerging professional group, physical therapy, are described, and a causal model incorporating the principal constructs of the status attainment and college impact model is proposed. The five variable sets included are background characteristics, college characteristics,…

  4. ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networks

    Science.gov (United States)

    Banerjee, Debasmit; Dong, Bo; Biswas, Subir

    2013-05-01

    Wireless sensor network used in military applications may be deployed in hostile environments, where privacy and security is of primary concern. This can lead to the formation of a trust-based sub-network among mutually-trusting nodes. However, designing a TDMA MAC protocol is very challenging in situations where such multiple sub-networks coexist, since TDMA protocols require node identity information for slot assignments. This paper introduces a novel distributed TDMA MAC protocol, ZEA-TDMA (Zero Exposure Anonymous TDMA), for anonymous wireless networks. ZEA-TDMA achieves slot allocation with strict anonymity constraints, i.e. without nodes having to exchange any identity revealing information. By using just the relative time of arrival of packets and a novel technique of wireless collision-detection and resolution for fixed packetsizes, ZEA-TDMA is able to achieve MAC slot-allocation which is described as follows. Initially, a newly joined node listens to its one-hop neighborhood channel usage and creates a slot allocation table based on its own relative time, and finally, selects a slot that is collision free within its one-hop neighborhood. The selected slot can however cause hidden collisions with a two-hop neighbor of the node. These collisions are resolved by a common neighbor of the colliding nodes, which first detects the collision, and then resolve them using an interrupt packet. ZEA-TDMA provides the following features: a) it is a TDMA protocol ideally suited for highly secure or strictly anonymous environments b) it can be used in heterogeneous environments where devices use different packet structures c) it does not require network time-synchronization, and d) it is insensitive to channel errors. We have implemented ZEA-TDMA on the MICA2 hardware platform running TinyOS and evaluated the protocol functionality and performance on a MICA2 test-bed.

  5. Local and global recoding methods for anonymizing set-valued data

    KAUST Repository

    Terrovitis, Manolis

    2010-06-10

    In this paper, we study the problem of protecting privacy in the publication of set-valued data. Consider a collection of supermarket transactions that contains detailed information about items bought together by individuals. Even after removing all personal characteristics of the buyer, which can serve as links to his identity, the publication of such data is still subject to privacy attacks from adversaries who have partial knowledge about the set. Unlike most previous works, we do not distinguish data as sensitive and non-sensitive, but we consider them both as potential quasi-identifiers and potential sensitive data, depending on the knowledge of the adversary. We define a new version of the k-anonymity guarantee, the k m-anonymity, to limit the effects of the data dimensionality, and we propose efficient algorithms to transform the database. Our anonymization model relies on generalization instead of suppression, which is the most common practice in related works on such data. We develop an algorithm that finds the optimal solution, however, at a high cost that makes it inapplicable for large, realistic problems. Then, we propose a greedy heuristic, which performs generalizations in an Apriori, level-wise fashion. The heuristic scales much better and in most of the cases finds a solution close to the optimal. Finally, we investigate the application of techniques that partition the database and perform anonymization locally, aiming at the reduction of the memory consumption and further scalability. A thorough experimental evaluation with real datasets shows that a vertical partitioning approach achieves excellent results in practice. © 2010 Springer-Verlag.

  6. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  7. Sponsorship and service as mediators of the effects of Making Alcoholics Anonymous Easier (MAAEZ), a 12-step facilitation intervention.

    Science.gov (United States)

    Subbaraman, Meenakshi S; Kaskutas, Lee Ann; Zemore, Sarah

    2011-07-01

    A recent trial (n=508) of "Making Alcoholics Anonymous Easier" (MAAEZ), a group-format 12-step facilitation program, showed that MAAEZ participants had increased odds of abstinence (OR=1.58; p=0.063). Effects were especially marked in several subgroups, including those with more prior AA/NA/CA exposure, and those with severe psychiatric problems. This paper examines whether the effects of MAAEZ were explained by higher engagement in particular Alcoholics Anonymous (AA) and other 12-step organization activities. Mediation analyses were performed, estimating MAAEZ effects attributable to AA/NA/CA meeting attendance, overall AA/NA/CA involvement, having a sponsor, and engaging in 12-step service. The only variable that appeared to mediate MAAEZ effects in the sample overall was doing service at either 6 months or at both 6 and 12 months. Among those with high prior AA/NA/CA attendance, both having a sponsor and doing service emerged as mediators, with having a sponsor explaining approximately 25% of the MAAEZ effect. Doing service also partially explained the MAAEZ effect among those with high psychiatric severity. Results highlight the value of studying specific AA/NA/CA activities as mediators of treatment effects, and demonstrate the importance of exploring subgroups when trying to understand treatment mechanisms. Findings also suggest that treatment programs should emphasize specific activities for particular clients. For example, individuals may have attended many AA/NA/CA meetings, but never known how to ask for a sponsor or get involved in service; doing service may represent a non-threatening way of connecting with 12-step members for clients with psychiatric problems such as social anxiety. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  8. Radial Velocity Prospects Current and Future: A White Paper Report prepared by the Study Analysis Group 8 for the Exoplanet Program Analysis Group (ExoPAG)

    CERN Document Server

    Plavchan, Peter; Gaudi, Scott; Crepp, Justin; Xavier, Dumusque; Furesz, Gabor; Vanderburg, Andrew; Blake, Cullen; Fischer, Debra; Prato, Lisa; White, Russel; Makarov, Valeri; Marcy, Geoff; Stapelfeldt, Karl; Haywood, Raphaëlle; Collier-Cameron, Andrew; Quirrenbach, Andreas; Mahadevan, Suvrath; Anglada, Guillem; Muirhead, Philip

    2015-01-01

    [Abridged] The Study Analysis Group 8 of the NASA Exoplanet Analysis Group was convened to assess the current capabilities and the future potential of the precise radial velocity (PRV) method to advance the NASA goal to "search for planetary bodies and Earth-like planets in orbit around other stars.: (U.S. National Space Policy, June 28, 2010). PRVs complement other exoplanet detection methods, for example offering a direct path to obtaining the bulk density and thus the structure and composition of transiting exoplanets. Our analysis builds upon previous community input, including the ExoPlanet Community Report chapter on radial velocities in 2008, the 2010 Decadal Survey of Astronomy, the Penn State Precise Radial Velocities Workshop response to the Decadal Survey in 2010, and the NSF Portfolio Review in 2012. The radial-velocity detection of exoplanets is strongly endorsed by both the Astro 2010 Decadal Survey "New Worlds, New Horizons" and the NSF Portfolio Review, and the community has recommended robust...

  9. The Ring of Gyges: Anonymity and Technological Advance’s Effect on the Deterrence of Non-State Actors in 2035

    Science.gov (United States)

    2011-02-16

    1979 study using individuals associating themselves with groups (through anonymous costumes ) as either the Ku Klux Klan (KKK) or as nurses showed a...circumstances, it may be the nation state‘s population where they live. In most cases , it is their family or friends, who may be as difficult...Conventional wisdom and initial psychological studies seem to support the assumption that anonymous individuals act more aggressively and are

  10. Simplifying Itai-Rodeh leaderelection for anonymous rings

    NARCIS (Netherlands)

    W.J. Fokkink (Wan); J. Pang

    2004-01-01

    textabstractWe present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh. In contrast to the Itai-Rodeh algorithm, our algorithms are finite-state. So they can be analyzed using explicit state space

  11. A reciprocal framework for spatial K-anonymity

    KAUST Repository

    Ghinita, Gabriel

    2010-05-01

    Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. The main idea of SKA is to replace the exact location of a user U with an anonymizing spatial region (ASR) that contains at least K-1 other users, so that an attacker can pinpoint U with probability at most 1/K. Simply generating an ASR that includes K users does not guarantee SKA. Previous work defined the reciprocity property as a sufficient condition for SKA. However, the only existing reciprocal method, Hilbert Cloak, relies on a specialized data structure. In contrast, we propose a general framework for implementing reciprocal algorithms using any existing spatial index on the user locations. We discuss ASR construction methods with different tradeoffs on effectiveness (i.e., ASR size) and efficiency (i.e., construction cost). Then, we present case studies of applying our framework on top of two popular spatial indices (namely, R*-trees and Quad-trees). Finally, we consider the case where the attacker knows the query patterns of each user. The experimental results verify that our methods outperform Hilbert Cloak. Moreover, since we employ general-purpose spatial indices, the proposed system is not limited to anonymization, but supports conventional spatial queries as well. © 2009 Elsevier B.V. All rights reserved.

  12. Father-Daughter Incest: Data from an Anonymous Computerized Survey

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel V. S.; Kommor, Martin J.

    2012-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self-interview. Nineteen were classified as victims of father-daughter incest, and 241 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The remaining 1,261 served as controls. Incest victims were…

  13. Simplifying Itai-Rodeh leaderelection for anonymous rings

    NARCIS (Netherlands)

    Fokkink, W.J.; Pang, J.

    2004-01-01

    We present two probabilistic leader election algorithms for anonymous unidirectional rings with FIFO channels, based on an algorithm from Itai and Rodeh. In contrast to the Itai-Rodeh algorithm, our algorithms are finite-state. So they can be analyzed using explicit state space exploration; we used

  14. Anonymity versus Perceived Patron Identity in Virtual Reference Transcripts

    Science.gov (United States)

    Roper, Kristin Grabarek; Sobel, Karen

    2012-01-01

    Librarians who provide virtual reference services often perceive that their patrons self-identify to some degree, even when transactions are anonymous. They also develop a sense of patrons' greatest research-related needs over time. In this article, two librarians analyze two years' worth of virtual reference transcripts to determine what patrons…

  15. Values and Recovery from Alcoholism through Alcoholics Anonymous.

    Science.gov (United States)

    Brown, Howard P. Jr.; Peterson, John H. Jr.

    1990-01-01

    Analyzed Rokeach Value Surveys completed by 57 alcoholics and addicts who had obtained at least 3 years' abstinence using a 12-step program of recovery. Data suggested a shift in values is involved in recovery from alcoholism through participation in Alcoholics Anonymous and that values clarification and value therapy may be useful in chemical…

  16. Attitudes toward Spirituality and the Core Principles of Alcoholics Anonymous

    Science.gov (United States)

    Davis, S. J.; Benshoff, John J.; Koch, D. Shane

    2006-01-01

    One-hundred and fifty-one students enrolled in substance abuse counselor training classes were surveyed on their attitudes about spirituality in substance abuse treatment and their beliefs about the principles of Alcoholics Anonymous (AA). Significant correlations were found between the subjects' spirituality and their attitudes toward…

  17. Alcoholics Anonymous and the Counseling Profession: Philosophies in Conflict.

    Science.gov (United States)

    Le, Christine; And Others

    1995-01-01

    Describes contributions of Alcoholics Anonymous (AA) to drug and alcohol treatment. Discusses potential for AA's steps to encourage growth, and examines their consistency with counseling philosophy. Proposes and contrasts 12 new steps based on counseling theory to stimulate constructive discussion. Advocates more solid boundaries between AA and…

  18. Spirituality, Evidence-Based Medicine, and Alcoholics Anonymous

    National Research Council Canada - National Science Library

    Galanter, Marc

    2008-01-01

    ... work. For example, Alcoholics Anonymous (AA), a self-designated "spiritual fellowship," is a useful adjunct to the practice of evidence-based addiction medicine. Evidence is developing for a specific role of spirituality in its effectiveness. A Biopsychosocial Perspective As a social phenomenon, spirituality has become a focus of interest in the...

  19. Alcoholics Anonymous: A Wonderful Medication with Some Possible Side Effects.

    Science.gov (United States)

    Machell, David F.

    1989-01-01

    Describes Alcoholics Anonymous as an effective self-help treatment modality for many alcoholics. Notes that organization would seem to initially necessitate "tolerated unhealthiness" psychologically to help consolidate sobriety, suggesting abstinence first, psychological healthiness second regimen. Suggests that psychotherapists learn to…

  20. Social distance and anonymity modulate fairness consideration: An ERP study.

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-08-21

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity.

  1. Leader election in anonymous rings: Franklin goes probabilistic

    NARCIS (Netherlands)

    Bakhshi, R.; Fokkink, W.J.; Pang, J.; Pol, J.C. van de; Ausiello, G.

    2008-01-01

    We present a probabilistic leader election algorithm for anonymous, bidirectional, asynchronous rings. It is based on an algorithm from Franklin, augmented with random identity selection, hop counters to detect identity clashes, and round numbers modulo 2. As a result, the algorithm is finite-state,

  2. Leader Election in Anonymous Rings: Franklin Goes Probabilistic

    NARCIS (Netherlands)

    Bakhshi, Rena; Fokkink, Wan; Pang, Jun; Pol, van de Jaco; Ausiello, G.; Karhumäki, J.; Mauri, G.; Ong, L.

    2008-01-01

    We present a probabilistic leader election algorithm for anonymous, bidirectional, asynchronous rings. It is based on an algorithm from Franklin, augmented with random identity selection, hop counters to detect identity clashes, and round numbers modulo 2. As a result, the algorithm is finite-state,

  3. Social distance and anonymity modulate fairness consideration: An ERP study

    Science.gov (United States)

    Yu, Rongjun; Hu, Pan; Zhang, Ping

    2015-01-01

    Previous research indicated that fairness consideration can be influenced by social distance. However, it is not clear whether social distance and anonymity have an interactive impact on fairness evaluation during asset distribution and whether these processes can be documented in brain activity. Using a modified ultimatum game combined with measures of event related potential (ERP), we examined how social distance and anonymity modulate brain response to inequality. At the behavior level, we found that acceptance rate and reaction time can be substantially modified by social distance and anonymity. Feedback-related negativity, an ERP component associated with conflict between cognitive and emotion motives, was more negative in response to unfairness than fairness from strangers; however, it showed an opposite trend for unfair offers provided by friends, suggesting that the influence of social distance on fairness perception is relatively fast. The P300 in response to fair offers was more positive when the proposers made offers when uncertain about partner identity than when certain about partner identity. These results suggest that unfairness is evaluated in a fast conflict detection stage and a slower stage that integrates more complex social contextual factors such as anonymity. PMID:26293456

  4. Alcoholics Anonymous and other 12-step programmes for alcohol dependence.

    Science.gov (United States)

    Ferri, M; Amato, L; Davoli, M

    2006-07-19

    Alcoholics Anonymous (AA) is an international organization of recovering alcoholics that offers emotional support through self-help groups and a model of abstinence for people recovering from alcohol dependence, using a 12-step approach. Although it is the most common, AA is not the only 12-step intervention available there are other 12-step approaches (labelled Twelve Step Facilitation (TSF)). To assess the effectiveness of AA or TSF programmes compared to other psychosocial interventions in reducing alcohol intake, achieving abstinence, maintaining abstinence, improving the quality of life of affected people and their families, and reducing alcohol associated accidents and health problems. We searched the Specialized Register of Trials of the Cochrane Group on Drugs and Alcohol, the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE from 1966, EMBASE from 1980, CINAHL from 1982, PsychINFO from 1967. Searches were updated in February 2005. We also inspected lists of references for relevant studies. Studies involving adults (alcohol dependence attending on a voluntary or coerced basis AA or TSF programmes comparing no treatment, other psychological interventions, 12-step variants. One reviewer (MF) assessed studies for inclusion and extracted data using a pre-defined data extraction form. Studies were evaluated for methodological quality and discussed by all reviewers. Eight trials involving 3417 people were included. AA may help patients to accept treatment and keep patients in treatment more than alternative treatments, though the evidence for this is from one small study that combined AA with other interventions and should not be regarded as conclusive. Other studies reported similar retention rates regardless of treatment group. Three studies compared AA combined with other interventions against other treatments and found few differences in the amount of drinks and percentage of drinking days. Severity of addiction and drinking consequence did

  5. In vitro tests for drug hypersensitivity reactions: an ENDA/EAACI Drug Allergy Interest Group position paper.

    Science.gov (United States)

    Mayorga, C; Celik, G; Rouzaire, P; Whitaker, P; Bonadonna, P; Rodrigues-Cernadas, J; Vultaggio, A; Brockow, K; Caubet, J C; Makowska, J; Nakonechna, A; Romano, A; Montañez, M I; Laguna, J J; Zanoni, G; Gueant, J L; Oude Elberink, H; Fernandez, J; Viel, S; Demoly, P; Torres, M J

    2016-08-01

    Drug hypersensitivity reactions (DHRs) are a matter of great concern, both for outpatient and in hospital care. The evaluation of these patients is complex, because in vivo tests have a suboptimal sensitivity and can be time-consuming, expensive and potentially risky, especially drug provocation tests. There are several currently available in vitro methods that can be classified into two main groups: those that help to characterize the active phase of the reaction and those that help to identify the culprit drug. The utility of these in vitro methods depends on the mechanisms involved, meaning that they cannot be used for the evaluation of all types of DHRs. Moreover, their effectiveness has not been defined by a consensus agreement between experts in the field. Thus, the European Network on Drug Allergy and Drug Allergy Interest Group of the European Academy of Allergy and Clinical Immunology has organized a task force to provide data and recommendations regarding the available in vitro methods for DHR diagnosis. We have found that although there are many in vitro tests, few of them can be given a recommendation of grade B or above mainly because there is a lack of well-controlled studies, most information comes from small studies with few subjects and results are not always confirmed in later studies. Therefore, it is necessary to validate the currently available in vitro tests in a large series of well-characterized patients with DHR and to develop new tests for diagnosis.

  6. Predictors of anonymous cyber aggression: the role of adolescents' beliefs about anonymity, aggression, and the permanency of digital content.

    Science.gov (United States)

    Wright, Michelle F

    2014-07-01

    Little attention has been given to whether adolescents' beliefs about anonymity and their normative beliefs about cyber aggression jointly increase their perpetration of cyber aggression. To this end, the present longitudinal study examined the moderating influence of these variables on the relationships among adolescents' attitudes toward the permanency of digital content, confidence with not getting caught, and anonymous cyber aggression (ACA) assessed 1 year later (Time 2). These associations were examined among 274 7th and 8th graders and through five technologies, including social networking sites (SNS), e-mail, instant messenger (IM), mobile phones, and chatrooms. Findings indicated that increases in Time 2 ACA and attitudes toward the permanency of digital content were more strongly related when adolescents reported greater confidence with not getting caught and higher normative beliefs concerning cyber aggression through SNS and mobile phones. In addition, higher levels of attitudes toward the permanency of digital content, confidence with not getting caught, beliefs about anonymity, and normative beliefs regarding cyber aggression were related to greater Time 2 ACA through e-mail, IM, and chatrooms. All findings are discussed in the context of adolescents' positive attitudes toward ACA, and an appeal for additional research is made to understand more about anonymity in cyberspace.

  7. ESC Working Group on Valvular Heart Disease position paper--heart valve clinics: organization, structure, and experiences.

    Science.gov (United States)

    Lancellotti, Patrizio; Rosenhek, Raphael; Pibarot, Philippe; Iung, Bernard; Otto, Catherine M; Tornos, Pilar; Donal, Erwan; Prendergast, Bernard; Magne, Julien; La Canna, Giovanni; Piérard, Luc A; Maurer, Gerald

    2013-06-01

    With an increasing prevalence of patients with valvular heart disease (VHD), a dedicated management approach is needed. The challenges encountered are manifold and include appropriate diagnosis and quantification of valve lesion, organization of adequate follow-up, and making the right management decisions, in particular with regard to the timing and choice of interventions. Data from the Euro Heart Survey have shown a substantial discrepancy between guidelines and clinical practice in the field of VHD and many patients are denied surgery despite having clear indications. The concept of heart valve clinics (HVCs) is increasingly recognized as the way to proceed. At the same time, very few centres have developed such expertise, indicating that specific recommendations for the initial development and subsequent operating requirements of an HVC are needed. The aim of this position paper is to provide insights into the rationale, organization, structure, and expertise needed to establish and operate an HVC. Although the main goal is to improve the clinical management of patients with VHD, the impact of HVCs on education is of particular importance: larger patient volumes foster the required expertise among more senior physicians but are also fundamental for training new cardiologists, medical students, and nurses. Additional benefits arise from research opportunities resulting from such an organized structure and the delivery of standardized care protocols. The growing volume of patients with VHD, their changing characteristics, and the growing technological opportunities of refined diagnosis and treatment in addition to the potential dismal prognosis if overlooked mandate specialized evaluation and care by dedicated physicians working in a specialized environment that is called the HVC.

  8. Use of faecal markers in screening for colorectal neoplasia: a European group on tumor markers position paper.

    LENUS (Irish Health Repository)

    Duffy, Michael J

    2012-02-01

    Several randomized controlled trials have shown that population-based screening using faecal occult blood testing (FOBT) can reduce mortality from colorectal neoplasia. Based on this evidence, a number of countries have introduced screening for colorectal cancer (CRC) and high-risk adenoma and many others are considering its introduction. The aim of this article is to critically review the current status of faecal markers as population-based screening tests for these neoplasia. Most of the available faecal tests involve the measurement of either occult blood or a panel of DNA markers. Occult blood may be measured using either the guaiac faecal occult blood test (gFOBT) or a faecal immunochemical test (iFOBT). Although iFOBT may require a greater initial investment, they have several advantages over gFOBT, including greater analytical sensitivity and specificity. Their use results in improved clinical performance and higher uptake rates. Importantly for population screening, some of the iFOBTs can be automated and provide an adjustable cutoff for faecal haemoglobin concentration. However, samples for iFOBT, may be less stable after collection than for gFOBT. For new centres undertaking FOBT for colorectal neoplasia, the European Group on Tumour Markers recommends use of a quantitative iFOBT with an adjustable cutoff point and high throughput analysis. All participants with positive FOBT results should be offered colonoscopy. The panel recommends further research into increasing the stability of iFOBT and the development of improved and affordable DNA and proteomic-based tests, which reduce current false negative rates, simplify sample transport and enable automated analysis.

  9. Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting

    Science.gov (United States)

    van de Graaf, Jeroen

    All voting protocols proposed so far, with the exception of a few, have the property that the privacy of the ballot is only computational. In this paper we outline a new and conceptually simple approach allowing us to construct a protocol in which the privacy of the ballot is unconditional. Our basic idea is to modify the protocol of Fujioka, Okamoto and Ohta[1], which uses blind signatures so that the voter can obtain a valid ballot. However, instead of using a MIX net, we use a new broadcast protocol for anonymously publishing the vote, a Non-Interactive variation of the Dining Cryptographer Net.

  10. An arbitrated quantum signature scheme based on entanglement swapping with signer anonymity

    Science.gov (United States)

    Li, Wei; Fan, Ming-Yu; Wang, Guang-Wei

    2012-12-01

    In this paper an arbitrated quantum signature scheme based on entanglement swapping is proposed. In this scheme a message to be signed is coded with unitary operators. Combining quantum measurement with quantum encryption, the signer can generate the signature for a given message. Combining the entangled states generated by the TTP's Bell measurement with the signature information, the verifier can verify the authentication of a signature through a single quantum state measurement. Compared with previous schemes, our scheme is more efficient and less complex, furthermore, our scheme can ensure the anonymity of the signer.

  11. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol

    Directory of Open Access Journals (Sweden)

    Hong Lai

    2012-01-01

    Full Text Available We apply semigroup property of enhanced Chebyshev polynomials to present an anonymous authentication protocol. This paper aims at improving security and reducing computational and storage overhead. The proposed scheme not only has much lower computational complexity and cost in the initialization phase but also allows the users to choose their passwords freely. Moreover, it can provide revocation of lost or stolen smart card, which can resist man-in-the-middle attack and off-line dictionary attack together with various known attacks.

  12. Anonymous Card Shuffling and its Applications to Parallel Mixnets

    CERN Document Server

    Goodrich, Michael T

    2012-01-01

    We study the question of how to shuffle $n$ cards when faced with an opponent who knows the initial position of all the cards {\\em and} can track every card when permuted, {\\em except} when one takes $K< n$ cards at a time and shuffles them in a private buffer "behind your back," which we call {\\em buffer shuffling}. The problem arises naturally in the context of parallel mixnet servers as well as other security applications. Our analysis is based on related analyses of load-balancing processes. We include extensions to variations that involve corrupted servers and adversarially injected messages, which correspond to an opponent who can peek at some shuffles in the buffer and who can mark some number of the cards. In addition, our analysis makes novel use of a sum-of-squares metric for anonymity, which leads to improved performance bounds for parallel mixnets and can also be used to bound well-known existing anonymity measures.

  13. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  14. "Un-Googling” publications: The ethics and problems of anonymization

    DEFF Research Database (Denmark)

    Shklovski, Irina; Vertesi, Janet

    2013-01-01

    to the ethics of exposure of our research participants. We present one approach to anonymization of research results with search engines in mind, which we call un-Googling, that we have developed to minimize risk to our participants. We discuss the considerations that this approach raises and pose a challenge...... to the HCI community to take up this discussion not only as an ethical consideration but also as a socio-technical research and design opportunity....

  15. Forensic linguistics: Applications of forensic linguistics methods to anonymous letters

    OpenAIRE

    NOVÁKOVÁ, Veronika

    2011-01-01

    The title of my bachelor work is ?Forensic linguistics: Applications of forensic linguistics methods to anonymous letters?. Forensic linguistics is young and not very known branch of applied linguistics. This bachelor work wants to introduce forensic linguistics and its method. The bachelor work has two parts ? theory and practice. The theoretical part informs about forensic linguistics in general. Its two basic aspects utilized in forensic science and respective methods. The practical part t...

  16. Twelve defining moments in the history of alcoholics anonymous.

    Science.gov (United States)

    White, William L; Kurtz, Ernest

    2008-01-01

    Misconceptions about Alcoholics Anonymous (AA) abound in spite of (or because of) the thousands of theses, dissertations, books, professional and popular articles, and Internet commentaries that have been written about AA. One of the most pervasive characterizations of AA is that it is a "treatment" for alcoholism--a characterization that distorts the meaning of both mutual aid and alcoholism treatment. This article describes 12 character-defining moments in the history of AA that highlight the differences between AA and alcoholism treatment.

  17. Alcoholics Anonymous-Related Helping and the Helper Therapy Principle.

    Science.gov (United States)

    Pagano, Maria E; Post, Stephen G; Johnson, Shannon M

    2010-01-01

    The helper therapy principle (HTP) observes the helper's health benefits derived from helping another with a shared malady. The HTP is embodied by the program of Alcoholics Anonymous as a method to diminish egocentrism as a root cause of addiction. This article reviews recent evidence of the HTP in alcohol populations, extends to populations with chronic conditions beyond addiction, and concludes with new directions of empirical inquiry.

  18. Mobile Anonymous Trust Based Routing Using Ant Colony Optimization

    Directory of Open Access Journals (Sweden)

    R. Kalpana

    2012-01-01

    Full Text Available Problem statement: Ad hoc networks are susceptible to malicious attacks through denial of services, traffic analysis and spoofing. The security of the ad hoc routing protocol depends upon encryption, authentication, anonymity and trust factors. End-to-end security of data is provided by encryption and authentication, topology information of the nodes can be obtained by studying traffic and routing data. This security problem of ad hoc network is addressed by the use of anonymity mechanisms and trust levels. Identification information like traffic flow, network topology, paths from malicious attackers is hidden in anonymous networks. Similarly, trust plays a very important role in the intermediate node selection in ad hoc networks. Trust is essential as selfish and malicious nodes not only pose a security issue but also decreases the Quality of Service. Approach: In this study, a routing to address anonymous routing with a trust which improves the overall security of the ad hoc network was proposed. A new approach for an on demand ad-hoc routing algorithm, which was based on swarm intelligence. Ant colony algorithms were a subset of swarm intelligence and considered the ability of simple ants to solve complex problems by cooperation. The interesting point was, that the ants do not need any direct communication for the solution process, instead they communicate by stigmergy. The notion of stigmergy means the indirect communication of individuals through modifying their environment. Several algorithms which were based on ant colony problems were introduced in recent years to solve different problems, e.g., optimization problems. Results and Conclusion: It is observed that the overall security in the network improves when the trust factor is considered. It is seen that non performing nodes are not considered due to the proposed ACO technique.

  19. Time Lag and Anonymity as Variables in Student Evaluation of Curricula

    Science.gov (United States)

    Pierce, Walter D.; Getz, Howard G.

    1975-01-01

    The major concern of this study was the effect on evaluation data of anonymity and differing time spans between completion of specific programs by students and their responses to anonymous questionnaires. (Author)

  20. Enhancing physicians' use of Alcoholics Anonymous: Internet-based training.

    Science.gov (United States)

    Sellers, Brealyn; Galanter, Marc; Dermatis, Helen; Nachbar, Martin

    2005-01-01

    Alcoholics Anonymous is not yet fully employed by the medical community as a means to enhance patient outcome. The purpose of this study was to evaluate visitors' use of an Internet course on Alcoholics Anonymous, and to compare how various disciplines learned about, gained access to and participated in the course. Demographic information was collected from 414 visitors to the course. 64% of the 414 respondents received their last educational degree within the last 10 years, and had an interest in the topic of addiction prior to their accessing the site. 294 (71%) of those who accessed the course completed it, and those who accessed it learned about it from various sources other than print advertisement in professional journals. Within the 230 physician respondents, 143 (62%) were psychiatrists, 82 (78%) of whom learned about the Internet course via professional journal. Given the need for further training among physicians in the use of Alcoholics Anonymous, the Internet can be utilized to make information available to a large number of people. Because it allows the user to access information outside the traditional means, the barriers to its use are minimal, and it has the potential to effectively convey useful clinical information.

  1. Utility-guided Clustering-based Transaction Data Anonymization

    Directory of Open Access Journals (Sweden)

    Aris Gkoulalas-Divanis

    2012-04-01

    Full Text Available Transaction data about individuals are increasingly collected to support a plethora of applications, spanning from marketing to biomedical studies. Publishing these data is required by many organizations, but may result in privacy breaches, if an attacker exploits potentially identifying information to link individuals to their records in the published data. Algorithms that prevent this threat by transforming transaction data prior to their release have been proposed recently, but they may incur significant utility loss due to their inability to: (i accommodate a range of different privacy requirements that data owners often have, and (ii guarantee that the produced data will satisfy data owners’ utility requirements. To address this issue, we propose a novel clustering-based framework to anonymizing transaction data, which provides the basis for designing algorithms that better preserve data utility. Based on this framework, we develop two anonymization algorithms which explore a larger solution space than existing methods and can satisfy a wide range of privacy requirements. Additionally, the second algorithm allows the specification and enforcement of utility requirements, thereby ensuring that the anonymized data remain useful in intended tasks. Experiments with both benchmark and real medical datasets verify that our algorithms significantly outperform the current state-of-the-art algorithms in terms of data utility, while being comparable in terms of efficiency.

  2. Survey of Anonymous Routing Protocols for Mobile Ad Hoc Networks%移动自组网的匿名路由协议研究综述

    Institute of Scientific and Technical Information of China (English)

    秦丰林; 葛连升; 刘琚; 段海新

    2009-01-01

    移动自组网中的恶意节点对路由协议的安全和隐匿具有严重威胁.现在针对安全路由协议的研究很多,但是很少有人涉及匿名性问题,匿名路由协议能够实现节点身份、位置和通信关系的隐匿,在军事和其它机密通信领域中具有重要意义.首先对匿名路由协议面临的攻击行为进行分析,介绍其定义、分类和匿名性评价方法,然后概括性的介绍已有的典型匿名路由协议,比较其匿名性和安全性,最后对以后研究的问题和方向作了总结和展望.%Malicious nodes in mobile ad hoc networks (MANETs) impose great threat on the security and anonymity of routing protocols. Although there is a huge amount of work in secure routing protocols, few focuses on anonymity problems recent years. Anonymous routing protocols are significantly important in military and other confidential areas because of their capability of hiding the node's identity, location and communication relations. In this paper, a detailed survey of existing literature on anonymous routing protocols is presented. Attack behaviois in anonymous routing protocols are first identified, and the strict definition, taxonomy and anonymity evaluation metrics are also introduced. Then several typical anonymous routing protocols are generally described and their performance on security and anonymity are analyzed and compared as well. At last, some main problems and possible directions for future research are summarized and discussed.

  3. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    Science.gov (United States)

    Majeed, Abdul; Ullah, Farman; Lee, Sungchang

    2017-01-01

    Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims. PMID:28481298

  4. Reexamination of the Association between Anonymity and Self-Interested Unethical Behavior in Adults

    Science.gov (United States)

    Nogami, Tatsuya

    2009-01-01

    The well-established notion that the frequency of self-interested unethical behavior increases among anonymous people was reexamined employing a more strict definition of anonymity, voluntary unethical behavior, and adult individuals. Anonymity was defined as nonassociability of the participant's traits with respect to unethical behavior. The…

  5. Serbs in the poetry of Theodore Prodromos and anonymous Manganeios

    Directory of Open Access Journals (Sweden)

    Stanković Vlada

    2006-01-01

    Full Text Available Numerous rhetorical writings of the Comnenian period constitute a fruitful field of research, both with respect to historical data, i.e. hard historical facts hidden, though still recognizable, behind the peculiar and somewhat abstract mode of expression of the authors of the twelfth century, and with regard to the poetics of the literary works themselves, i.e. the internal elements characteristic not only for the genre chosen, but also for each particular author. A comparative, historical and literary approach to these works renders their sense clearer and their complex allusions more readily understood. This is a matter of some importance, since allusions constitute one of the basic elements of historical rhetoric, which reached its peak at the time of Emperor Manuel Komnenos (1143-1180, especially during the first half of his reign, i.e. till the end of the fifties of the twelfth century. The poetry of Theodore Prodromes and of the somewhat younger Anonymous ('Prodromos' Manganeios is an excellent example of this intertwining of historical and literary elements, i.e. of the presentation of historical data through rhetorical patterns. One has to concentrate on individual works attempting to determine, as far as possible, the date of composition, the circumstances of writing and the purpose of a particular poem, the occasion for which it was written and the character of the expected audience, in order to better understand both the poetry written by these two rhetoricians and the individual features of the authors, as well as their respective positions in the circle around Emperor Manuel Komnenos. The poems dealt with in the present paper stand out for calling the Serbs by their real name. This naming practice was invariably employed by both rhetoricians in cases when new achievements of the basileus were to be announced and proclaimed immediately after the event, on the occasions of first reports, first celebrations of the new victories and

  6. [Sexual behavior characteristics of clients attending the Israel AIDS Task Force anonymous clinic in Tel Aviv].

    Science.gov (United States)

    Bar-On, Yaeli; Perry, Zvi H; Nof, Einav; Shiber, Asher; Risenberg, Klaris; Ben Zion, Itzhak

    2014-09-01

    Until now, research on sexual behavior and HIV in Israel has been carried out mainly on the general population, and focused primarily on defining populations at risk, without adequate consideration given to the reasons bringing these populations to be tested, and their specific sexual behaviors. In Israel, one can choose whether to take an HIV test in confidential centers (giving one's name under medical confidentiality) or in anonymous centers (Israel AIDS Task Force in Tel Aviv and Beer Sheva, Levinsky Clinic in Tel Aviv and Haparsim Clinic in Haifa]. At least 21% of the clients of the anonymous testing centers in Israel belong to a high risk population in contrast to 2.6% in confidential clinics, and so, in this study, we hypothesize that characterization of sexual behavior patterns in anonymous testing centers might enable us to better characterize sexual behavior patterns in high risk populations. In this cross-sectional study, we used questionnaires distributed in the clinics by the Israel AIDS Task Force in order to characterize their clinic's clients. The questionnaires were completed by the Israel AIDS Task Force consultants during the consultation period at which the anonymous test was performed. Data collected included: gender, age, testing history, specific sexual behaviors and reasons for applying for the current test. A total of 926 questionnaires were collected; 29.9% of them were of female patients. The average age was 29.47 years (1±8.66]; 21.3% of the clients were men who have sex with men [MSM]; only 2.3% of the clients belonged to other high risk populations. In all groups, the majority of the patients reported high risk sexual behavior (any sexual contact without a condom) and the average age for the first test was much higher than the average age of first sexual intercourse common in Israel. Women reported more participation in unprotected vaginal intercourse than heterosexual men, and a substantial part of MSM reported performing unprotected

  7. The implications of stigma and anonymity for self-disclosure in health blogs.

    Science.gov (United States)

    Rains, Stephen A

    2014-01-01

    The reported study examines the implications of anonymity and stigma in the form of illness-related embarrassment for self-disclosure in the context of health blogging. Drawing from theorizing about anonymous communication and stigma, anonymity is argued to be strategically used by individuals who are embarrassed by their illness and to moderate the relationship between embarrassment and self-disclosure. Data from 114 individuals who blog about their experiences coping with a health condition were examined to test study hypotheses. Illness-related embarrassment was positively associated with anonymity. Additionally, anonymity moderated the relationship between embarrassment and self-disclosure. Among bloggers with relatively higher levels of anonymity, illness-related embarrassment was positively associated with self-disclosure. The results suggest that anonymity is strategically used and fosters self-disclosure among individuals who are embarrassed by their illness.

  8. Was ist das Hidden Web? Die Entstehung, Eigenschaften und gesellschaftliche Bedeutung von anonymer Kommunikation im Hidden Web.

    OpenAIRE

    Papsdorf, Christian

    2016-01-01

    More than two-and-a-half million people currently use the Tor network to communicate anonymously via the Internet and gain access to online media that are not accessible using standard Internet technology. This sphere of communication can be described as the hidden web. In part because this phenomenon is very recent, the subject has scarcely been studied in the social sciences. It is therefore the purpose of this paper to answer four fundamental questions: What is the hidden web? What charact...

  9. Quantum election scheme based on anonymous quantum key distribution

    Institute of Scientific and Technical Information of China (English)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented,based on which we construct a quantum election scheme without the help of an entanglement state.We show that this election scheme ensures the completeness,soundness,privacy,eligibility,unreusability,fairness,and verifiability of a large-scale election in which the administrator and counter are semi-honest.This election scheme can work even if there exist loss and errors in quantum channels.In addition,any irregularity in this scheme is sensible.

  10. Alcoholics anonymous and other twelve-step programs in recovery.

    Science.gov (United States)

    Detar, D Todd

    2011-03-01

    Recovery is a new way of life for many patients; a life without substances to alter their moods but with a major change improving the physical, psychological, and emotional stability with improved overall health outcomes. The Twelve Steps of the Alcoholics Anonymous (AA) are the foundation of the AA, describing both the necessary actions and the spiritual basis for the recovery program of the AA. The Twelve Steps of the AA provide a structure for which a patient with alcoholism may turn for an answer to their problem of alcohol use, abuse, or dependence. Copyright © 2011 Elsevier Inc. All rights reserved.

  11. THINKING ABOUT REFERRALS TO ALCOHOLICS ANONYMOUS IN RELATIONAL WAYS

    Directory of Open Access Journals (Sweden)

    Christopher K. Bitten

    2010-02-01

    Full Text Available This article examines Alcoholics Anonymous (AA as a relational therapy, seen through the lens of the relational needs described by Richard Erskine. AA as a resource may be underemployed by therapists who do not realize its potential to heal the relational damage suffered and inflicted by their alcoholic clients. Common misconceptions about AA are addressed, and ways for therapists to facilitate successful referrals of clients to AA are described. The author posits that there is a synergistic benefit in combining integrative psychotherapy with the client’s involvement in AA.

  12. A New Group Signature Scheme and Its Performance

    Institute of Scientific and Technical Information of China (English)

    MA Jianfeng; YANG Bo; Chiam Tee Chye; Kot Chichung Alex

    2001-01-01

    Group signatures allow every memberof a group to sign some given messages on behalf of thegroup anonymously. Only a designated group man-ager can open a signature to reveal the identity of thesigner. To the best of our knowledge, all known groupsignature solutions have some undesirable properties.In this paper, we propose a new group signaturescheme combining linear codes and known digital sig-nature methods. This scheme possesses all group sig-nature properties including coalition-resistance, andcan be implemented easily. The security of this signa-ture scheme is determined by the difficulty of discretelogarithm problem over finite fields.

  13. Substance use related behavior of the members of Narcotics Anonymous and Alcoholics Anonymous in Greece.

    Science.gov (United States)

    Raftopoulos, Antonis; Flora, Katerina

    2011-01-01

    The aim of this research project is to provide basic information regarding the use of substances and its behavioral consequences such as health problems and criminal offences. It is the first survey in Greece in the field of self-help groups. The main research instrument was a 55-item questionnaire that was administered to members of NA and AA in the Greek cities of Athens, Thessaloniki, Serres, Nafplio, Iraklio, and Katerini. This article presents an analysis of the answers given by the respondents to 12 of the 55 items of the questionnaire. It also includes a comparison of the relevant findings with data provided by the central organizations of AA and NA as well as by official therapeutic programs in Greece and by other researchers who have studied the same subject. More specifically, this article presents, examines and analyzes data which focuses on: (a) the age at which a substance was first used, (b) the time it took the individual respondents to acknowledge such use as a problem, (c) the main substance abused at the onset, (d) the main substance in use when the individuals approached the self-help group, (e) the existence or not of another individual with a substance abuse disorder in the immediate family, (f) possible health problems and (g) the entanglement or not with the penal justice system.

  14. Attendance at Narcotics Anonymous and Alcoholics Anonymous meetings, frequency of attendance and substance use outcomes after residential treatment for drug dependence: a 5-year follow-up study.

    Science.gov (United States)

    Gossop, Michael; Stewart, Duncan; Marsden, John

    2008-01-01

    This study investigates the relationship between frequency of attendance at Narcotics Anonymous and Alcoholics Anonymous (NA/AA) meetings and substance use outcomes after residential treatment of drug dependence. It was predicted that post-treatment NA/AA attendance would be related to improved substance use outcomes. Using a longitudinal, prospective cohort design, interviews were conducted with drug-dependent clients (n = 142) at intake to residential treatment, and at 1 year, 2 years and 4-5 years follow-up. Data were collected by structured interviews. All follow-up interviews were carried out by independent professional interviewers. Abstinence from opiates was increased throughout the 5-year follow-up period compared to pre-treatment levels. Clients who attended NA/AA after treatment were more likely to be abstinent from opiates at follow-up. Abstinence from stimulants increased at follow-up but (except at 1-year follow-up) no additional benefit was found for NA/AA attendance. There was no overall change in alcohol abstinence after treatment but clients who attended NA/AA were more likely to be abstinent from alcohol at all follow-up points. More frequent NA/AA attenders were more likely to be abstinent from opiates and alcohol when compared both to non-attenders and to infrequent (less than weekly) attenders. NA/AA can support and supplement residential addiction treatment as an aftercare resource. In view of the generally poor alcohol use outcomes achieved by drug-dependent patients after treatment, the improved alcohol outcomes of NA/AA attenders suggests that the effectiveness of existing treatment services may be improved by initiatives that lead to increased involvement and engagement with such groups.

  15. Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk

    Directory of Open Access Journals (Sweden)

    Guy Lebanon

    2009-12-01

    Full Text Available An important issue any organization or individual has to face when managing data containing sensitive information, is the risk that can be incurred when releasing such data. Even though data may be sanitized before being released, it is still possible for an adversary to reconstruct the original data using additional information thus resulting in privacy violations. To date, however, a systematic approach to quantify such risks is not available. In this paper we develop a framework, based on statistical decision theory, that assesses the relationship between the disclosed data and the resulting privacy risk. We model the problem of deciding which data to disclose, in terms of deciding which disclosure rule to apply to a database. We assess the privacy risk by taking into account both the entity identification and the sensitivity of the disclosed information. Furthermore, we prove that, under some conditions, the estimated privacy risk is an upper bound on the true privacy risk. Finally, we relate our framework with the k-anonymity disclosure method. The proposed framework makes the assumptions behind k-anonymity explicit, quantifies them, and extends them in several natural directions.

  16. Implementation of Fair-exchange and Anonymous Online E-cash Protocol for E-commerce

    Directory of Open Access Journals (Sweden)

    Harshita

    2016-08-01

    Full Text Available In the world of internet, e-commerce is one of the most prominent sectors where user wants to shop and pay online for online products. E-cash is one of these payment methods. In e-cash, every time a unique string is generated for user so that user uses that string to pay for any online product. At the time of online purchasing a trust should be maintain between customers and merchant such that the product price which is going to pay by customer is fair or not, the merchant is indeed genuine to deliver the product after getting online payment or not. Trust issues are resolved by using fair exchange concept at the time of online purchasing. Anonymity is also a major concern; it means that true identity of users must be hidden from merchant. By keeping these issues in mind we proposed a protocol which ensures users anonymity by using e-cash payment method and fair exchange by using off-line TTP which invokes by customer when any dispute occur from merchant side. In this paper, we implement our proposed protocol and also analyze its performance and compare it with other protocol.

  17. Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting

    CERN Document Server

    Mittal, Prateek; Juen, Joshua; Caesar, Matthew; Borisov, Nikita

    2011-01-01

    Anonymity systems such as Tor aim to enable users to communicate in a manner that is untraceable by adversaries that control a small number of machines. To provide efficient service to users, these anonymity systems make full use of forwarding capacity when sending traffic between intermediate relays. In this paper, we show that doing this leaks information about the set of Tor relays in a circuit (path). We present attacks that, with high confidence and based solely on throughput information, can (a) reduce the attacker's uncertainty about the bottleneck relay of any Tor circuit whose throughput can be observed, (b) exactly identify the guard relay(s) of a Tor user when circuit throughput can be observed over multiple connections, and (c) identify whether two concurrent TCP connections belong to the same Tor user, breaking unlinkability. Our attacks are stealthy, and cannot be readily detected by a user or by Tor relays. We validate our attacks using experiments over the live Tor network. We find that the at...

  18. A Novel Fair Anonymous Contract Signing Protocol for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    A.Damodaram

    2012-10-01

    Full Text Available With the economy developing and popular Internet, the general concept of contract signing has changed.In the past, people usually sign a contract at the same time and same place face to face, but actually eachparty involved in contract may live in different part of earth, they want to sign something for business orsome other things in economic, efficient, secure and fairway. A fair contract signing protocol allows twopotentially mis-trusted parities to exchange their commitments (i.e., digital signatures to an agreedcontract over the Internet in a fair way, so that either each of them obtains the other’s signature, orneither party does. Based on the LUCAS signature scheme, a new digital anonymous contract signingprotocol is proposed in this paper. Like the existing LUCAS-based solutions for the same problem, ourprotocol is fair, anonymous and optimistic. Furthermore, the proposed protocol satisfied a newproperty, i.e., it is abuse-free. That is, if the protocol is executed unsuccessfully, either of the two partiescan not show the validity of intermediate results to others.

  19. IdentiDroid: Android can finally Wear its Anonymous Suit

    Directory of Open Access Journals (Sweden)

    Bilal Shebaro

    2014-04-01

    from applications when the smartphone is used under the anonymous modality. They are re-instated back when the smartphone returns to work in the normal modality. In addition, both solutions offer protection from applications that identify their users through traces left in the application's data storage or through exchanging identifying data messages. We developed IdentiDroid, a customized Android operating system, to deploy these solutions and built IdentiDroid Profile Manager, a profile-based configuration tool that allows one to set different configurations for each installed Android application. With this tool, applications running within the same device are configured to be given different identifications and privileges to limit the uniqueness of device and user information. We analyzed 250 Android applications to determine what information, services, and permissions can identify users and devices. Our experiments show that when IdentiDroid is deployed and properly configured on Android devices, users' anonymity is better guaranteed by either of the proposed solutions with no significant impact on most device applications.

  20. Quantum anonymous voting with unweighted continuous-variable graph states

    Science.gov (United States)

    Guo, Ying; Feng, Yanyan; Zeng, Guihua

    2016-08-01

    Motivated by the revealing topological structures of continuous-variable graph state (CVGS), we investigate the design of quantum voting scheme, which has serious advantages over the conventional ones in terms of efficiency and graphicness. Three phases are included, i.e., the preparing phase, the voting phase and the counting phase, together with three parties, i.e., the voters, the tallyman and the ballot agency. Two major voting operations are performed on the yielded CVGS in the voting process, namely the local rotation transformation and the displacement operation. The voting information is carried by the CVGS established before hand, whose persistent entanglement is deployed to keep the privacy of votes and the anonymity of legal voters. For practical applications, two CVGS-based quantum ballots, i.e., comparative ballot and anonymous survey, are specially designed, followed by the extended ballot schemes for the binary-valued and multi-valued ballots under some constraints for the voting design. Security is ensured by entanglement of the CVGS, the voting operations and the laws of quantum mechanics. The proposed schemes can be implemented using the standard off-the-shelf components when compared to discrete-variable quantum voting schemes attributing to the characteristics of the CV-based quantum cryptography.

  1. Keeping mum about dad: "contracts" to protect gamete donor anonymity.

    Science.gov (United States)

    Rees, Anne

    2012-06-01

    This article considers the legal status of so-called contracts for anonymity between fertility clinics and donors of gametes that were made in the period before legislation authorising disclosure. It notes that while clinics frequently cite the existence of these "contracts" to argue against retrospective legislation authorising disclosure of the donor's identity, they may be nothing more than one-sided statements of informed consent. However, the article notes that even if an agreement between a donor and a clinic is not contractual, it does not follow that a person conceived through assisted reproductive technology has any right of access to the identity of the donor. The writer has not been able to locate examples of written promises by the clinics promising anonymity. There are written promises by the donors not to seek the identity of the recipients. These promises do not bind the resulting offspring nor do they appear to be supported by consideration. The article suggests that the basis for any individual donor to restrain a clinic from revealing their identity may be found in promissory estoppel. Nevertheless, there is no real issue in Australia concerning clinics revealing these details absent legislative authority. The issue is whether parliaments will legislate to authorise the disclosure. The article notes that it would be rare for parliaments to legislate to overturn existing legal contracts but suggests that the contract argument may not be as strong as has been thought.

  2. ANONYMIZATION BASED ON NESTED CLUSTERING FOR PRIVACY PRESERVATION IN DATA MINING

    Directory of Open Access Journals (Sweden)

    V.Rajalakshmi

    2013-07-01

    Full Text Available Privacy Preservation in data mining protects the data from revealing unauthorized extraction of information. Data Anonymization techniques implement this by modifying the data, so that the original values cannot be acquired easily. Perturbation techniques are variedly used which will greatly affect the quality of data,since there is a trade-off between privacy preservation and information loss which will subsequently affect the result of data mining. The method that is proposed in this paper is based on nested clustering of data andperturbation on each cluster. The size of clusters is kept optimal to reduce the information loss. The paper explains the methodology, implementation and results of nested clustering. Various metrics are also provided to explicate that this method overcomes the disadvantages of other perturbation methods.

  3. Listening effort and fatigue: what exactly are we measuring? A British Society of Audiology Cognition in Hearing Special Interest Group 'white paper'.

    Science.gov (United States)

    McGarrigle, Ronan; Munro, Kevin J; Dawes, Piers; Stewart, Andrew J; Moore, David R; Barry, Johanna G; Amitay, Sygal

    2014-07-01

    There is growing interest in the concepts of listening effort and fatigue associated with hearing loss. However, the theoretical underpinnings and clinical meaning of these concepts are unclear. This lack of clarity reflects both the relative immaturity of the field and the fact that research studies investigating listening effort and fatigue have used a variety of methodologies including self-report, behavioural, and physiological measures. This discussion paper provides working definitions for listening effort and listening-related fatigue. Using these definitions as a framework, methodologies to assess these constructs are reviewed. Although each technique attempts to characterize the same construct (i.e. the clinical presentation of listening effort and fatigue), different assumptions are often made about the nature of these phenomena and their behavioural and physiological manifestations. We suggest that researchers consider these assumptions when interpreting their data and, where possible, make predictions based on current theoretical knowledge to add to our understanding of the underlying mechanisms of listening effort and listening-related fatigue. Following recent interest in the cognitive involvement in hearing, the British Society of Audiology (BSA) established a Special Interest Group on Cognition in Hearing in May 2013. In an exploratory group meeting, the ambiguity surrounding listening effort and fatigue was discussed. To address this problem, the group decided to develop a 'white paper' on listening effort and fatigue. This is a discussion document followed by an international set of commentaries from leading researchers in the field. An approach was made to the editor of the International Journal of Audiology who agreed to this suggestion. This paper, and the associated commentaries that follow, are the result.

  4. How safe are adolescents at Alcoholics Anonymous and Narcotics Anonymous meetings? A prospective investigation with outpatient youth.

    Science.gov (United States)

    Kelly, John F; Dow, Sarah J; Yeterian, Julie D; Myers, Mark

    2011-06-01

    Alcoholics Anonymous (AA) and Narcotics Anonymous (NA) have proven to be cost-effective recovery resources for adults and also appear helpful for youth. However, anecdotal concerns about adolescents' safety at meetings have dampened enthusiasm regarding youth participation. Unfortunately, little information exists to evaluate such concerns. Outpatients (N = 127; 24% female) were assessed at intake and at 3, 6, and 12 months regarding perceived safety at AA/NA, experience of negative incidents, and reasons for nonattendance/discontinuation. By 12-month follow-up, 57.5% reported some AA/NA attendance with a combined lifetime exposure of 5,340 meetings. Of these, 21.9% reported at least one negative experience, which was more common among NA than AA attendees. Overall, youth reported feeling very safe at meetings, and ratings did not differ by age or gender. Reasons for discontinuation or nonattendance were unrelated to safety or negative incidents. Weighing risks against documented benefits, these preliminary findings suggest that referral to AA/NA should not be discouraged, but, similar to adults, youth experiences at meetings should be monitored. Copyright © 2011 Elsevier Inc. All rights reserved.

  5. Assessment Role of Participation in Narcotic Anonymous in Opiate Dependents during Abstinence

    Directory of Open Access Journals (Sweden)

    Hossien Zare

    2012-09-01

    Full Text Available Background: The activity level of Narcotics Anonymous group (NA is expanding in many countries, including Iran. Some research has confessed the benefits of 12-step NA approach compared with similar methods. In the present study, the role of regular participation of opioid addicts in the NA group was studied in terms of abstinence rate and compared with routine program of detoxification centers of the person Welfare Organization and Medical Sciences University. Materials and Methods: All addicts who attempted to quit in self-introducer clinical centers of Medical Sciences University and the Welfare Organization of Rafsanjan were suggested to participate and not to participate in NA, based on even and odd numbers, respectively. Among them, two equal 120-person (NA and control groups were selected, then evaluated every three months and followed up for 12 months. Their status was assessed through questionnaires, interviews, and morphine tests.Results: The purity rate of NA group with 8.49 months was significantly different with normal addicts in 5.19 months (p=0.001. The recurrence rate at 12 months was significantly lower in the NA group compared with the control group, calculated through independent t-test (p=0.001. Quitting history and addiction duration in the NA group was significantly higher than control group.Conclusion: The findings of the research support a better prognosis for participants of NA group. Further researches are recommended to provide useful clinical information for patients and professionals.

  6. A secure quantum group signature scheme based on Bell states

    Science.gov (United States)

    Zhang, Kejia; Song, Tingting; Zuo, Huijuan; Zhang, Weiwei

    2013-04-01

    In this paper, we propose a new secure quantum group signature with Bell states, which may have applications in e-payment system, e-government, e-business, etc. Compared with the recent quantum group signature protocols, our scheme is focused on the most general situation in practice, i.e. only the arbitrator is trusted and no intermediate information needs to be stored in the signing phase to ensure the security. Furthermore, our scheme has achieved all the characteristics of group signature—anonymity, verifiability, traceability, unforgetability and undeniability, by using some current developed quantum and classical technologies. Finally, a feasible security analysis model for quantum group signature is presented.

  7. Evaluating the impact of k-anonymization on the inference of interaction networks

    Directory of Open Access Journals (Sweden)

    Pedro Rijo

    2016-04-01

    Full Text Available We address the publication of a large academic information dataset while ensuring privacy. We evaluate anonymization techniques achieving the intended protection, while retaining the utility of the anonymized data. The published data can help to infer behaviors and study interaction patterns in an academic population. These could subsequently be used to improve the planning of campus life, such as defining cafeteria opening hours or assessing student performance. Moreover, the nature of academic data is such that many implicit social interaction networks can be derived from available datasets, either anonymized or not, raising the need for researching how anonymity can be assessed in this setting. Hence we quantify the impact of anonymization techniques over data utility and the impact of anonymization on behavioural patterns analysis.

  8. Selfrando: Securing the Tor Browser against De-anonymization Exploits

    Directory of Open Access Journals (Sweden)

    Conti Mauro

    2016-10-01

    Full Text Available Tor is a well-known anonymous communication system used by millions of users, including journalists and civil rights activists all over the world. The Tor Browser gives non-technical users an easy way to access the Tor Network. However, many government organizations are actively trying to compromise Tor not only in regions with repressive regimes but also in the free world, as the recent FBI incidents clearly demonstrate. Exploiting software vulnerabilities in general, and browser vulnerabilities in particular, constitutes a clear and present threat to the Tor software. The Tor Browser shares a large part of its attack surface with the Firefox browser. Therefore, Firefox vulnerabilities (even patched ones are highly valuable to attackers trying to monitor users of the Tor Browser.

  9. Alcoholics Anonymous and reduced impulsivity: a novel mechanism of change.

    Science.gov (United States)

    Blonigen, Daniel M; Timko, Christine; Moos, Rudolf H

    2013-01-01

    ABSTRACT   Reduced impulsivity is a novel, yet plausible, mechanism of change associated with the salutary effects of Alcoholics Anonymous (AA). Here, the authors review their work on links between AA attendance and reduced impulsivity using a 16-year prospective study of men and women with alcohol use disorders (AUDs) who were initially untreated for their drinking problems. Across the study period, there were significant mean-level decreases in impulsivity, and longer AA duration was associated with reductions in impulsivity. In turn, decreases in impulsivity from baseline to Year 1 were associated with fewer legal problems and better drinking and psychosocial outcomes at Year 1, and better psychosocial functioning at Year 8. Decreases in impulsivity mediated associations between longer AA duration and improvements on several Year 1 outcomes, with the indirect effects conditional on participants' age. Findings are discussed in terms of their potential implications for research on AA and, more broadly, interventions for individuals with AUDs.

  10. Alcoholics Anonymous in Ireland: AA's first European experience.

    Science.gov (United States)

    Butler, Shane; Jordan, Tony

    2007-06-01

    To trace the evolution of Alcoholics Anonymous in Ireland from its establishment there in 1946, focusing on the efforts of early members to publicize the fellowship and negotiate a role for themselves in relation to existing religious and healthcare institutions. Archival research, drawing mainly on primary sources in AA archives in New York and Dublin. Anticipated tensions between this fellowship, which had its roots in Evangelical Protestantism, and the politically powerful Roman Catholic Church in Ireland were skillfully avoided; initial hostility from the medical profession quickly dissipated; and AA distanced itself from policy debate on the wider topic of alcoholism as disease. The relatively smooth introduction of AA to Ireland, the first European country in which it was established, may be attributed to the essentially pragmatic nature of the fellowship and the strategic abilities of its early members.

  11. Evaluating alcoholics anonymous sponsor attributes using conjoint analysis.

    Science.gov (United States)

    Stevens, Edward B; Jason, Leonard A

    2015-12-01

    Alcoholics Anonymous (AA) considers sponsorship an important element of the AA program, especially in early recovery. 225 adult individuals who had experience as either a sponsor, sponsee, or both, participated in a hypothetical sponsor ranking exercise where five attributes were varied across three levels. Conjoint analysis was used to compute part-worth utility of the attributes and their levels for experience, knowledge, availability, confidentiality, and goal-setting. Differences in utilities by attribute were found where confidentiality had the greatest overall possible impact on utility and sponsor knowledge had the least. These findings suggest qualitative differences in sponsors may impact their effectiveness. Future research on AA should continue to investigate sponsor influence on an individual's overall recovery trajectory. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Talking about suicide: confidentiality and anonymity in qualitative research.

    Science.gov (United States)

    Gibson, Susanne; Benson, Outi; Brand, Sarah L

    2013-02-01

    While it is acknowledged that there is a need for more qualitative research on suicide, it is also clear that the ethics of undertaking such research need to be addressed. This article uses the case study of the authors' experience of gaining ethics approval for a research project that asks people what it is like to feel suicidal to (a) analyse the limits of confidentiality and anonymity and (b) consider the ways in which the process of ethics review can shape and constrain suicide research. This leads to a discussion of the ways in which ethics committees assess and monitor qualitative research more generally and some preliminary suggestions for how this might be improved.

  13. Anonymization of Electronic Medical Records to Support Clinical Analysis

    CERN Document Server

    Gkoulalas-Divanis, Aris

    2013-01-01

    Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for su...

  14. Anonymity versus privacy: selective information sharing in online cancer communities.

    Science.gov (United States)

    Frost, Jeana; Vermeulen, Ivar E; Beekers, Nienke

    2014-05-14

    Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients' prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. The goal of the present study is to document patient preferences for sharing information within online health platforms. A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F1,114=135.59, P=.001, η(2)=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Respondents' information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity information. The results suggest the need to focus on

  15. Anonymity Versus Privacy: Selective Information Sharing in Online Cancer Communities

    Science.gov (United States)

    Vermeulen, Ivar E; Beekers, Nienke

    2014-01-01

    Background Active sharing in online cancer communities benefits patients. However, many patients refrain from sharing health information online due to privacy concerns. Existing research on privacy emphasizes data security and confidentiality, largely focusing on electronic medical records. Patient preferences around information sharing in online communities remain poorly understood. Consistent with the privacy calculus perspective adopted from e-commerce research, we suggest that patients approach online information sharing instrumentally, weighing privacy costs against participation benefits when deciding whether to share certain information. Consequently, we argue that patients prefer sharing clinical information over daily life and identity information that potentially compromises anonymity. Furthermore, we explore whether patients’ prior experiences, age, health, and gender affect perceived privacy costs and thus willingness to share information. Objective The goal of the present study is to document patient preferences for sharing information within online health platforms. Methods A total of 115 cancer patients reported sharing intentions for 15 different types of information, demographics, health status, prior privacy experiences, expected community utility, and privacy concerns. Results Factor analysis on the 15 information types revealed 3 factors coinciding with 3 proposed information categories: clinical, daily life, and identity information. A within-subject ANOVA showed a strong preference for sharing clinical information compared to daily life and identity information (F 1,114=135.59, P=.001, η2=.93). Also, adverse online privacy experiences, age, and health status negatively affected information-sharing intentions. Female patients shared information less willingly. Conclusions Respondents’ information-sharing intentions depend on dispositional and situational factors. Patients share medical details more willingly than daily life or identity

  16. A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards

    Institute of Scientific and Technical Information of China (English)

    LU Rong-xing; CAO Zhen-fu; SU Ren-wang

    2006-01-01

    Remote user authentication is essential in distributed network environment to protect unauthorized access of a networked system. However, most of those existing remote user authentication schemes have not provided the user identity anonymity, while user anonymity is particularly important in some practical applications.Therefore, based on self-encryption mechanism, a new remote user authentication scheme was proposed. The scheme not only has no need of maintaining a password table at the remote server, but also can protect the user's anonymity.

  17. Quem controla a política de ninguém? Anonymous Brasil e o ativismo hacker nas redes de comunicação (Who control the politics of no one? Anonymous Brazil and hacktivism in communication networks Doi: 10.5212/Emancipacao.v.15i2.0008

    Directory of Open Access Journals (Sweden)

    Bárbara Maria Farias Mota

    2016-08-01

    Full Text Available Resumo: Esse artigo analisa a atuação política dos hackers a partir de um estudo de caso da rede Anonymous Brasil, uma das vertentes do hacktivismo no contexto brasileiro. Para tanto, utiliza as postagens de um dos diferentes perfis Anonymous no Twitter, no período da Operação Hacking Cup (#OpHackingCup, que consistiu em uma série de protestos virtuais contra a Copa do Mundo de 2014. Metodologicamente, o desenho de pesquisa adota uma abordagem multimétodo, unindo análise de conteúdo e estatística descritiva. Os resultados evidenciam que por meio da utilização de ferramentas digitais transgressivas e do anonimato, esses atores não estatais evidenciam táticas estratégicas de ação diante do controle/vigilância presentes na sociedade contemporânea. Palavras-chave: Anonymous Brasil. Ativismo hacker. Redes informacionais. Abstract: This article analyses the political actuation of hackers from a study case of the Anonymous Brazil network, one of the faces of hacktivism in the Brazilian context. For such, this paper utilises tweets from one Anonymous profile in Twitter, during the period of the Operation Hacking Cup (#OpHackingCup, which entailed several digital protests against the 2014 World Cup. Methodologically, this paper adopts a research design based on a multi-method approach, uniting content analysis and descriptive statistics. The results show that, by the means of transgressive digital tools and anonymity, those actors spotlight strategical tactics as a countermeasure to the control/surveillance that is present in the contemporary society. Keywords: Anonymous Brazil. Hacktivism. Informational networks.

  18. An efficient and secure anonymous authentication scheme for mobile satellite communication systems

    Directory of Open Access Journals (Sweden)

    Yoo Kee-Young

    2011-01-01

    Full Text Available Abstract This paper proposes a new efficient and secure anonymous authentication scheme for mobile satellite communication systems. Compared with the related schemes, the proposed scheme achieves the following three main advantages: (1 It is just based on a secure one-way hash function for avoiding complex computations for both mobile users and network control center (NCC, (2 it does not require sensitive verification table which may cause NCC to become an attractive target for numerous attacks (e.g., insertion attacks and stolen-verifier attacks, and (3 it provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence. As a result, the proposed scheme is very suitable for lightweight-device environments because of very low computation overload on the part of both mobile user and NCC.

  19. DEVELOPING AND MODELING A NEW E-LOTTERY SYSTEM USING ANONYMOUS SIGNATURES

    Directory of Open Access Journals (Sweden)

    FLORIN MEDELEANU

    2016-06-01

    Full Text Available In traditional lottery systems, the players choose some numbers on a ticket, enroll it to the lottery organizer and pay an amount of money for it. But this perspective offers no guarantee to the players that the lottery organizer doesn’t manipulate the number selection in order to pay the least. This suspicion could be avoided if the lottery organizer didn’t know the numbers selected by the players before the draw. Such a system is possible to be realized by using anonymous signatures, but the design should also guarantee that forging lottery tickets after the moment of the draw or claim of a different ticket is not possible. This paper will propose and analyze a model in order to fulfill all requirement described before, using several cryptographic primitives

  20. LOPP: A Location Privacy Protected Anonymous Routing Protocol for Disruption Tolerant Network

    Science.gov (United States)

    Lu, Xiaofeng; Hui, Pan; Towsley, Don; Pu, Juhua; Xiong, Zhang

    In this paper, we propose an anonymous routing protocol, LOPP, to protect the originator's location privacy in Delay/Disruption Tolerant Network (DTN). The goals of our study are to minimize the originator's probability of being localized (Pl) and maximize the destination's probability of receiving the message (Pr). The idea of LOPP is to divide a sensitive message into k segments and send each of them to n different neighbors. Although message fragmentation could reduce the destination's probability to receive a complete message, LOPP can decrease the originator's Pl. We validate LOPP on a real-world human mobility dataset. The simulation results show that LOPP can decrease the originator's Pl by over 54% with only 5.7% decrease in destination's Pr. We address the physical localization issue of DTN, which was not studied in the literature.

  1. Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

    Directory of Open Access Journals (Sweden)

    Jongho Moon

    2017-01-01

    Full Text Available Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible attacks. In this paper, we cautiously analyzed chaotic-map-based authentication scheme and proved that it is still insecure to off-line identity guessing, user and server impersonation, and on-line identity guessing attacks. To address these vulnerabilities, we proposed an improved protocol based on an extended chaotic map and a fuzzy extractor. We proved the security of the proposed protocol using a random oracle and AVISPA (Automated Validation of Internet Security Protocols and Applications tool. Furthermore, we present an informal security analysis to make sure that the improved protocol is invulnerable to possible attacks. The proposed protocol is also computationally efficient when compared to other previous protocols.

  2. Use of alcoholics anonymous as part of medical school education: students' and educators' perspectives.

    Science.gov (United States)

    Stack, Kathleen Marie; Fore Arcand, Lisa G; Briscoe, Greg

    2012-01-01

    The objective of this study was to discover the utility, barriers, and experiences with the use of Alcoholics Anonymous (AA) as a learning resource in the medical school curriculum. A third-year medical student cohort and a psychiatric educator group were queried about learned experiential lessons, attendance requirements, attitudes, and obstacles encountered. Forty-three educators, whose familiarity with AA varied widely, responded to the survey. Forty-seven percent required AA attendance and reported it was a positive experience for their students. Eighty-four percent felt students should attend AA and identified obstacles to its implementation. Separately, descriptive impressions of students (N = 95) who attended AA meetings were collected. Their responses were positive 46%, neutral 43%, or negative 11%. Respondents found AA meeting experiences generally positive, and although impediments to implementation of this experience still exist, they may be overcome with concerted efforts of psychiatric educators.

  3. Do Drug-Dependent Patients Attending Alcoholics Anonymous Rather than Narcotics Anonymous Do As Well? A Prospective, Lagged, Matching Analysis.

    Science.gov (United States)

    Kelly, John F; Greene, M Claire; Bergman, Brandon G

    2014-11-01

    Alcoholics Anonymous (AA) is the most prevalent 12-step mutual-help organization (MHO), yet debate has persisted clinically regarding whether patients whose primary substance is not alcohol should be referred to AA. Narcotics Anonymous (NA) was created as a more specific fit to enhance recovery from drug addiction; however, compared with AA, NA meetings are not as ubiquitous. Little is known about the effects of a mismatch between individuals' primary substance and MHOs, and whether any incongruence might result in a lower likelihood of continuation and benefit. More research would inform clinical recommendations. Young adults (N = 279, M age 20.4, SD 1.6, 27% female; 95% White) in a treatment effectiveness study completed assessments at intake, and 3, 6, and 12 months post-treatment. A matching variable was created for 'primary drug' patients (i.e. those reporting cannabis, opiates or stimulants as primary substance; n = 198/279), reflecting the proportion of total 12-step meetings attended that were AA. Hierarchical linear models (HLMs) tested this variable's effects on future 12-step participation and percent days abstinent (PDA). The majority of meetings attended by both alcohol and drug patients was AA. Drug patients attending proportionately more AA than NA meetings (i.e. mismatched) were no different than those who were better matched to NA with respect to future 12-step participation or PDA. Drug patients may be at no greater risk of discontinuation or diminished recovery benefit from participation in AA relative to NA. Findings may boost clinical confidence in making AA referrals for drug patients when NA is less available. © The Author 2014. Medical Council on Alcohol and Oxford University Press. All rights reserved.

  4. AN EFFECTIVE MULTI-CLUSTERING ANONYMIZATION APPROACH USING DISCRETE COMPONENT TASK FOR NON-BINARY HIGH DIMENSIONAL DATA SPACES

    Directory of Open Access Journals (Sweden)

    L.V. Arun Shalin

    2016-01-01

    Full Text Available Clustering is a process of grouping elements together, designed in such a way that the elements assigned to similar data points in a cluster are more comparable to each other than the remaining data points in a cluster. During clustering certain difficulties related when dealing with high dimensional data are ubiquitous and abundant. Works concentrated using anonymization method for high dimensional data spaces failed to address the problem related to dimensionality reduction during the inclusion of non-binary databases. In this work we study methods for dimensionality reduction for non-binary database. By analyzing the behavior of dimensionality reduction for non-binary database, results in performance improvement with the help of tag based feature. An effective multi-clustering anonymization approach called Discrete Component Task Specific Multi-Clustering (DCTSM is presented for dimensionality reduction on non-binary database. To start with we present the analysis of attribute in the non-binary database and cluster projection identifies the sparseness degree of dimensions. Additionally with the quantum distribution on multi-cluster dimension, the solution for relevancy of attribute and redundancy on non-binary data spaces is provided resulting in performance improvement on the basis of tag based feature. Multi-clustering tag based feature reduction extracts individual features and are correspondingly replaced by the equivalent feature clusters (i.e. tag clusters. During training, the DCTSM approach uses multi-clusters instead of individual tag features and then during decoding individual features is replaced by corresponding multi-clusters. To measure the effectiveness of the method, experiments are conducted on existing anonymization method for high dimensional data spaces and compared with the DCTSM approach using Statlog German Credit Data Set. Improved tag feature extraction and minimum error rate compared to conventional anonymization

  5. NASA/DOD Aerospace Knowledge Diffusion Research Project. Paper 45: A comparison of the information-seeking behaviors of three groups of US aerospace engineers

    Science.gov (United States)

    Kennedy, John M.; Pinelli, Thomas E.; Barclay, Rebecca O.

    1995-01-01

    To understand the transfer of scientific and technical information (STI) in aerospace, it is necessary to understand the characteristics and behaviors of those who create and use STI. In this paper, we analyze the similarities and differences in the scientific and technical information-seeking behaviors of three groups of US aerospace engineers and scientists. We describe some of their demographic characteristics and their duties and responsibilities as a method of understanding their STI use patterns. There is considerable diversity among aerospace engineers in their use of STI. In general, engineers engaged in research use more STI than those who are in design/development and manufacturing/production. Research engineers also use different standards to determine the STI sources and products that they will use.

  6. The Assessment of Eating Behaviour in Children Who Are Obese: A Psychological Approach. A Position Paper from the European Childhood Obesity Group

    Directory of Open Access Journals (Sweden)

    Caroline Braet

    2014-05-01

    Full Text Available Objective: This paper introduces health professionals to the different psychological models thought to influence eating behaviour in the absence of hunger in children who are obese and to propose a method of assessing these behaviours in practice. Methods: Clinical researchers from the European Childhood Obesity Group (ECOG adopted an evidence-based approach to examine the literature concerning the assessment of eating behaviour in children who are obese. Studies published in English were filtered out of the medical and psychological literature from 1960 to the present, and the resulting bibliography was searched for relevant articles. Key themes from the current evidence were compiled and classified according to the underpinning psychological models. Based on the current evidence and the authors' combined clinical experience, a three-staged approach to assessment was agreed by consensus. Results: Valid and reliable tools for assessing and monitoring each of the three identified models (Dietary Restraint Theory, Emotional Eating and the Diathesis-Stress Model are suggested for use in clinical practice, and the ECOG three-staged approach to assessing eating behaviours in the absence of hunger is described. Conclusions: This paper presents practical guidance on how to assess eating behaviour in the absence of hunger in children who are clinically obese and suggests a focus for future research.

  7. 基于MPKCs可撤销匿名性的环签名方案%Ring Signature Scheme with Revocable Anonymity Based on MPKCs

    Institute of Scientific and Technical Information of China (English)

    王晓兰

    2015-01-01

    可撤销匿名性的环签名方案是一种允许多用户完全匿名签名的方案,并可追踪签名者的真实身份,迄今为止所有可撤销匿名性的环签名方案都基于传统密码体制。然而随着量子计算机的出现,传统密码体制的安全性受到威胁。多变量公钥密码体制(MPKCs)是一种高效的密码体制,并且有可能成为后量子时代安全的密码体制。提出了一个基于MPKCs可撤销匿名性的环签名方案,该方案满足无条件匿名性,在非适应性选择消息下满足不可伪造性,可撤销匿名性,且运算效率高。%Ring signature schemes with revocable anonymity allow multi-users to sign the message completely anonymously and to trace real status of signer. So far all of the ring signature schemes with revocable anonymity are based on the traditional cryptosystems. However,with the emergence of quantum computers,the security of the traditional cryptosystems is under threat. Multivariate public key crypto system(MPKCs)is a highly efficient cryptosystem, and it may survive in the post quantum computer times. This paper presents a ring signature scheme with revocable anonymity based on MPKCs. The new ring signature scheme is unconditional anonymity and secure against non-adaptive chosen message attack,it also meets the revocable anonymity,and exceptional efficiency.

  8. The anonymity paradox in patient engagement: reputation, risk and web-based public feedback.

    Science.gov (United States)

    Speed, Ewen; Davison, Charlie; Gunnell, Caroline

    2016-06-01

    The UK National Health Service (NHS) has long espoused patient and public engagement. Recent years have seen increasing use of internet-based methods of collecting feedback about patient experience and public and staff views about NHS services and priorities. Often hailed as a means of facilitating participative democratic patient engagement, these processes raise a number of complex issues. A key aspect of it is the opportunity for comment to be made anonymously. Our research reveals an anonymity paradox whereby patients clearly demonstrate a perception that anonymity is a prerequisite for effective use of these feedback processes, whereas professionals demonstrate a perception that patient anonymity is a barrier to effective use. The risks of anonymity are constructed very differently by patients and professionals. Patient concerns around anonymity were not motivated by a general concern about a loss of privacy, but more that a positive identification might compromise future care. For professionals, concerns were voiced more around risks of reputational damage for specific practitioners or practices (in that anyone could say anything) and also that this anonymous feedback was available publicly and that it might go against the medical opinion of the professional. These concerns pointed to important differences in perceptions of patient and professional vulnerability. In the qualitative analysis that follows the key finding was that while anonymity makes service users feel less vulnerable, it can have the opposite effect on managers and clinical staff. This raises important implications for the use and utility of internet-based methods of collecting patient feedback.

  9. "Sobriety's Kind of Like Freedom": Integrating Ideals of Leisure into the Ideology of Alcoholics Anonymous.

    Science.gov (United States)

    McCormick, Bryan; Dattilo, John

    1995-01-01

    This study examined the integration of "leisure" into the ideology of Alcoholics Anonymous. Participant-observation and in-depth interviews found parallels between the concept of sobriety in Alcoholics Anonymous and philosophical ideals of leisure both as conditions of freedom from compelled activity and freedom to engage in meaningful…

  10. Sister-sister incest: data from an anonymous computerized survey.

    Science.gov (United States)

    Stroebel, Sandra S; O'Keefe, Stephen L; Griffee, Karen; Kuo, Shih-Ya; Beard, Keith W; Kommor, Martin J

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using a computer-assisted self-interview. Thirty-one participants were victims of sister-sister incest, 40 were victims of brother-sister incest, 19 were victims of father-daughter incest, 8 were victims of sexual abuse by an adult female (including one mother), and 232 were victims of sexual abuse by an adult male other than their father before reaching 18 years of age. The rest (1,203) served as controls. The victims of sister-sister incest had significantly more problematic outcomes than controls on many measures as adults. Victims of sister-sister incest were more depressed and more likely than controls to be distant from the perpetrator-sister and to have traded sex for money, experienced an unplanned pregnancy, engaged in four different types of masturbation, and engaged in 13 different same-sex behaviors. Our findings were consistent with other reports of early eroticization and persistent hypereroticization of incest victims.

  11. Deterministic gathering of anonymous agents in arbitrary networks

    CERN Document Server

    Dieudonné, Yoann

    2011-01-01

    A team consisting of an unknown number of mobile agents, starting from different nodes of an unknown network, possibly at different times, have to meet at the same node. Agents are anonymous (identical), execute the same deterministic algorithm and move in synchronous rounds along links of the network. Which configurations are gatherable and how to gather all of them deterministically by the same algorithm? We give a complete solution of this gathering problem in arbitrary networks. We characterize all gatherable configurations and give two universal deterministic gathering algorithms, i.e., algorithms that gather all gatherable configurations. The first algorithm works under the assumption that an upper bound n on the size of the network is known. In this case our algorithm guarantees gathering with detection, i.e., the existence of a round for any gatherable configuration, such that all agents are at the same node and all declare that gathering is accomplished. If no upper bound on the size of the network i...

  12. Is it beneficial to have an alcoholics anonymous sponsor?

    Science.gov (United States)

    Tonigan, J Scott; Rice, Samara L

    2010-09-01

    Alcoholics Anonymous (AA) attendance is predictive of increased abstinence for many problem drinkers and treatment referral to AA is common. Strong encouragement to acquire an AA sponsor is likewise typical, and findings about the benefits associated with social support for abstinence in AA support this practice, at least indirectly. Despite this widespread practice, however, prospective tests of the unique contribution of having an AA sponsor are lacking. This prospective study investigated the contribution of acquiring an AA sponsor using a methodologically rigorous design that isolated the specific effects of AA sponsorship. Participants were recruited from AA and outpatient treatment. Intake and follow-up assessments included questionnaires, semi-structured interviews, and urine toxicology screens. Eligibility criteria limited prior treatment and AA histories to clarify the relationship of interest while, for generalizability purposes, broad substance abuse criteria were used. Of the 253 participants, 182 (72%) provided complete data on measures central to the aims of this study. Overall reductions in alcohol, marijuana, and cocaine use were found over 12-months and lagged analyses indicated that AA attendance significantly predicted increased abstinence. During early AA affiliation but not later logistic regressions showed that having an AA sponsor predicted increased alcohol-abstinence and abstinence from marijuana and cocaine after first controlling for a host of AA-related, treatment, and motivational measures that are associated with AA exposure or are generally prognostic of outcome.

  13. LAS HABILIDADES SOCIALES EN UNIVERSITARIOS, ADOLESCENTES Y ALCOHÓLICOS EN RECUPERACIÓN DE UN GRUPO DE ALCOHÓLICOS ANÓNIMOS (AA/ SOCIAL ABILITIES IN ADOLESCENTS, UNIVERSITY STUDENTS AND ALCOHOLICS IN RECOVERY IN A GROUP OF ALCOHOLICS ANONYMOUS (AA

    Directory of Open Access Journals (Sweden)

    Carlos Nava Quiroz***

    2010-03-01

    were distributed as follows: 58 adolescents (high school students, 55 members of AA and 44college students. Significant differences were found between some subscales and different reference groups. Most of thesedifferences were found in terms of cutting social cognitive skills. The group of alcoholics AA made the difference, showingthem a higher score on the subscales that indicate «fear» or «concern» in certain social situations. We discuss these findingsand their implications for treatment and prevention of alcoholism.

  14. Research on Special Groups Paper Pattern Alternation of Elder Women%关于老年女性特殊体型纸样修正的研究

    Institute of Scientific and Technical Information of China (English)

    邵晨霞

    2012-01-01

    At present,the production of commercial garment in our country uses the country standard of apparel size as major reference values.But elder women,because of their great differences in some values,are excluded from standard form as special form.We discusse some usual special forms of elder women and alternate paper pattern in according to different parts of special forms,in order to provide reference for this special groups of elder women.%目前我国的成衣生产以国家号型标准为主要参考数值,而老年女性由于其某些数值差异太大,被排在标准范围之外成为特殊体型。研究老年女性常见的特殊体型特征,并针对不同部位进行服装结构纸样修正,以期为老年女性服装设计提供参考。

  15. Calculating and reporting effect sizes on scientific papers (1: p < 0.05 limitations in the analysis of mean differences of two groups

    Directory of Open Access Journals (Sweden)

    Helena Espirito Santo

    2015-02-01

    Since p-values from the results of the statistical tests do not indicate the magnitude or importance of a difference, then effect sizes (ES should reported. In fact, ES give meaning to statistical tests; emphasize the power of statistical tests; reduce the risk of interpret mere sampling variation as real relationship; can increase the reporting of “non-significant"results, and allow the accumulation of knowledge from several studies using meta-analysis. Thus, the objectives of this paper are to present the limits of the significance level; describe the foundations of presentation of ES of statistical tests to analyze differences between two groups; present the formulas to calculate directly ES, providing examples of our own previous studies; show how to calculate confidence intervals; provide the conversion formulas for the review of the literature; indicate how to interpret the ES; and show that, although interpretable, the meaning (small, medium or large effect for an arbitrary metric could be inaccurate, requiring that interpretation should be made in the context of the research area and in the context of real world variables.

  16. Drug allergy passport and other documentation for patients with drug hypersensitivity - An ENDA/EAACI Drug Allergy Interest Group Position Paper.

    Science.gov (United States)

    Brockow, K; Aberer, W; Atanaskovic-Markovic, M; Bavbek, S; Bircher, A; Bilo, B; Blanca, M; Bonadonna, P; Burbach, G; Calogiuri, G; Caruso, C; Celik, G; Cernadas, J; Chiriac, A; Demoly, P; Oude Elberink, J N G; Fernandez, J; Gomes, E; Garvey, L H; Gooi, J; Gotua, M; Grosber, M; Kauppi, P; Kvedariene, V; Laguna, J J; Makowska, J S; Mosbech, H; Nakonechna, A; Papadopolous, N G; Ring, J; Romano, A; Rockmann, H; Sargur, R; Sedlackova, L; Sigurdardottir, S; Schnyder, B; Storaas, T; Torres, M; Zidarn, M; Terreehorst, I

    2016-11-01

    The strongest and best-documented risk factor for drug hypersensitivity (DH) is the history of a previous reaction. Accidental exposures to drugs may lead to severe or even fatal reactions in sensitized patients. Preventable prescription errors are common. They are often due to inadequate medical history or poor risk assessment of recurrence of drug reaction. Proper documentation is essential information for the doctor to make sound therapeutic decision. The European Network on Drug Allergy and Drug Allergy Interest Group of the European Academy of Allergy and Clinical Immunology have formed a task force and developed a drug allergy passport as well as general guidelines of drug allergy documentation. A drug allergy passport, a drug allergy alert card, a certificate, and a discharge letter after medical evaluation are adequate means to document DH in a patient. They are to be handed to the patient who is advised to carry the documentation at all times especially when away from home. A drug allergy passport should at least contain information on the culprit drug(s) including international nonproprietary name, clinical manifestations including severity, diagnostic measures, potential cross-reactivity, alternative drugs to prescribe, and where more detailed information can be obtained from the issuer. It should be given to patients only after full allergy workup. In the future, electronic prescription systems with alert functions will become more common and should include the same information as in paper-based documentation.

  17. Novel targets and future strategies for acute cardioprotection: Position Paper of the European Society of Cardiology Working Group on Cellular Biology of the Heart.

    Science.gov (United States)

    Hausenloy, Derek J; Garcia-Dorado, David; Erik Bøtker, Hans; Davidson, Sean M; Downey, James; Engel, Felix B; Jennings, Robert; Lecour, Sandrine; Leor, Jonathan; Madonna, Rosalinda; Ovize, Michel; Perrino, Cinzia; Prunier, Fabrice; Schulz, Rainer; Sluijter, Joost P G; Van Laake, Linda W; Vinten-Johansen, Jakob; Yellon, Derek M; Ytrehus, Kirsti; Heusch, Gerd; Ferdinandy, Péter

    2017-03-17

    Ischaemic heart disease and the heart failure that often results, remain the leading causes of death and disability in Europe and worldwide. As such, in order to prevent heart failure and improve clinical outcomes in patients presenting with an acute ST-segment elevation myocardial infarction and patients undergoing coronary artery bypass graft surgery, novel therapies are required to protect the heart against the detrimental effects of acute ischaemia/reperfusion injury. During the last three decades, a wide variety of ischaemic conditioning strategies and pharmacological treatments have been tested in the clinic - however, their translation from experimental to clinical studies for improving patient outcomes has been both challenging and disappointing. Therefore, in this Position Paper of the European Society of Cardiology Working Group on Cellular Biology of the Heart, we critically analyse the current state of ischaemic conditioning in both the experimental and clinical settings, provide recommendations for improving its translation into the clinical setting, and highlight novel therapeutic targets and new treatment strategies for reducing acute myocardial ischaemia/reperfusion injury.

  18. Mechanisms of behavior change in alcoholics anonymous: does Alcoholics Anonymous lead to better alcohol use outcomes by reducing depression symptoms?

    Science.gov (United States)

    Kelly, John F; Stout, Robert L; Magill, Molly; Tonigan, J Scott; Pagano, Maria E

    2010-04-01

    Indices of negative affect, such as depression, have been implicated in stress-induced pathways to alcohol relapse. Empirically supported continuing care resources, such as Alcoholics Anonymous (AA), emphasize reducing negative affect to reduce relapse risk, but little research has been conducted to examine putative affective mechanisms of AA's effects. Using lagged, controlled, hierarchical linear modeling and mediational analyses this study investigated whether AA participation mobilized changes in depression symptoms and whether such changes explained subsequent reductions in alcohol use. Alcohol-dependent adults (n = 1706), receiving treatment as part of a clinical trial, were assessed at intake, 3, 6, 9, 12 and 15 months. Findings revealed elevated levels of depression compared to the general population, which decreased during treatment and then remained stable over follow-up. Greater AA attendance was associated with better subsequent alcohol use outcomes and decreased depression. Greater depression was associated with heavier and more frequent drinking. Lagged mediation analyses revealed that the effects of AA on alcohol use was mediated partially by reductions in depression symptoms. However, this salutary effect on depression itself appeared to be explained by AA's proximal effect on reducing concurrent drinking. AA attendance was associated both concurrently and predictively with improved alcohol outcomes. Although AA attendance was associated additionally with subsequent improvements in depression, it did not predict such improvements over and above concurrent alcohol use. AA appears to lead both to improvements in alcohol use and psychological and emotional wellbeing which, in turn, may reinforce further abstinence and recovery-related change.

  19. Unclonable Group Identification

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Dupont, Kasper; Pedersen, Michael Østergaard

    2006-01-01

    We introduce and motivate the concept of unclonable group identification, that provides maximal protection against sharing of identities while still protecting the anonymity of users. We prove that the notion can be realized from any one-way function and suggest a more efficient implementation...

  20. A Fair Off-Line E-Cash System with Group Signature

    Institute of Scientific and Technical Information of China (English)

    SU Yun-xue; ZHU Yue-fei

    2004-01-01

    This paper describes the research results and development of fair off-line e-cash systems so far, and points out that in these systems, the bank can compute the double-spender's account secret key, thus the bank can impersonate the double-spender to withdraw from the double-spender's account.This article utilizes anonymity control and group signature to address this shortcoming.

  1. Anonymous birth law saves babies--optimization, sustainability and public awareness.

    Science.gov (United States)

    Grylli, Chryssa; Brockington, Ian; Fiala, Christian; Huscsava, Mercedes; Waldhoer, Thomas; Klier, Claudia M

    2016-04-01

    The aims of this study are to assess the impact of Austria's anonymous birth law from the time relevant statistical records are available and to evaluate the use of hatches versus anonymous hospital delivery. This study is a complete census of police-reported neonaticides (1975-2012) as well as anonymous births including baby hatches in Austria during 2002-2012. The time trends of neonaticide rates, anonymous births and baby hatches were analysed by means of Poisson and logistic regression model. Predicted and observed rates were derived and compared using a Bayesian Poisson regression model. Predicted numbers of neonaticides for the period of the active awareness campaign, 2002-2004, were more than three times larger than the observed number (p = 0.0067). Of the 365 women who benefitted from this legislation, only 11.5% chose to put their babies in a baby hatch. Since the law was introduced, a significant decreasing tendency of numbers of anonymous births (p = 047) was observed, while there was significant increase of neonaticide rates (p = 0.0001). The implementation of the anonymous delivery law is associated with a decrease in the number of police-reported neonaticides. The subsequent significantly decreasing numbers of anonymous births with an accompanying increase of neonaticides represents additional evidence for the effectiveness of the measure.

  2. Personality Patterns in Narcotics Anonymous Members versus Individuals with Addiction Receiving Methadone Maintenance Therapy.

    Directory of Open Access Journals (Sweden)

    Shahin Akhondzadeh

    2014-09-01

    Full Text Available Therapeutic interventions can be classified into two distinct approaches: abstinent and maintenance method. Currently, there are no clear criteria for referring addicted patients to one of these modalities. We aimed to compare the personality characteristics of individuals with addiction who attended narcotics anonymous sessions with those who received methadone maintenance therapy.This was a cross- sectional study. The participants were NA members and patients who were undergoing methadone maintenance treatment in outpatient clinics. Using the randomized cluster sampling method, 200 individuals with opioid dependence were selected (each group 100 persons. Data were collected through a demographic questionnaire and the five-factor personality inventory (NEO-FFI. Comparison of the mean scores of NEO-PPI in the two groups was performed by independent t test, and qualitative variables were compared using the Chi-square test.We found a significant difference between the MMT and NA groups with respect to neuroticism, extroversion, and agreeableness. No significant difference was found in the subscales of conscientious and openness.People who regularly attended the NA sessions had lower neuroticism and higher agreeableness than patients who were under the maintenance modality. Whether this is the cause or effect of attending NA sessions requires future large-scale cohort studies.

  3. Commercial probiotic products: A call for improved quality control. A Position Paper by the ESPGHAN Working Group for Probiotics and Prebiotics.

    Science.gov (United States)

    Kolaček, Sanja; Hojsak, Iva; Canani, Roberto Berni; Guarino, Alfredo; Indrio, Flavia; Orel, Rok; Pot, Bruno; Shamir, Raanan; Szajewska, Hania; Vandenplas, Yvan; van Goudoever, Johannes; Weizman, Zvi

    2017-04-11

    : Probiotics have been proposed for a number of indications ranging from the hypothetical long term immunomodulatory effects to proven benefits in the management of different clinical conditions.An increasing number of commercial products containing probiotics are available. In those products, irrespective if it is food, food supplement, medical food or drug, the probiotic microorganisms have to be present in a sufficient number by the end of the shelf-life, to pass through the gastrointestinal tract resisting acid and bile, to colonize the gut, and to retain functional properties required to obtain the suggested beneficial effect. Finally it should be contamination free.Studies organized worldwide and summarized in this paper have shown that inconsistencies and deviations from the information provided on the product label are surprisingly common. Frequently strains are misidentified and misclassified, products are occasionally contaminated, sometimes with even facultative or obligatory pathogens, strains are not viable, the labelled number of colonies cannot be verified or the functional properties are diminished to the extent that preclude the proposed health benefit. As the probiotic preparations are commonly used for a wide range of conditions, the aim of the Working Group was to summarize results of the studies looking into the quality of the probiotic products and to raise the awareness of the important issue of their quality control.Based on the results obtained, we strongly suggest a more stringent quality control process. This process should ensure that the probiotic content as mentioned on the label meets the actual content throughout the shelf life of the product, while no contamination is present.

  4. Group X

    Energy Technology Data Exchange (ETDEWEB)

    Fields, Susannah

    2007-08-16

    This project is currently under contract for research through the Department of Homeland Security until 2011. The group I was responsible for studying has to remain confidential so as not to affect the current project. All dates, reference links and authors, and other distinguishing characteristics of the original group have been removed from this report. All references to the name of this group or the individual splinter groups has been changed to 'Group X'. I have been collecting texts from a variety of sources intended for the use of recruiting and radicalizing members for Group X splinter groups for the purpose of researching the motivation and intent of leaders of those groups and their influence over the likelihood of group radicalization. This work included visiting many Group X websites to find information on splinter group leaders and finding their statements to new and old members. This proved difficult because the splinter groups of Group X are united in beliefs, but differ in public opinion. They are eager to tear each other down, prove their superiority, and yet remain anonymous. After a few weeks of intense searching, a list of eight recruiting texts and eight radicalizing texts from a variety of Group X leaders were compiled.

  5. Location Anonymity Method for Continuous LBS Requests%一种连续LBS请求下的位置匿名方法

    Institute of Scientific and Technical Information of China (English)

    杨磊; 魏磊; 叶剑; 史红周

    2011-01-01

    为避免不同时刻来自同一用户的连续位置服务(LBS)请求之间的相关攻击,提出一种改进的k-匿名模型,设计一种连续LBS请求下的位置匿名方法.在满足用户隐私要求的前提下,利用位置采样寻找最优的匿名集,使用户平均匿名区域最小.分析结果表明,该方法能合理利用系统计算资源,提高在多用户请求下系统的响应速度.%Location cloaking in terms of continuous Location-Based Services(LBS) request need to consider how to avoid the attack by correlating anonymity areas of different requests from the same user. In term of this privacy problem, this paper proposes an improved k-anonymity model on basis of the traditional k-anonymity model, and designs a state-of-art location anonymity framework and algorithms for continuous LBS requests.This framework guarantees the best Quality of Service(QoS) and good response time of system as well as meeting the privacy requirement. Analysis results show that the method can make better use of the system resources and thus decrease the response time of user's requests.

  6. A Group Signature Based Electronic Toll Pricing System

    CERN Document Server

    Chen, Xihui; Mauw, Sjouke; Pang, Jun

    2011-01-01

    With the prevalence and development of GNSS technologies, location-based vehicle services (LBVS) have experienced a rapid growth in recent years. However, location is a sensitive and private piece of information, so the design and development of such services just take the clients' privacy concerns into account. In this paper, we propose a new electronic toll pricing system based on group signatures, which provides a strong guarantee for the clients' anonymity within groups. Our system achieves a balance between privacy and the communication overhead imposed upon the users.

  7. Intelligence in the power grid and services to the consumers. Issue paper - working group 4; Denmark. Smart Grid Network; Intelligens i el-nettet og serviceydelser til forbrugerne. Issue paper, arbejdsgruppe 4

    Energy Technology Data Exchange (ETDEWEB)

    Jonsen, B.O. (Solar Danmark A/S, Vejen (Denmark)); Hauge, B. (IT-Branchen, Copenhagen (Denmark)); Strunge, C. (Energinet.dk, Fredericia (Denmark)) (and others)

    2011-07-01

    The Smart Grid Network was established in 2010 by the Danish climate and energy minister tasked with developing recommendations for future actions and initiatives that make it possible to handle up to 50% electricity from wind energy in the power system in 2020. The task of working group 4 was to investigate what it takes to involve consumers in smart grid and how to create good conditions for new services related to smart grid. Against this background, the working group agreed the following recommendations: 1) Enhance consumer engagement. A prerequisite for electricity customers becoming involved in smart grid is that they have awareness and knowledge about the smart grid and their own possibilities for action in relation thereto. Therefore it is important that concepts such as smart grid and flexible electricity consumption gradually become popular among electric customers; 2) Minimize the risk. In order to promote electric customers' and other stakeholders' participation in the smart grid, the risk of this participation must be minimized. It is therefore recommended to enhance the skills of the professionals and to establish a common framework for security; 3) Make it easier to create new services. Part of the potential of smart grid can be realized through new services such as delivery of flexible electricity consumption for electric cars and heat pumps and the resale of local power generation at the customer. To facilitate the conditions for these services, the working group recommends that better access to relevant data is created, that the interoperability of smart grid solutions is strengthened, that requirements for buildings are made, that it is made easier to be an aggregator, and that test and inspiration laboratories for small and medium enterprises in the smart grid area are established. (LN)

  8. Exploring Paper.

    Science.gov (United States)

    Brand, Judith, Ed.

    1999-01-01

    Exploratorium Magazine communicates ideas that exhibits cannot easily demonstrate, extending the museum beyond its physical walls. This issue takes an in-depth look at the science and history of paper. Topics include: (1) Fascinating Facts about Paper; (2) A Closer Look at the Paper in This Magazine; (3) Handmade Paper; (4) Paper Airplanes; (5)…

  9. Hacktivism 1-2-3: how privacy enhancing technologies change the face of anonymous hacktivism

    NARCIS (Netherlands)

    Bodó, B.

    2014-01-01

    This short essay explores how the notion of hacktivism changes due to easily accessible, military grade Privacy Enhancing Technologies (PETs). Privacy Enhancing Technologies, technological tools which provide anonymous communications and protect users from online surveillance enable new forms of onl

  10. The Role of the Anonymous Voice in Post-Publication Peer Review Versus Traditional Peer Review

    Directory of Open Access Journals (Sweden)

    Jaime A. Teixeira da Silva

    2015-12-01

    Full Text Available Traditional peer review (TPR has several limitations and weaknesses. Post-publication peer review is one practical way to repair the ills of TPR and reinforce it. A literature that is marked by errors is unhealthy and should, if given the opportunity, be corrected or further improved. The anonymous voice is one source of critique and differs from the blind peer review in TPR in which the reviewer remains anonymous to the authors and/or vice versa, but the identity is known to the editor. If unregulated, the anonymous voice can pose a threat to established editorial norms in TPR, to one of the most important criteria of science publishing, i.e., transparency, and to worthwhile discussion. Yet, if the anonymous voice is not heard, then a vast and potentially valuable pool of untapped opinions may be lost, opinions that may provide valuable solutions to improving TPR.

  11. Democratic Group Signatures with Linkability from Gap Diffie-Hellman Group

    Institute of Scientific and Technical Information of China (English)

    LIU Yan-bin; LI Xiang-xue; QIAN Hai-feng; ZHANG Wen-zheng

    2008-01-01

    Democratic group signatures (DGSs) attract many researchers due to their appealing properties,i.e.,anonymity,traceability and no group manager.Security results of existing work are based on decisional Diffie-Hellman (DDH) assumption.In this paper,we present a democratic group signature scheme based on any gap Diffie-HeUman (GDH) group where DDH problem is easily but computational Diffe-Hellman (CDH)problem is hard to be solved.Besides the properties of ordinary DGSs,our scheme also provides the property of linkability,i.e.,any public verifier can tell whether two group signatures are generated using the same private key.Security properties of our scheme employ a new and independently interesting decisional product Diffie-Hellman (DPDH) assumption which is weaker than DDH one.

  12. PHENOMENAL EXPLORATION INTO IMPACT OF ANONYMITY ON LAW AND ORDER IN CYBERSPACE

    OpenAIRE

    Li, Xingan

    2015-01-01

    While information systems provide modern society with great convenience, it also poses new problems in maintaining social order. One of its negative influences is the anonymity of cyberspace, which makes identity tracing a noteworthy predicament which poses obstacles in detection and investigations. It has been found that cyber anonymity has critical impacts on criminal motivation, and the phenomena of victimization, and should be tackled on different layers including technology and law enfor...

  13. Paper electronics.

    Science.gov (United States)

    Tobjörk, Daniel; Österbacka, Ronald

    2011-05-03

    Paper is ubiquitous in everyday life and a truly low-cost substrate. The use of paper substrates could be extended even further, if electronic applications would be applied next to or below the printed graphics. However, applying electronics on paper is challenging. The paper surface is not only very rough compared to plastics, but is also porous. While this is detrimental for most electronic devices manufactured directly onto paper substrates, there are also approaches that are compatible with the rough and absorptive paper surface. In this review, recent advances and possibilities of these approaches are evaluated and the limitations of paper electronics are discussed.

  14. Problems, solutions, and perspectives in the evaluation of interval cancers in Italian mammography screening programmes: a position paper from the Italian group for mammography screening (GISMa).

    Science.gov (United States)

    Bucchi, Lauro; Frigerio, Alfonso; Zorzi, Manuel; Fedato, Chiara; Angiolucci, Giovanni; Bernardi, Daniela; Campari, Cinzia; Crocetti, Emanuele; Ferretti, Stefano; Giorgi, Daniela; Marchisio, Francesca; Morrone, Doralba; Naldoni, Carlo; Petrella, Marco; Ponti, Antonio; Ravaioli, Alessandra; Saguatti, Gianni; Santini, Dolores; Sassoli de Bianchi, Priscilla; Serafini, Monica; Vergini, Viviana; Giordano, Livia

    2015-01-01

    In this position paper, a self-convened team of experts from the Italian Group for Mammography Screening (Gruppo italiano screening mammografico, GISMa) pointed out the problems that increasingly hamper the feasibility and validity of the estimate of the proportional incidence of interval breast cancer (IBC) in Italy, suggested potential solutions and an agenda for research, and proposed that the question of the sensitivity of mammography be viewed in a larger perspective, with a greater attention to radiological review activities and breast radiology quality assurance programmes. The main problems are as follows: the coverage of cancer registration is incomplete; the robustness of using the pre-screening incidence rates as underlying rates decreases with time since the start of screening; the intermediate mammograms performed for early detection purposes may cause an overrepresentation of IBCs; the classification of many borderline screening histories is prone to subjectivity; and, finally, the composition of cohorts of women with negative screening results is uncertain, because several mammography reports are neither clearly negative nor clearly positive, and because of the limitations and instability of the electronic mammography records. Several possibilities can be considered to cope with these issues: standard methods for using the hospital discharge records in the identification of IBCs should be established; for the calculation of regional estimates of the underlying incidence, a suitable mathematical model should be identified; the definition of IBC according to the 2008 GISMa guidelines needs to be updated, especially with respect to in situ cancers and to invasive cancers with borderline screening histories; a closer adherence to standard screening protocols, with a simplified patient management, would make it easier to objectively identify IBCs; alternative methods for estimating the sensitivity of mammography should be taken into consideration; and

  15. Using propensity scores to adjust for selection bias when assessing the effectiveness of Alcoholics Anonymous in observational studies.

    Science.gov (United States)

    Ye, Yu; Kaskutas, Lee Ann

    2009-09-01

    The effectiveness of Alcoholics Anonymous (AA) is difficult to establish. Observational studies consistently find strong dose-response relationships between AA meeting attendance and abstinence, and the only experimental studies favoring AA have been of 12-step facilitation treatment rather than of AA per se. Pending future randomized trials, this paper uses propensity score (PS) method to address the selection bias that potentially confounds the effect of AA in observational studies. The study followed a treatment sample for 1 year to assess post-treatment AA attendance and abstinence (n=569). Propensity scores were constructed based on known confounders including motivation, problem severity, and prior help-seeking. AA attendance during the 12-month follow-up period was studied as a predictor of alcohol abstinence for 30 days prior to the follow-up interview. PS stratification and PS matching techniques were used to adjust for the self-select bias associated with respondents' propensity to attend AA. The overall advantage in abstinence initially observed narrowed when adjusted. The odds ratio associated with AA attendance reduced from 3.6 to 3.0 after PS stratification and 2.6 after PS matching to AA-attenders. Support for AA effectiveness was strengthened in the quintile with lower propensity scores and when AA-nonattenders were matched as the target group, but was weakened among those in the higher PS quintiles and when matching to AA-attenders. These results confirm the robustness of AA effectiveness overall, because the results for higher abstinence associated with AA attendance following propensity score adjustment remained significant, and the reduction in the magnitude of AA's effect was moderate. However, the effect modification by propensity scores in both PS stratification and PS matching approaches seems to suggest that AA may be most helpful, or matter more, for those with a lower propensity to attend AA. Conversely, for those with a high propensity

  16. Experience with an anonymous web-based state EMS safety incident reporting system.

    Science.gov (United States)

    Gallagher, John M; Kupas, Douglas F

    2012-01-01

    Patient and provider safety is paramount in all aspects of emergency medical services (EMS) systems. The leaders, administrators, and policymakers of these systems must have an understanding of situations that present potential for harm to patients or providers. This study analyzed reports to a statewide EMS safety event reporting system with the purpose of categorizing the types of incidents reported and identifying opportunities to prevent future safety events. This statewide EMS safety incident reporting system is a Web-based system to which any individual can anonymously report any event or situation perceived to impact safety. We reviewed all reports between the system's inception in 2003 through August 2010. A stipulation of the system is that any entry containing information that identifies an EMS provider, agency, or patient will be deleted and thus not included in the analysis. Each event report included the description of the event, the relationship of the reporter, and the year in which the event occurred. Each entry was placed into a category that best represents the situation described. A total of 415 reports were received during the study period, and 186 reports were excluded-163 (39%) excluded by the state because of identifiable information and 23 (6%) excluded by the authors because of nonsensical description. Within the remaining 229 reports, there were 237 distinct safety events. These events were classified as actions/behavior (32%), vehicle/transportation (16%), staffing or ambulance availability (13%), communications (8%), medical equipment (9%), multiple patients/agencies/units and level-of-care issues (7%), medical procedure (6%), medication (5%), accident scene management/scene safety (3%), and protocol issues (1%). EMS providers directly involved in the event represented the largest reporting group (33%). We also provide examples of statewide system and policy changes that were made in direct response to these reports. This EMS safety

  17. Private Queries and Trajectory Anonymization: a Dual Perspective on Location Privacy

    Directory of Open Access Journals (Sweden)

    Gabriel Ghinita

    2009-04-01

    Full Text Available The emergence of mobile devices with Internet connectivity (e.g., Wi-Fi and global positioning capabilities (e.g., GPS have triggered the widespread development of location-based applications. For instance, users are able to ask queries about points of interest in their proximity. Furthermore, users can act as mobile sensors to monitor traffic flow, or levels of air pollution. However, such applications require users to disclose their locations, which raises serious privacy concerns. With knowledge of user locations, a malicious attacker can infer sensitive information, such as alternative lifestyles or political affiliations. Preserving location privacy is an essential requirement towards the successful deployment of location-based services (LBS. Currently, two main LBS use scenarios exist: in the first one, users send location-based queries to an un-trusted server, and the privacy objective is to protect the location of the querying user. In the second setting, a trusted entity, such as a telephone company, gathers large amounts of location data (i.e., trajectory traces and wishes to publish them for data mining (e.g., alleviating traffic congestion. In this case, it is crucial to prevent an adversary from associating trajectories to user identities. In this survey paper, we give an overview of the state-of-the-art in location privacy protection from the dual perspective of query privacy and trajectory anonymization. We review the most prominent design choices and technical solutions, and highlight their relative strengths and weaknesses.

  18. Identification of genes in anonymous DNA sequences. Annual performance report, February 1, 1991--January 31, 1992

    Energy Technology Data Exchange (ETDEWEB)

    Fields, C.A.

    1996-06-01

    The objective of this project is the development of practical software to automate the identification of genes in anonymous DNA sequences from the human, and other higher eukaryotic genomes. A software system for automated sequence analysis, gm (gene modeler) has been designed, implemented, tested, and distributed to several dozen laboratories worldwide. A significantly faster, more robust, and more flexible version of this software, gm 2.0 has now been completed, and is being tested by operational use to analyze human cosmid sequence data. A range of efforts to further understand the features of eukaryoyic gene sequences are also underway. This progress report also contains papers coming out of the project including the following: gm: a Tool for Exploratory Analysis of DNA Sequence Data; The Human THE-LTR(O) and MstII Interspersed Repeats are subfamilies of a single widely distruted highly variable repeat family; Information contents and dinucleotide compostions of plant intron sequences vary with evolutionary origin; Splicing signals in Drosophila: intron size, information content, and consensus sequences; Integration of automated sequence analysis into mapping and sequencing projects; Software for the C. elegans genome project.

  19. E-APSAR:Enhanced Anonymous Position Based Security Aware Routing Protocol For Manets

    Directory of Open Access Journals (Sweden)

    Priyanka Malgi

    2014-03-01

    Full Text Available In the past few years, we have seen a rapid expansion in the field of mobile computing due to the pro- liferation of inexpensive, widely available wireless devices or networks.However, all these networks are conventional wireless networks as they require a fixed network infrastructure with cen- tralised administration for their operation, potentially consuming a lot of time and money for set-up and maintenance.Drawbacks of conventional wireless networks are driving a new alternative way for mobile communication, in which mobile devices form a selfcreating, self-organising and self-administering wireless network, called a mobile ad hoc network.In mobile ad-hoc networking (MANETs, nodes communicate to each other based on public identities. In this paper,for a position based routing[22] an innovative packet forwarding mechanism is proposed in which source node generates route request packet and broadcast packet to other neighbor nodes to locate destination by implementing black hole attack[8]. Proposed E-APSAR (Enhanced Anonymous Position Based security aware routing protocol is implemented on NS-2 and results shown significant improvement over original DSR in terms of various performance metrics. It has been found that on dense network certain numbers of malicious nodes are supportive to reducing communication overhead and because of density negative effect of malicious attacks which is proposed E-APSAR that is able to reduce. Hence result shows proposed E-APSAR will be helpful to decrease communication overhead.

  20. A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    Science.gov (United States)

    Chang, Ya-Fen; Yu, Shih-Hui; Shiao, Ding-Rui

    2013-04-01

    Connected health care provides new opportunities for improving financial and clinical performance. Many connected health care applications such as telecare medicine information system, personally controlled health records system, and patient monitoring have been proposed. Correct and quality care is the goal of connected heath care, and user authentication can ensure the legality of patients. After reviewing authentication schemes for connected health care applications, we find that many of them cannot protect patient privacy such that others can trace users/patients by the transmitted data. And the verification tokens used by these authentication schemes to authenticate users or servers are only password, smart card and RFID tag. Actually, these verification tokens are not unique and easy to copy. On the other hand, biometric characteristics, such as iris, face, voiceprint, fingerprint and so on, are unique, easy to be verified, and hard to be copied. In this paper, a biometrics-based user authentication scheme will be proposed to ensure uniqueness and anonymity at the same time. With the proposed scheme, only the legal user/patient himself/herself can access the remote server, and no one can trace him/her according to transmitted data.

  1. Anonyme, "L’autrier cuidai aber druda" (BdT 461.146

    Directory of Open Access Journals (Sweden)

    Dominique Billy

    2015-08-01

    Full Text Available "L’autrier cuidai aber druda" is one of a small group of texts written in a mixed linguistic variety that has both French and Occitan features and which includes the lais "Markiol" and "Nompar," that are moreover transmitted by the same French manuscript, the so-called Chansonnier du Roi, among a collection of troubadour poems, most of which are also copied in a mixed variety. The accommodation of this kind of text in trouvère songbooks would seem to point to a specific tradition in which troubadour songs would circulate not in their original language, but in a gallicized version, which allowed for the prestige of the source language to be retained as well as maintaining the most important formal features of the poem: versification and sophisticated rhyme schemes. This tradition seems to have encouraged some trouvères – who remain anonymous – to compose poetry directly in this mixed variety, in forms that tend to be characteristic of trouvère poetry. The present text is a lyric adaptation of a parody of Ovid’s "Amores", known as "De Vetula", the interpretation of which has given rise to different opinions, which will be discussed here along with a closer study of the language.

  2. Facilitating involvement in Alcoholics Anonymous during out-patient treatment: a randomized clinical trial.

    Science.gov (United States)

    Walitzer, Kimberly S; Dermen, Kurt H; Barrick, Christopher

    2009-03-01

    This study evaluated two strategies to facilitate involvement in Alcoholics Anonymous (AA)--a 12-Step-based directive approach and a motivational enhancement approach--during skills-focused individual treatment. Randomized controlled trial with assessments at baseline, end of treatment and 3, 6, 9 and 12 months after treatment. PARTICIPANTS, SETTING AND INTERVENTION: A total of 169 alcoholic out-patients (57 women) assigned randomly to one of three conditions: a directive approach to facilitating AA, a motivational enhancement approach to facilitating AA or treatment as usual, with no special emphasis on AA. Self-report of AA meeting attendance and involvement, alcohol consumption (percentage of days abstinent, percentage of days heavy drinking) and negative alcohol consequences. Participants exposed to the 12-Step directive condition for facilitating AA involvement reported more AA meeting attendance, more evidence of active involvement in AA and a higher percentage of days abstinent relative to participants in the treatment-as-usual comparison group. Evidence also suggested that the effect of the directive strategy on abstinent days was mediated partially through AA involvement. The motivational enhancement approach to facilitating AA had no effect on outcome measures. These results suggest that treatment providers can use a 12-Step-based directive approach to effectively facilitate involvement in AA and thereby improve client outcome.

  3. Facilitating Involvement in Alcoholics Anonymous During Outpatient Treatment: A Randomized Clinical Trial

    Science.gov (United States)

    Walitzer, Kimberly S.; Dermen, Kurt H.; Barrick, Christopher

    2009-01-01

    AIM This study evaluated two strategies to facilitate involvement in Alcoholics Anonymous (AA) – a 12-step-based directive approach and a motivational enhancement approach – during skills-focused individual treatment. DESIGN Randomized controlled trial with assessments at baseline, end of treatment, and 3, 6, 9, and 12 months after treatment. PARTICIPANTS, SETTING, and INTERVENTION 169 alcoholic outpatients (57 women) randomly assigned to one of three conditions: a directive approach to facilitating AA, a motivational enhancement approach to facilitating AA, or treatment as usual with no special emphasis on AA. MEASUREMENTS Self-report of AA meeting attendance and involvement, alcohol consumption (percent days abstinent, percent days heavy drinking), and negative alcohol consequences. FINDINGS Participants exposed to the 12-step directive condition for facilitating AA involvement reported more AA meeting attendance, more evidence of active involvement in AA, and a higher percent days abstinent relative to participants in the treatment-as-usual comparison group. Evidence suggested also that the effect of the directive strategy on abstinent days was partially mediated through AA involvement. The motivational enhancement approach to facilitating AA had no effect on outcome measures. CONCLUSIONS These results suggest that treatment providers can use a 12-step-based directive approach to effectively facilitate involvement in AA and thereby improve client outcome. PMID:19207347

  4. Universities and the State in Belgium: Past and Present Dimensions of Higher Education in a Divided Society. Yale Higher Education Research Group Working Paper 29.

    Science.gov (United States)

    Geiger, Roger L.

    This paper, part of a series of studies on higher education in different countries, traces the origins of higher education in Belgium to the 1970's. From 1835-1876, Belgium universities were shaped by polarization bewteen Catholics and liberals, uncertainty about the basic institutional patterns in higher education, and the legislative intrusion…

  5. Laboratory Studies for Planetary Sciences. A Planetary Decadal Survey White Paper Prepared by the American Astronomical Society (AAS) Working Group on Laboratory Astrophysics (WGLA)

    CERN Document Server

    Gudipati, The AAS WGLA: Murthy; Brickhouse, Nancy; Cowan, John; Drake, Paul; Federman, Steven; Ferland, Gary; Frank, Adam; Haxton, Wick; Herbst, Eric; Mumma, Michael; Salama, Farid; Savin, Daniel Wolf; Ziurys, Lucy

    2009-01-01

    The WGLA of the AAS (http://www.aas.org/labastro/) promotes collaboration and exchange of knowledge between astronomy and planetary sciences and the laboratory sciences (physics, chemistry, and biology). Laboratory data needs of ongoing and next generation planetary science missions are carefully evaluated and recommended in this white paper submitted by the WGLA to Planetary Decadal Survey.

  6. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-01-01

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890

  7. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  8. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Institute of Scientific and Technical Information of China (English)

    谢琪; 胡斌; 陈克非; 刘文浩; 谭肖

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency.

  9. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  10. Is Alcoholics Anonymous religious, spiritual, neither? Findings from 25 years of mechanisms of behavior change research.

    Science.gov (United States)

    Kelly, John F

    2017-06-01

    Alcoholics Anonymous (AA) is a world-wide recovery mutual-help organization that continues to arouse controversy. In large part, concerns persist because of AA's ostensibly quasi-religious/spiritual orientation and emphasis. In 1990 the United States' Institute of Medicine called for more studies on AA's effectiveness and its mechanisms of behavior change (MOBC) stimulating a flurry of federally funded research. This paper reviews the religious/spiritual origins of AA and its program and contrasts its theory with findings from this latest research. Literature review, summary and synthesis of studies examining AA's MOBC. While AA's original main text ('the Big Book', 1939) purports that recovery is achieved through quasi-religious/spiritual means ('spiritual awakening'), findings from studies on MOBC suggest this may be true only for a minority of participants with high addiction severity. AA's beneficial effects seem to be carried predominantly by social, cognitive and affective mechanisms. These mechanisms are more aligned with the experiences reported by AA's own larger and more diverse membership as detailed in its later social, cognitive and behaviorally oriented publications (e.g. Living Sober, 1975) written when AA membership numbered more than a million men and women. Alcoholics Anonymous appears to be an effective clinical and public health ally that aids addiction recovery through its ability to mobilize therapeutic mechanisms similar to those mobilized in formal treatment, but is able to do this for free over the long term in the communities in which people live. © 2016 Society for the Study of Addiction.

  11. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  12. Definition of Sensitive Skin: An Expert Position Paper from the Special Interest Group on Sensitive Skin of the International Forum for the Study of Itch

    NARCIS (Netherlands)

    Misery, L.; Stander, S.; Szepietowski, J.C.; Reich, A.; Wallengren, J.; Evers, A.W.M.; Takamori, K.; Brenaut, E.; Gall-Ianotto, C. Le; Fluhr, J.; Berardesca, E.; Weisshaar, E.

    2017-01-01

    Sensitive skin is a frequent complaint in the general population, in patients, and among subjects suffering from itch. The International Forum for the Study of Itch (IFSI) decided to initiate a special interest group (SIG) on sensitive skin. Using the Delphi method, sensitive skin was defined as "A

  13. The Acquisition, Calibration, and Analysis of CTD Data. Unesco Technical Papers in Marine Science No. 54. (A Report of SCOR Working Group 51).

    Science.gov (United States)

    United Nations Educational, Scientific, and Cultural Organization, Paris (France). Div. of Marine Sciences.

    In this report the members of the Scientific Committee on Ocean Research Working Group 51 have attempted to describe the total process involved in obtaining salinity and temperature profiles with modern conductivity-temperature-depth (CTD) instruments. Their objective has been to provide a guide to procedures which will, if allowed, lead to the…

  14. Behavior online : Does anonymous computer communication reduce gender inequality?

    NARCIS (Netherlands)

    Postmes, T; Spears, R

    2002-01-01

    Two studies examined dominance and self-stereotyping in mixed-sex groups who had online discussions. Gender differences in dominance varied as a function of several contextual variables: individuation, the accessibility of gender stereotypes, and the fit between group task and stereotype. Results of

  15. Re-identification of home addresses from spatial locations anonymized by Gaussian skew

    Directory of Open Access Journals (Sweden)

    Cassa Christopher A

    2008-08-01

    Full Text Available Abstract Background Knowledge of the geographical locations of individuals is fundamental to the practice of spatial epidemiology. One approach to preserving the privacy of individual-level addresses in a data set is to de-identify the data using a non-deterministic blurring algorithm that shifts the geocoded values. We investigate a vulnerability in this approach which enables an adversary to re-identify individuals using multiple anonymized versions of the original data set. If several such versions are available, each can be used to incrementally refine estimates of the original geocoded location. Results We produce multiple anonymized data sets using a single set of addresses and then progressively average the anonymized results related to each address, characterizing the steep decline in distance from the re-identified point to the original location, (and the reduction in privacy. With ten anonymized copies of an original data set, we find a substantial decrease in average distance from 0.7 km to 0.2 km between the estimated, re-identified address and the original address. With fifty anonymized copies of an original data set, we find a decrease in average distance from 0.7 km to 0.1 km. Conclusion We demonstrate that multiple versions of the same data, each anonymized by non-deterministic Gaussian skew, can be used to ascertain original geographic locations. We explore solutions to this problem that include infrastructure to support the safe disclosure of anonymized medical data to prevent inference or re-identification of original address data, and the use of a Markov-process based algorithm to mitigate this risk.

  16. Microvesicles in vascular homeostasis and diseases. Position Paper of the European Society of Cardiology (ESC) Working Group on Atherosclerosis and Vascular Biology.

    Science.gov (United States)

    Ridger, Victoria C; Boulanger, Chantal M; Angelillo-Scherrer, Anne; Badimon, Lina; Blanc-Brude, Olivier; Bochaton-Piallat, Marie-Luce; Boilard, Eric; Buzas, Edit I; Caporali, Andreas; Dignat-George, Françoise; Evans, Paul C; Lacroix, Romaric; Lutgens, Esther; Ketelhuth, Daniel F J; Nieuwland, Rienk; Toti, Florence; Tunon, Jose; Weber, Christian; Hoefer, Imo E

    2017-06-28

    Microvesicles are members of the family of extracellular vesicles shed from the plasma membrane of activated or apoptotic cells. Microvesicles were initially characterised by their pro-coagulant activity and described as "microparticles". There is mounting evidence revealing a role for microvesicles in intercellular communication, with particular relevance to hemostasis and vascular biology. Coupled with this, the potential of microvesicles as meaningful biomarkers is under intense investigation. This Position Paper will summarise the current knowledge on the mechanisms of formation and composition of microvesicles of endothelial, platelet, red blood cell and leukocyte origin. This paper will also review and discuss the different methods used for their analysis and quantification, will underline the potential biological roles of these vesicles with respect to vascular homeostasis and thrombosis and define important themes for future research.

  17. The Comparison of Attention Biases to Opiates in Substance Dependent and Treated Clients of Therapeutic Clinics and Narcotics Anonymous Memberships

    Directory of Open Access Journals (Sweden)

    Javad Enayat

    2012-11-01

    Full Text Available Aim: The purpose of this study was to compare the attention bias about tempting incentives related to opium materials in treated, addicted and normal people. Duration of consumption and treating were also considered. Method: In this causal-comparative study population was all addicted people who were referred to the rehabilitation offices, addiction treatment clinic, rebirthing centers and Narcotics Anonymous of East Azerbaijan. This study consisted of five groups of men, including addicted to opium materials which are divided into two groups namely: long consumption period and people with short consumption period, also, treated people including long term treated and short term treated, and a normal control group. Altogether, 103 selected people were studied. Sample groups were similar in terms of age, education, and sex. For measuring attention bias towards tempting stimuli related opiates, a words recognition test was used. This test included three subtests and one recognition test. The recognition scores for the three categories of words were measured. Results: The findings indicated that there was a difference in attention against opium material incentives between control group and the mild and severe consumers groups. Also there were significant differences between treated people with the short time distance and control group, and control group had less temptation and biases in comparison to the other groups. Finally, those who have mild consumption are threatened more in comparison with the control group. Conclusion: The findings have applied implications.

  18. Audio Papers

    DEFF Research Database (Denmark)

    Groth, Sanne Krogh; Samson, Kristine

    2016-01-01

    With this special issue of Seismograf we are happy to present a new format of articles: Audio Papers. Audio papers resemble the regular essay or the academic text in that they deal with a certain topic of interest, but presented in the form of an audio production. The audio paper is an extension...... of the written paper through its specific use of media, a sonic awareness of aesthetics and materiality, and creative approach towards communication. The audio paper is a performative format working together with an affective and elaborate understanding of language. It is an experiment embracing intellectual...... arguments and creative work, papers and performances, written scholarship and sonic aesthetics. For this special issue of Seismograf, the guidelines for authors and peer reviewers mainly focused on the format. Topic-wise we encouraged dealing with site-specificity and topics related to the island Amager...

  19. Patient-centered applications: use of information technology to promote disease management and wellness. A white paper by the AMIA knowledge in motion working group.

    Science.gov (United States)

    Demiris, George; Afrin, Lawrence B; Speedie, Stuart; Courtney, Karen L; Sondhi, Manu; Vimarlund, Vivian; Lovis, Christian; Goossen, William; Lynch, Cecil

    2008-01-01

    Advances in information technology (IT) enable a fundamental redesign of health care processes based on the use and integration of electronic communication at all levels. New communication technologies can support a transition from institution centric to patient-centric applications. This white paper defines key principles and challenges for designers, policy makers, and evaluators of patient-centered technologies for disease management and prevention. It reviews current and emerging trends; highlights challenges related to design, evaluation, reimbursement and usability; and reaches conclusions for next steps that will advance the domain.

  20. An E-Cash Based Implementation Model for Facilitating Anonymous Purchasing of Information Products

    Science.gov (United States)

    Zhang, Zhen; Kim, K. H. (Kane); Kang, Myeong-Ho; Zhou, Tianran; Chung, Byung-Ho; Kim, Shin-Hyo; Lee, Seok-Joon

    The rapid growing of online purchasing of information products poses challenges of how to preserve the customer's privacy during the online transactions. The current widely used way of online shopping does not consider the customer's privacy protection. It exposes the customer's sensitive information unnecessarily. We propose a new five-party implementation model called 5PAPS that provides much enhanced protection of the customer's privacy. The model combines the advantages of the e-cash techniques, the mix technique, the anonymous-honoring merchant model, and the anonymity-protecting payment gateway model. It is aimed for protecting the customer's anonymity in all applicable aspects. Security and anonymity issues of the model have been analyzed. The results show that the model is robust against varieties of common attacks and the customer's anonymity can be protected even in the presence of some collusion among the parties involved in the transactions. Experimental prototyping of the essential parts yields partial validation of the practical nature of the 5PAPS model, and it has also produced reliable estimates of the storage and messaging volume requirements present in sizable purchasing systems.

  1. Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004

    Institute of Scientific and Technical Information of China (English)

    Xin-Yi Huang; Willy Susilo; Yi Mu; Fu-Tai Zhang

    2007-01-01

    Group signature schemes allow a member of a group to sign messages anonymously on behalf of the group.In case of later dispute, a designated group manager can revoke the anonymity and identify the originator of a signature.In Asiacrypt2004, Nguyen and Safavi-Naini proposed a group signature scheme that has a constant-sized public key and signature length, and more importantly, their group signature scheme does not require trapdoor.Their scheme is very efficient and the sizes of signatures are smaller than those of the other existing schemes.In this paper, we point out that Nguyen and Safavi-Naini's scheme is insecure.In particular, it is shown in our cryptanalysis of the scheme that it allows a non-member of the group to sign on behalf of the group.And the resulting signature convinces any third party that a member of the group has indeed generated such a signature, although none of the members has done so.Therefore is in case of dispute, even the group manager cannot identify who has signed the message.In the paper a new scheme that does not suffer from this problem is provided.

  2. "Paper" airplanes

    National Research Council Canada - National Science Library

    2005-01-01

    ... the suggestion came from the custodian, who got his idea from an unlikely place. "You know how toilet paper always has holes in it?" he told the company president. "Well, I noticed that it never tears there. I figured if it works on toilet paper, it would work on a plane."...

  3. PAPER LANDSCAPES

    Institute of Scientific and Technical Information of China (English)

    Lorna Mansley

    2008-01-01

    <正>Take a sheet of paper, a pair of scissors or a knife, a vivid imagination and see what you can create. Synonymous with Chinese folkart, paper cutting no longer seems to be a flourishing craft amongst China’s younger generations of creatives, though its motifs can

  4. Drug allergy passport and other documentation for patients with drug hypersensitivity - An ENDA/EAACI Drug Allergy Interest Group Position Paper

    DEFF Research Database (Denmark)

    Brockow, K; Aberer, W; Atanaskovic-Markovic, M;

    2016-01-01

    history or poor risk assessment of recurrence of drug reaction. Proper documentation is essential information for the doctor to make sound therapeutic decision. The European Network on Drug Allergy and Drug Allergy Interest Group of the European Academy of Allergy and Clinical Immunology have formed...... a task force and developed a drug allergy passport as well as general guidelines of drug allergy documentation. A drug allergy passport, a drug allergy alert card, a certificate, and a discharge letter after medical evaluation are adequate means to document DH in a patient. They are to be handed...... to the patient who is advised to carry the documentation at all times especially when away from home. A drug allergy passport should at least contain information on the culprit drug(s) including international nonproprietary name, clinical manifestations including severity, diagnostic measures, potential cross...

  5. Scientific publications and research groups on alcohol consumption and related problems worldwide: authorship analysis of papers indexed in PubMed and Scopus databases (2005 to 2009).

    Science.gov (United States)

    González-Alcaide, Gregorio; Castelló-Cogollos, Lourdes; Castellano-Gómez, Miguel; Agullo-Calatayud, Víctor; Aleixandre-Benavent, Rafael; Alvarez, Francisco Javier; Valderrama-Zurián, Juan Carlos

    2013-01-01

    The research of alcohol consumption-related problems is a multidisciplinary field. The aim of this study is to analyze the worldwide scientific production in the area of alcohol-drinking and alcohol-related problems from 2005 to 2009. A MEDLINE and Scopus search on alcohol (alcohol-drinking and alcohol-related problems) published from 2005 to 2009 was carried out. Using bibliometric indicators, the distribution of the publications was determined within the journals that publish said articles, specialty of the journal (broad subject terms), article type, language of the publication, and country where the journal is published. Also, authorship characteristics were assessed (collaboration index and number of authors who have published more than 9 documents). The existing research groups were also determined. About 24,100 documents on alcohol, published in 3,862 journals, and authored by 69,640 authors were retrieved from MEDLINE and Scopus between the years 2005 and 2009. The collaboration index of the articles was 4.83 ± 3.7. The number of consolidated research groups in the field was identified as 383, with 1,933 authors. Documents on alcohol were published mainly in journals covering the field of "Substance-Related Disorders," 23.18%, followed by "Medicine," 8.7%, "Psychiatry," 6.17%, and "Gastroenterology," 5.25%. Research on alcohol is a consolidated field, with an average of 4,820 documents published each year between 2005 and 2009 in MEDLINE and Scopus. Alcohol-related publications have a marked multidisciplinary nature. Collaboration was common among alcohol researchers. There is an underrepresentation of alcohol-related publications in languages other than English and from developing countries, in MEDLINE and Scopus databases. Copyright © 2012 by the Research Society on Alcoholism.

  6. White paper report from working groups attending the international conference on research and educational opportunities in bio-fuel crop production

    Energy Technology Data Exchange (ETDEWEB)

    Morgan, K.T. [University of Florida, Soil and Water Science Dep., Southwest Florida Res. and Educ. Center, Immokalee, FL 34142 (United States); Gilbert, R.A. [University of Florida, Agronomy Dep., Everglades Res. and Educ. Center, Belle Glade, FL 33430 (United States); Helsel, Z.A. [Rutgers University, Plant Biology and Pathology Dep., New Brunswick, NJ 08901-8520 (United States); Buacum, L. [University of Florida, Hendry County Extension, LaBelle, FL 33935 (United States); Leon, R.; Perret, J. [EARTH University, Apto. 4442-1000, San Jose (Costa Rica)

    2010-12-15

    A conference on current research and educational programs in production of crops for bio-fuel was sponsored and organized by the EARTH University and the University of Florida in November, 2008. The meeting addressed current research on crops for bio-fuel production with discussions of research alternatives for future crop production systems, land use issues, ethics of food vs. fuel production, and carbon sequestration in environmentally sensitive tropical and sub-tropical regions of the Americas. The need and potential for development of graduate and undergraduate curricula and inter-institutional cooperation among educational institutions in the region were also discussed. Delegations from Belize, Brazil, Columbia, Costa Rica, Cuba, Honduras, Panama, The Dominican Republic, and the United States including ministers of Agriculture and Energy attended this meeting. Over a two-day period, four working groups provided a framework to facilitate networking, motivate task oriented creative thinking, and maintain a timely accomplishment of assigned duties in the context of the conference themes. Participants in the conference were assigned to one of four working groups, each following given topics: Agronomy, Environment, Socio-Economics and Education/Extension. It was the consensus of representatives of industry, academic and regulatory community assembled in Costa Rica that significant research, education and socio-economic information is needed to make production of bio-fuel crops sustainable. Agronomic research should include better crop selection based on local conditions, improved production techniques, pest and disease management, and mechanical cultivation and harvesting. Another conclusion was that tailoring of production systems to local soil characteristics and use of bio-fuel by-products to improve nutrient use efficiency and reduction of environmental impact on water quantity and quality is critical to sustainability of bio-fuel crop production. (author)

  7. VANETs中通信有效的门限匿名认证方案%Communication-efficient Threshold Anonymous Authentication Scheme in VANETs

    Institute of Scientific and Technical Information of China (English)

    杨菁菁; 卢建朱; 江俊晖

    2015-01-01

    在保证可靠性、匿名性和可审核性的同时,提高执行效率和降低通信成本是车载自组织网络( VANETs)的研究热点。针对现有匿名认证方案计算量较大和通信成本较高的问题,提出一种通信有效的门限匿名认证方案。采用基于身份的签名算法提高执行效率,使原始信息可从签名中恢复,从而降低通信成本,利用门限转发机制实现信息的可靠性,使用假名保证发送者的匿名性,通过追踪和撤销机制实现可审核性。分析结果表明,与已有的门限匿名认证方案相比,该方案在保证安全性的同时,具有较低的通信成本和较高的执行效率。%How to improve the computational efficiency and how to reduce the communication cost while achieving the goals of reliability, anonymity and auditability are becoming important research issues of Vehicular Ad Hoc Networks (VANETs). Due to computational efficiency and communication cost of existing anonymous authentication schemes,a communication-efficient threshold anonymous authentication scheme is proposed in this paper. It signs the message by using an identity-based signature algorithm and the original message can be recovered from the signature, which can improve the computational efficiency and reduce the communication cost. The threshold-based forwarding mechanism ensures reliability of information. The anonymity of the message sender is achieved by using pseudonym. In order to achieve auditability,this system is able to track and revoke malicious nodes. Analysis result indicates that the proposed scheme not only satisfies reliability, anonymity and auditability, but also has lower communication cost and better computational efficiency compared with the existing threshold anonymous announcement in VANETs.

  8. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.

    Science.gov (United States)

    Jiang, Qi; Lian, Xinxin; Yang, Chao; Ma, Jianfeng; Tian, Youliang; Yang, Yuanyuan

    2016-11-01

    Wireless body area networks (WBANs) have become one of the key components of mobile health (mHealth) which provides 24/7 health monitoring service and greatly improves the quality and efficiency of healthcare. However, users' concern about the security and privacy of their health information has become one of the major obstacles that impede the wide adoption of WBANs. Anonymous and unlinkable authentication is critical to protect the security and privacy of sensitive physiological information in transit from the client to the application provider. We first show that the anonymous authentication scheme of Wang and Zhang based on bilinear pairing is prone to client impersonation attack. Then, we propose an enhanced anonymous authentication scheme to remedy the flaw in Wang and Zhang's scheme. We give the security analysis to demonstrate that the enhanced scheme achieves the desired security features and withstands various known attacks.

  9. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  10. Physical activity for primary and secondary prevention. Position paper of the Working Group on Cardiac Rehabilitation and Exercise Physiology of the European Society of Cardiology.

    Science.gov (United States)

    Giannuzzi, P; Mezzani, A; Saner, H; Björnstad, H; Fioretti, P; Mendes, M; Cohen-Solal, A; Dugmore, L; Hambrecht, R; Hellemans, I; McGee, H; Perk, J; Vanhees, L; Veress, G

    2003-10-01

    There is now clear scientific evidence linking regular aerobic physical activity to a significant cardiovascular risk reduction, and a sedentary lifestyle is currently considered one of the five major risk factors for cardiovascular disease. In the European Union, available data seem to indicate that less than 50% of the citizens are involved in regular aerobic leisure-time and/or occupational physical activity, and that the observed increasing prevalence of obesity is associated with a sedentary lifestyle. It seems reasonable therefore to provide institutions, health services, and individuals with information able to implement effective strategies for the adoption of a physically active lifestyle and for helping people to effectively incorporate physical activity into their daily life both in the primary and the secondary prevention settings. This paper summarizes the available scientific evidence dealing with the relationship between physical activity and cardiovascular health in primary and secondary prevention, and focuses on the preventive effects of aerobic physical activity, whose health benefits have been extensively documented.

  11. Lifetime Alcoholics Anonymous attendance as a predictor of spiritual gains in the Relapse Replication and Extension Project (RREP).

    Science.gov (United States)

    Tonigan, J Scott; McCallion, Elizabeth A; Frohe, Tessa; Pearson, Matthew R

    2017-02-01

    This study investigated the association between extent of lifetime attendance in Alcoholics Anonymous (AA) and spiritual gains among treatment seeking adults for alcohol use disorder. Participants included 246 individuals from 2 of the 3 sites in the Relapse Replication and Extension Project (Lowman, Allen, Stout, & The Relapse Research Group, 1996). Baseline characteristics included 63% male, 39.9% single, and the average age was 34 years (SD = 8.2). The Alcoholics Anonymous Involvement questionnaire (Tonigan, Connors, & Miller, 1996) was used to assess lifetime AA attendance. The Religious Beliefs & Behaviors Questionnaire (Connors, Tonigan, & Miller, 1996) was used to assess spirituality. Percent days abstinent (PDA) and drinks per drinking day (DPDD) were measured using the Form 90. At baseline, adults with more extensive AA histories were more severely alcohol impaired although they were no older relative to adults with less past AA exposure. Clear patterns of AA engagement were found between the high-low AA history groups over follow-up, with adults with less AA experience reporting less AA participation across a swath of AA-specific measures. Gains in spiritual practices significantly mediated AA-related benefit as measured by PDA and DPDD. Tests for moderated-mediation indicated that the magnitude of the mediational effect of spiritual gains did not differ between high-low AA history groups. Having an extensive AA history did not advantage (or disadvantage) adults in mobilizing future spiritual practices that are prescribed in AA. Clinical assessment of client AA history is important, however, because it predicts both the nature and extent that clients may participate in AA. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  12. "Finite Groups with Quasinormal Subgroups of Prime Power Order"一文的一点注记%A NOTE ON THE PAPER "Finite groups with quasinormal subgroups of prince power order"

    Institute of Scientific and Technical Information of China (English)

    朱静萍

    2004-01-01

    用F*(G)代替F(G),将文"Finite Groups with Quasinormal Subgroups of Prime Power Order,Acta Math Hungar 89(4),2000,321-326"一文中的主要定理的可解性的假设去除,从而推广了该文的结论.

  13. Darknet and bitcoin, the obscure and anonymous side of the internet in healthcare.

    Science.gov (United States)

    Masoni, Marco; Guelfi, Maria Renza; Gensini, Gian Franco

    2016-11-14

    Illegal activities prosecutable by law in the real life can be committed on the internet alike. In the healthcare domain, we refer mainly to selling of illegal and counterfeit drugs, exchange of pedo-pornographic material and marketing of stolen medical records. These illegal activities are made easier by recent developments of the Internet that medical community must be aware of: darknet and bitcoin. The first allows anonymous surfing and the last anonymous financial transactions. After discussing which healthcare areas are affected by these technological developments of the Internet and the deriving consequences, then the Authors express their opinion on what actions can be taken to protect internet community.

  14. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  15. Commercial Probiotic Products: A Call for Improved Quality Control. A Position Paper by the ESPGHAN Working Group for Probiotics and Prebiotics.

    Science.gov (United States)

    Kolaček, Sanja; Hojsak, Iva; Berni Canani, Roberto; Guarino, Alfredo; Indrio, Flavia; Orel, Rok; Pot, Bruno; Shamir, Raanan; Szajewska, Hania; Vandenplas, Yvan; van Goudoever, Johannes; Weizman, Zvi

    2017-07-01

    Probiotics have been proposed for a number of indications ranging from the hypothetical long-term immunomodulatory effects to proven benefits in the management of different clinical conditions.An increasing number of commercial products containing probiotics are available. In those products, irrespective if it is food, food supplement, medical food, or drug, the probiotic microorganisms have to be present in a sufficient number by the end of the shelf-life, to pass through the gastrointestinal tract resisting acid and bile, to colonize the gut, and to retain functional properties required to obtain the suggested beneficial effect. Finally, it should be contamination-free.Studies organized worldwide and summarized in this article have shown that inconsistencies and deviations from the information provided on the product label are surprisingly common. Frequently strains are misidentified and misclassified, products are occasionally contaminated, sometimes with even facultative or obligatory pathogens, strains are not viable, the labeled number of colonies cannot be verified, or the functional properties are diminished to the extent that preclude the proposed health benefit. As the probiotic preparations are commonly used for a wide range of conditions, the aim of the Working Group was to summarize results of the studies looking into the quality of the probiotic products and to raise the awareness of the important issue of their quality control.Based on the results obtained, we strongly suggest a more stringent quality control process. This process should ensure that the probiotic content as mentioned on the label meets the actual content throughout the shelf life of the product, while no contamination is present.

  16. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  17. Social Indispensability in Spite of Temporal and Spatial Separation: Motivation Gains in a Sequential Task During Anonymous Cooperation on the Internet

    Directory of Open Access Journals (Sweden)

    Marion Wittchen

    2007-12-01

    Full Text Available Recent research has demonstrated motivation gains during synchronous group work compared to individual work when group members’ contribution was indispensable for the group’s success (e.g., Hertel, Kerr, & Messé, 2000, Hertel, Deter, & Konradt, 2003. The current study extends this earlier research (a by examining indispensability effects during sequential cooperation (temporal separation, and (b by exploring these effects under conditions of high anonymity on the Internet (spatial separation. A 2 (Internet vs. laboratory context x 3 (high vs. low vs. no impact of personal contribution for a group x 2 (individual vs. group trial design was used with the last factor measured within subjects (N = 231. Motivation was measured with a vigilance task that simulated an Internet travel agency selling package holidays according to incoming customer requests. During all trials, participants received contemporaneous feedback about their own performance. During the group trials, participants additionally received information about their partner’s alleged previous performance at this point of the trial, which suggested that the partner had always performed slightly better than the participant. As expected, both in the laboratory and the Internet setting, the highest motivation gains occurred when participants’ contribution to the group’s outcome was indispensable for the group. This finding provides evidence that motivation gains among inferior group members are possible even during sequential group work under highly anonymous conditions.

  18. Poster papers

    Science.gov (United States)

    Schulz, Michael

    In many scientific societies, presentation by poster has become a popular alternative to oral delivery for contributed papers at major meetings. This has not been so in the AGU. My purpose in this 'editorial' is to acquaint the AGU membership with some of the advantages of the poster paper as an occasional alternative to the 10-minute talk.The main advantage for the author of a poster paper is the opportunity for interaction with an interested audience for a 3 hour period. Significant feedback from the audience is a bonus that gives the author a better understanding of his own work and how to explain it, both orally and in print. Those of us who have tried poster presentation have found it to be a very positive experience.

  19. Mathematical papers

    CERN Document Server

    Green, George

    2005-01-01

    An almost entirely self-taught mathematical genius, George Green (1793 -1841) is best known for Green's theorem, which is used in almost all computer codes that solve partial differential equations. He also published influential essays, or papers, in the fields of hydrodynamics, electricity, and magnetism. This collection comprises his most significant works.The first paper, ""An Essay on the Application of Mathematical Analysis to the Theories of Electricity and Magnetism,"" which is also the longest and perhaps the most Important, appeared In 1828. It introduced the term potential as desig

  20. RESEARCH ON ANONYMOUS COMMUNICATION TECHNOLOGIES IN AD HOC NETWORKS%无线 Ad hoc 网络匿名通信技术研究

    Institute of Scientific and Technical Information of China (English)

    王秀芝; 石志东; 房卫东; 张小珑; 单联海

    2016-01-01

    无线 Ad hoc 网络(MANET)的多跳、自组织、无固定设施以及运算资源有限等特性,使得传统网络中复杂度高的安全算法难以应用于其中。而采用与匿名技术相结合的安全机制,可较好地解决节点隐私和通信关系保密的安全问题。针对现有的匿名技术,采用对比分析的方法,对传统网络的匿名技术进行分析,总结技术上的优缺点,研究 Ad hoc 网络的匿名技术,并对比分析各种匿名通信协议的安全性能,为后续的研究与应用提供帮助。%Due to the features of Ad hoc networks such as multi-hop,self-organisation,non-infrastructure and limited resource,the security algorithms with high complexity in traditional networks are hard to be used in it.However to use the security mechanism combining with anonymous technology can well solve the security problem in regard to nodes’privacy and communication relationship secret.In this paper,targeted at existing anonymous technologies,we analyse their use in traditional networks with the method of comparative analysis, summarise the advantages and disadvantages in terms of technology,and meanwhile study the anonymous technologies used in Ad hoc networks,as well as compare and analyse the security performances of various anonymous communication protocol,these provide the help for subsequent researches and applications.

  1. 基于隐私决策度的改进k-匿名算法%Improved Algorithm of k-anonymity Based on Degree of Privacy Preservation

    Institute of Scientific and Technical Information of China (English)

    申艳光; 闫晶星; 刘永红; 郭高尚

    2015-01-01

    现有的匿名化隐私保护技术在进行数据发布和数据共享前对于敏感属性的个性化隐私保护的支持存在不足,为了实现更为合理的个性化隐私保护,结合粒计算粗糙集理论和k-匿名理论的最新研究成果,针对电子商务中隐私保护个性化决策选择度的不同,从粒化角度出发,提出一种基于隐私决策度的改进k-匿名算法。经实验验证,该算法更好的实现了隐私保护的个性化,同时其隐私保护精度方面优于已有的p-Sensitive k-匿名算法。%In the existing anonymous privacy protection technology, there is a shortage of personalized privacy protection support for sensitive attributes before data release and sharing. In order to achieve more reasonable personalized privacy preservation and improve the precision of privacy preservation, this paper reviewed the latest researches in granular computing theory, rough set theory and k-anonymity theory, and presented an improved algorithm of k-anonymity based on the personalized decision degree of privacy preservation, in view of different personalized granularity decision selectivity of privacy preservation in E-business.The experimental results show that the novel algorithm can achieve privacy preservation with more reasonable personalization, and its accuracy of privacy preservation is superior to p-sensitive k-anonymity algorithm.

  2. Anonymous Proxy Signcryption Scheme Based on Quadratic Residue%基于二次剩余的匿名代理者签密方案

    Institute of Scientific and Technical Information of China (English)

    刘祯; 杨启良; 杨波

    2015-01-01

    由于现有签密方案大多基于双线性对,配对运算计算量较大,且实现效率不高,不能满足对代理签密者的匿名要求,因此无需配对的签密方案是密码学的研究方向。而基于二次剩余的签名方案不仅具有描述简单,能够抵抗选择密文攻击的优点,且相较于基于配对的签名方案具有更高的实现效率。为此,将二次剩余的方法应用到签密方案中,并结合匿名性,提出一种基于二次剩余的匿名代理者签密方案。分析结果表明,该方案具有匿名性与公开验证性。%Most of the existing signcryptions are based on bilinear pairing,but the signcryption without bilinear pairing is a research of cryptography,because the pairing operation requires a lot of computations,and it can not anonymous the proxy signcrypter. The signature scheme based on quadratic residue is widely used with its advantages such as simple description,resistance of chosen ciphertext attack and high efficiency. Its efficient is higher compared with signcryption schemes based on bilinear pairing. This paper adds anonymity to the scheme based on quadratic residue to realize anonymous proxy signcryption. Analysis results show that the scheme not only provides anonymity, but also provides public verifiability.

  3. Panama Papers

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2016-01-01

    Mossack Fonseca kept its clients largely on the right side of the law. Indeed, that’s entirely the point. This article for The Atlantic draws on my wealth management research to explain why most of what is revealed in the Panama Papers leak will not result in criminal prosecution for anyone...

  4. Paper works

    DEFF Research Database (Denmark)

    Rasmussen, Mattias Borg

    2017-01-01

    of their land and natural resources, but also of labor and territorial sovereignty. This case shows how an Andean campesino community counters such movements by a wide repertoire of legal and social actions that works simultaneously in legal and extra-legal domains. Paper works mediate claims to territorial...

  5. Panama Papers

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2016-01-01

    Mossack Fonseca kept its clients largely on the right side of the law. Indeed, that’s entirely the point. This article for The Atlantic draws on my wealth management research to explain why most of what is revealed in the Panama Papers leak will not result in criminal prosecution for anyone...

  6. Collected Papers

    CERN Document Server

    Kostant, Bertram; Kumar, Shrawan; Vergne, Michele

    2009-01-01

    The author has been one of the major architects of modern Lie theory. His interests span a tremendous range of Lie theory, from differential geometry to representation theory, abstract algebra, and mathematical physics. This title features commentaries and summaries of his papers in his own words.

  7. An Anonymous Voting Scheme based on Confirmation Numbers

    Science.gov (United States)

    Alam, Kazi Md. Rokibul; Tamura, Shinsuke; Taniguchi, Shuji; Yanase, Tatsuro

    This paper proposes a new electronic voting (e-voting) scheme that fulfills all the security requirements of e-voting i.e. privacy, accuracy, universal verifiability, fairness, receipt-freeness, incoercibility, dispute-freeness, robustness, practicality and scalability; usually some of which are found to be traded. When compared with other existing schemes, this scheme requires much more simple computations and weaker assumptions about trustworthiness of individual election authorities. The key mechanism is the one that uses confirmation numbers involved in individual votes to make votes verifiable while disabling all entities including voters themselves to know the linkages between voters and their votes. Many existing e-voting schemes extensively deploy zero-knowledge proof (ZKP) to achieve verifiability. However, ZKP is expensive and complicated. The confirmation numbers attain the verifiability requirement in a much more simple and intuitive way, then the scheme becomes scalable and practical.

  8. Using Minute Papers to Determine Student Cognitive Development Levels

    Science.gov (United States)

    Vella, Lia

    2015-01-01

    Can anonymous written feedback collected during classroom assessment activities be used to assess students' cognitive development levels? After library instruction in a first-year engineering design class, students submitted minute papers that included answers to "what they are left wondering." Responses were coded into low, medium and…

  9. Using Minute Papers to Determine Student Cognitive Development Levels

    Science.gov (United States)

    Vella, Lia

    2015-01-01

    Can anonymous written feedback collected during classroom assessment activities be used to assess students' cognitive development levels? After library instruction in a first-year engineering design class, students submitted minute papers that included answers to "what they are left wondering." Responses were coded into low, medium and…

  10. Peer Feedback in Anonymous Peer Review in an EFL Writing Class in Spain

    Science.gov (United States)

    Coté, Robert A.

    2014-01-01

    The present study reports the results of a process of peer feedback through anonymous peer review in an EFL writing class. Numerous studies have reported on the benefits of peer review (PR) in the ESL/EFL writing classroom. However, the literature also identifies social issues that can negatively affect the outcome of face-to-face PR. In this…

  11. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    Science.gov (United States)

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  12. Anonymity in giving in a natural context : an economic field experiment in thirty churches

    NARCIS (Netherlands)

    Soetevent, Adriaan R.

    2003-01-01

    The role of anonymity in giving is examined in a field experiment performed in thirty Dutch churches. For a period of 29 weeks, the means by which offerings are gathered is determined by chance, prescribing for each offering the use of either `closed' collection bags or open collection baskets. When

  13. Brother-Sister Incest: Data from Anonymous Computer-Assisted Self Interviews

    Science.gov (United States)

    Stroebel, Sandra S.; O'Keefe, Stephen L.; Beard, Keith W.; Kuo, Shih-Ya; Swindell, Samuel; Stroupe, Walter

    2013-01-01

    Retrospective data were entered anonymously by 1,521 adult women using computer-assisted self interview. Forty were classified as victims of brother-sister incest, 19 were classified as victims of father-daughter incest, and 232 were classified as victims of sexual abuse by an adult other than their father before reaching 18 years of age. The…

  14. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

    Directory of Open Access Journals (Sweden)

    Kai Chain

    2016-11-01

    Full Text Available Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity.

  15. Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2015-10-01

    Full Text Available In a multi-receiver encryption system, a sender chooses a set of authorized receivers and sends them a message securely and efficiently, as the message is well encrypted and only one ciphertext corresponding to the message is generated no matter how many receivers the sender has chosen. It can be applied to video conferencing systems, pay-per-view channels, remote education, and so forth. Due to privacy considerations, an authorized receiver may not expect that his identity is revealed. In 2010, anonymous multi-receiver identity-based (ID-based encryption was first discussed, and furthermore, many works on the topic have been presented so far. Unfortunately, we find that all of those schemes fail to prove the chosen ciphertext attacks (CCA security in either confidentiality or anonymity. In this manuscript, we propose the first anonymous multi-receiver ID-based authenticated encryption scheme with CCA security in both confidentiality and anonymity. In the proposed scheme, the identity of the sender of a ciphertext can be authenticated by the receivers after a successful decryption. In addition, the proposed scheme also is the first CCA-secure one against insider attacks. Moreover, only one pairing computation is required in decryption.

  16. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  17. Romantic Relationship Advice from Anonymous Online Helpers: The Peer Support Adolescents Exchange

    Science.gov (United States)

    Kim, Jung-Eun; Weinstein, Emily C.; Selman, Robert L.

    2017-01-01

    This empirical study investigates adolescents' responses to peers' personal accounts of romantic relationship difficulties posted to an online forum. We analyze 440 anonymous responses to personal accounts of four romantic relationship issues: controlling partners, break-ups, trust issues, and partner cruelty. Responses were categorized, in order…

  18. Bayesian modeling of consumer behavior in the presence of anonymous visits

    Science.gov (United States)

    Novak, Julie Esther

    Tailoring content to consumers has become a hallmark of marketing and digital media, particularly as it has become easier to identify customers across usage or purchase occasions. However, across a wide variety of contexts, companies find that customers do not consistently identify themselves, leaving a substantial fraction of anonymous visits. We develop a Bayesian hierarchical model that allows us to probabilistically assign anonymous sessions to users. These probabilistic assignments take into account a customer's demographic information, frequency of visitation, activities taken when visiting, and times of arrival. We present two studies, one with synthetic and one with real data, where we demonstrate improved performance over two popular practices (nearest-neighbor matching and deleting the anonymous visits) due to increased efficiency and reduced bias driven by the non-ignorability of which types of events are more likely to be anonymous. Using our proposed model, we avoid potential bias in understanding the effect of a firm's marketing on its customers, improve inference about the total number of customers in the dataset, and provide more precise targeted marketing to both previously observed and unobserved customers.

  19. The Rationality of Alcoholics Anonymous and the Spirituality of Rational Emotive Behavior Therapy.

    Science.gov (United States)

    Velten, Emmett

    1996-01-01

    Argues that Alcoholics Anonymous (AA) and Rational Emotive Behavior Therapy (REBT) share important rational objectives and numerous cognitive-behavioral methods. Both emphasize a philosophical shift as a principal ingredient for change. Provides definitions of rationality and spirituality and explains how REBT and smart recovery are spiritual…

  20. Personal Construct Theory and the Transformation of Identity in Alcoholics Anonymous

    Science.gov (United States)

    Young, Lance Brendan

    2011-01-01

    The dominant theoretical approach to alcoholism research presumes linear, causal relationships between individual cognitions and behavioral outcomes. This approach has largely failed to account for the recovery some alcoholics achieve in Alcoholics Anonymous (AA) because AA emphasizes the transformation of identity, framed in terms of…

  1. Compatibility of Adlerian Theory and Practice with the Philosophy and Practices of Alcoholics Anonymous.

    Science.gov (United States)

    Carroll, Jane J.

    1999-01-01

    Tenets of Adlerian theory and practice are compatible with the philosophy and practices of Alcoholics Anonymous. Counselors can expect treatment approaches based on Adlerian counseling theory to be congruent with 12-step practices of individuals who are in recovery from alcohol dependence. (Author)

  2. Making Meaning of Alcoholics Anonymous for Social Workers: Myths, Metaphors, and Realities.

    Science.gov (United States)

    Davis, Diane Rae; Jansen, Golie G.

    1998-01-01

    Addresses common critiques of Alcoholics Anonymous by offering a way of understanding it as a "normative narrative community" where identity transformation takes place through the use of metaphor and storytelling. Suggests alternative meanings of key metaphors, describes areas of program strength and potential barriers for social…

  3. The Rationality of Alcoholics Anonymous and the Spirituality of Rational Emotive Behavior Therapy.

    Science.gov (United States)

    Velten, Emmett

    1996-01-01

    Argues that Alcoholics Anonymous (AA) and Rational Emotive Behavior Therapy (REBT) share important rational objectives and numerous cognitive-behavioral methods. Both emphasize a philosophical shift as a principal ingredient for change. Provides definitions of rationality and spirituality and explains how REBT and smart recovery are spiritual…

  4. Sexuality Information Needs of Latino and African American Ninth Graders: A Content Analysis of Anonymous Questions

    Science.gov (United States)

    Angulo-Olaiz, Francisca; Goldfarb, Eva S.; Constantine, Norman A.

    2014-01-01

    This study used qualitative content analysis to examine anonymous questions about sex and sexuality submitted by Latino and African American adolescents in Los Angeles, California, classrooms. The majority of questions asked about sexuality and sexual behavior, or anatomy and physiology, with fewer questions about pregnancy and pregnancy…

  5. Modernist Ruins, Filmic Archaeologies. Jane and Louise Wilson’s 'A Free and Anonymous Monument'

    Directory of Open Access Journals (Sweden)

    Giuliana Bruno

    2015-02-01

    Full Text Available Translation of the text originally published in Bruno, Giuliana. 2007. “Modernist Ruins, Filmic Archaeologies. Jane and Louise Wilson’s A Free and Anonymous Monument.” In Public Intimacy: Architecture and the Visual Arts, 43-86. Cambridge: MIT Press.

  6. Personal Construct Theory and the Transformation of Identity in Alcoholics Anonymous

    Science.gov (United States)

    Young, Lance Brendan

    2011-01-01

    The dominant theoretical approach to alcoholism research presumes linear, causal relationships between individual cognitions and behavioral outcomes. This approach has largely failed to account for the recovery some alcoholics achieve in Alcoholics Anonymous (AA) because AA emphasizes the transformation of identity, framed in terms of…

  7. Maintaining the anonymity of cadavers in medical education: Historic relic or educational and ethical necessity?

    Science.gov (United States)

    Jones, D Gareth; King, Mike R

    2017-01-01

    Throughout the modern history of anatomical dissection by medical and other health science students, cadavers have been anonymized. This has meant that students have been provided with limited, if any, information on the identities or medical histories of those they are dissecting. While there was little way around this when the bodies were unclaimed, this need not be the case when the bodies have been donated. However, with a few exceptions, no efforts have been made to change this model. Recent attempts to move anatomy teaching in a more humanistic direction, by emphasizing the cadaver as the students' first patient and with the growth of commemoration services following the dissecting process, raise the question of whether cadavers should continue to be anonymized. In laying a basis for discussion of this matter, we outline what appear to be the virtues of anonymity, and the form that alternatives to anonymity might take. The options identified are nonidentification, low information; nonidentification, moderate information; and identification, full information. The virtues and drawbacks of each of these possibilities are assessed by analyzing their value for students, and also for donors and their families. Policy issues raised by alternatives are also considered. This article provides a basis for continued discussion and suggestions for further research in this area. Anat Sci Educ 10: 87-97. © 2016 American Association of Anatomists.

  8. Pursuing the Anonymous User: Privacy Rights and Mandatory Registration of Prepaid Mobile Phones

    Science.gov (United States)

    Gow, Gordon A.; Parisi, Jennifer

    2008-01-01

    In recent years there has been concern among law enforcement and national security organizations about the use of "anonymous" prepaid mobile phone service and its purported role in supporting criminal and terrorist activities. As a result, a number of countries have implemented registration requirements for such service. Privacy rights advocates…

  9. Panama Papers

    DEFF Research Database (Denmark)

    Harrington, Brooke

    2016-01-01

    Mossack Fonseca kept its clients largely on the right side of the law. Indeed, that’s entirely the point. This article for The Atlantic draws on my wealth management research to explain why most of what is revealed in the Panama Papers leak will not result in criminal prosecution for anyone......, and why government officials face nearly insurmountable obstacles to stopping the kind of financial games in which Mossack Fonseca and its counterparts engage....

  10. Emergence of Informal Educative Space out of an Anonymous Online Bulletin Board in Korea during the Global Economic Crisis

    Science.gov (United States)

    Kang, Dae Joong; Choi, Seon Joo; Lee, SeungHyeop

    2013-01-01

    This study aimed to understand how people learn and teach informally in an anonymous online bulletin board, the primary purpose of which is not learning and teaching. We conducted a qualitative analysis of comments and replies tagged to the most popular postings of an anonymous online bulletin board, during the global economic crisis in 2008-2009.…

  11. Selected papers

    CERN Document Server

    Elgot, Calvin C

    1982-01-01

    Cal Elgot was a very serious and thoughtful researcher, who with great determi­ nation attempted to find basic explanations for certain mathematical phenomena­ as the selection of papers in this volume well illustrate. His approach was, for the most part, rather finitist and constructivist, and he was inevitably drawn to studies of the process of computation. It seems to me that his early work on decision problems relating automata and logic, starting with his thesis under Roger Lyndon and continuing with joint work with Biichi, Wright, Copi, Rutledge, Mezei, and then later with Rabin, set the stage for his attack on the theory of computation through the abstract treatment of the notion of a machine. This is also apparent in his joint work with A. Robinson reproduced here and in his joint papers with John Shepherdson. Of course in the light of subsequent work on decision problems by Biichi, Rabin, Shelah, and many, many others, the subject has been placed on a completely different plane from what it was whe...

  12. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    Recent advanced technology enables the telecare medicine information system (TMIS) for the patients to gain the health monitoring facility at home and also to access medical services over the Internet of mobile networks. Several remote user authentication schemes have been proposed in the literature for TMIS. However, most of them are either insecure against various known attacks or they are inefficient. Recently, Tan proposed an efficient user anonymity preserving three-factor authentication scheme for TMIS. In this paper, we show that though Tan's scheme is efficient, it has several security drawbacks such as (1) it fails to provide proper authentication during the login phase, (2) it fails to provide correct updation of password and biometric of a user during the password and biometric update phase, and (3) it fails to protect against replay attack. In addition, Tan's scheme lacks the formal security analysis and verification. Later, Arshad and Nikooghadam also pointed out some security flaws in Tan's scheme and then presented an improvement on Tan's s scheme. However, we show that Arshad and Nikooghadam's scheme is still insecure against the privileged-insider attack through the stolen smart-card attack, and it also lacks the formal security analysis and verification. In order to withstand those security loopholes found in both Tan's scheme, and Arshad and Nikooghadam's scheme, we aim to propose an effective and more secure three-factor remote user authentication scheme for TMIS. Our scheme provides the user anonymity property. Through the rigorous informal and formal security analysis using random oracle models and the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool, we show that our scheme is secure against various known attacks, including the replay and man-in-the-middle attacks. Furthermore, our scheme is also efficient as compared to other related schemes.

  13. Paper justice.

    Science.gov (United States)

    Culler, T A

    2000-01-01

    This article relates the case of two young girls who became pregnant as a result of rape and their efforts to exercise their rights to terminate the pregnancy. The first victim was a 12-year-old girl from Bolivia and the second was Paulina, a 13-year-old resident of Baja California, Mexico. Though abortion is illegal in both countries, in the case of rape the procedure is "unpunishable" in Bolivia and legal in Mexico. Despite these laws, the girls, their families and their advocates contend repeatedly with local government and Catholic Church officials on the issue. Only the first victim successfully exercised her right to terminate her pregnancy through the efforts of her family and the decision of Penal Judge Luis Ledezma. This paper also highlights the need for reforms in the abortion law in both countries.

  14. Alcoholics Anonymous

    Science.gov (United States)

    ... Cyprus Czech Republic Denmark Dominican Republic Ecuador Egypt El Salvador Estonia Faroe Islands Finland France French Polynesia ... Home Site Help Site Map Contact Us Website Feedback AAGRAPEVINE.ORG Terms of use Copyright © 2017 by ...

  15. THE WIKILEAKS´S CASE AND ANONYMITY: EFFECTS ON THE INFORMATION FREEDOM

    Directory of Open Access Journals (Sweden)

    Marlus Heriberto Arns de Oliveira

    2015-10-01

    Full Text Available The Constitution of the Federative Republic of Brazil, enacted in 1988 during the democratization process of the country after the end of an authoritarian regime preceded by several others that show a non-democratic tradition in the Brazilian Republic, remained still remnants an authoritarian Patronizing and Paternalist state, the example of the final part of the Article 5, item IV, which claims to be the free expression of thought, but forbids anonymity, prohibition which deserves to be rethought, especially on the internet, where the navigation data of people deserve protection, as well as their rights to remain anonymous, a fact which entails the need for reflection on the scope and how best to interpret the constitutional provision cited, a debate that, in the proposed article will deal think the ideas of paternalism, authoritarianism and freedom, whose focus will be about within the Internet, social networks and the Knowledge Society.

  16. Young People in Alcoholics Anonymous: the role of spiritual orientation and AA member affiliation.

    Science.gov (United States)

    Galanter, Marc; Dermatis, Helen; Santucci, Courtney

    2012-01-01

    Empirical findings characterizing long-term, committed Alcoholics Anonymous (AA) members are limited, particularly among younger members. The authors studied a sample of 266 highly committed attendees (mean age, 27 years) at an annual conference of Young People in Alcoholics Anonymous (YPAA), whose first encounter with AA was 6 years previously. Most (72%) had abused drugs and alcohol, and 36% had never received substance abuse treatment. They now reported a mean duration of abstinence of 44 months and had attended an average of 233 AA meetings in the previous year; 66% had served as AA sponsors, and 92% reported experiencing an AA "spiritual awakening," itself associated with a decreased likelihood of alcohol craving. Scores on AA beliefs, affiliation to other members, and the experience of spiritual awakening were associated with lower depression scores. These findings are discussed to clarify the nature of long-term AA membership.

  17. The predictive validity of the survey of readiness for alcoholics anonymous participation.

    Science.gov (United States)

    Kingree, Jeffrey B; Simpson, Alpha; Thompson, Martie; McCrady, Barbara; Tonigan, J Scott

    2007-01-01

    This study evaluated the predictive validity of the Survey of Readiness for Alcoholics Anonymous Participation (SYRAAP), which is a 15-item, self-administered instrument. Bivariate and multivariate analyses examined whether responses to the SYRAAP within 1 week of entering substance-use treatment (T1) were associated with posttreatment Alcoholics Anonymous (AA) participation at 3-month (T2) and 6-month (T3) follow-up assessments. The T1 assessment was completed by 268 respondents; the T2 and T3 assessments were completed by 232 (86%) and 217 (81%) respondents, respectively. Results revealed that responses to the SYRAAP at T1 predicted AA participation at T2 and T3. The findings indicate the SYRAAP is a valid measure for assessing readiness for participating in AA. Future research in relation to the SYRAAP and limitations of the current study are discussed.

  18. Teaching internal medicine resident physicians about Alcoholics Anonymous: a pilot study of an educational intervention.

    Science.gov (United States)

    Rose, Adam J; Stein, Melissa R; Arnsten, Julia H; Saitz, Richard

    2006-09-01

    Greater physician confidence in treating alcoholism is associated with a higher frequency of referring alcoholic patients for treatment, but many physicians have limited experience with Alcoholics Anonymous. We implemented a brief, didactic and experiential educational intervention about AA and evaluated its effect on knowledge and attitudes, using a before-after repeated measures study design. Thirty-six first-year internal medicine resident physicians received an educational intervention, which consisted of a 45-minute lecture about AA, a visit to an AA meeting, and a 30-minute debriefing session the next day. Residents' knowledge and attitudes were assessed by a brief written anonymous survey before and after the educational intervention. Residents reported increases in self-perceived knowledge about AA and had more favorable attitudes towards AA after the intervention. Our pilot study shows that a brief, didactic and experiential course can improve physician knowledge and attitudes about AA, and holds promise for improving physician interface with this commonly used intervention.

  19. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions

    DEFF Research Database (Denmark)

    Abdalla, Michel; Bellare, Mihir; Catalano, Dario

    2005-01-01

    We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of [7] is comp......We identify and fill some gaps with regard to consistency (the extent to which false positives are produced) for public-key encryption with keyword search (PEKS). We define computational and statistical relaxations of the existing notion of perfect consistency, show that the scheme of [7......] is computationally consistent, and provide a new scheme that is statistically consistent. We also provide a transform of an anonymous IBE scheme to a secure PEKS scheme that, unlike the previous one, guarantees consistency. Finally we suggest three extensions of the basic notions considered here, namely anonymous...... HIBE, public-key encryption with temporary keyword search, and identity-based encryption with keyword search....

  20. Anonymous-key quantum cryptography and unconditionally secure quantum bit commitment

    CERN Document Server

    Yuen, H P

    2000-01-01

    A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocol that does not require a shared secret key is provided as an illustration. The possibility is also indicated for obtaining unconditionally secure quantum bit commitment protocols with this technique.

  1. Anonymous As a Cyber Tribe: A New Model for Complex, Non-State Cyber Actors

    Science.gov (United States)

    2015-05-01

    non- state cyber actors. The Air Force values a professional workplace that strictly prohibits racism , sexism, lewd material, and most forms of...AU/ACSC/LIDOWSKI, R/AY15 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY ANONYMOUS AS A CYBER TRIBE: A NEW MODEL FOR COMPLEX, NON- STATE ...government or the Department of Defense. In accordance with Air Force Instruction 51-303, it is not copyrighted, but is the property of the United

  2. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    Directory of Open Access Journals (Sweden)

    Sills Eric

    2010-08-01

    Full Text Available Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF and embryo transfer (ET where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  3. Fortified anonymous communication protocol for location privacy in WSN: a modular approach.

    Science.gov (United States)

    Abuzneid, Abdel-Shakour; Sobh, Tarek; Faezipour, Miad; Mahmood, Ausif; James, John

    2015-03-10

    Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC) protocol for WSN.

  4. Fortified Anonymous Communication Protocol for Location Privacy in WSN: A Modular Approach

    Directory of Open Access Journals (Sweden)

    Abdel-Shakour Abuzneid

    2015-03-01

    Full Text Available Wireless sensor network (WSN consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc. and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observability, capture likelihood, and safety period. We extend this work to allow for countermeasures against multi-local and global adversaries. We present a network model protected against a sophisticated threat model: passive /active and local/multi-local/global attacks. This work provides a solution for end-to-end anonymity and location privacy as well. We will introduce a framework called fortified anonymous communication (FAC protocol for WSN.

  5. Apriori-based algorithms for k m-anonymizing trajectory data

    Directory of Open Access Journals (Sweden)

    Giorgos Poulis

    2014-08-01

    Full Text Available The proliferation of GPS-enabled devices (e.g., smartphones and tablets and locationbased social networks has resulted in the abundance of trajectory data. The publication of such data opens up new directions in analyzing, studying and understanding human behavior. However, it should be performed in a privacy-preserving way, because the identities of individuals, whose movement is recorded in trajectories, can be disclosed even after removing identifying information. Existing trajectory data anonymization approaches offer privacy but at a high data utility cost, since they either do not produce truthful data (an important requirement of several applications, or are limited in their privacy specification component. In this work, we propose a novel approach that overcomes these shortcomings by adapting km-anonymity to trajectory data. To realize our approach, we develop three efficient and effective anonymization algorithms that are based on the apriori principle. These algorithms aim at preserving different data characteristics, including location distance and semantic similarity, as well as user-specified utility requirements, which must be satisfied to ensure that the released data can be meaningfully analyzed. Our extensive experiments using synthetic and real datasets verify that the proposed algorithms are efficient and effective at preserving data utility.

  6. There is no ``I'' in referee: Why referees should be anonymous

    Science.gov (United States)

    Ucko, Daniel

    2015-03-01

    From the early days of modern science, it has been recognized that scientific claims must be verified by someone who is not the maker of those claims, and who furthermore has no stake in the matter. In other words, claims need to be evaluated objectively, by the community. The way in which this tends to be done is by peer review conducted by journals. Peer review as currently practiced touches on the themes of trust, where the trust is in institutions and procedures that emerge from expert communities. The practice of peer review is viewed as a citizenly duty of scientists in the scientific community, because all scientists take turns serving either as authors, referees, and editors in the peer review process We lack the resources to have a work evaluated by the entire community, so we substitute with a representative. Yet, in most examples of scientific review, the referee or referees are anonymous. This question is particularly important when the peer review process is brought to bear in order to evaluate matters beyond scientific validity, more ``subjective'' criteria such as relative importance, broadness of interest - criteria that do not appear to have an objective standard of comparison and validation. I will show that the anonymity of referees, far from endangering this trust, actually strengthens it. I will show that this anonymity is crucial in order to maintain any objectivity in scientific peer review, and why authors should not try to unmask the referee. Also at American Physical Society (APS).

  7. An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

    Directory of Open Access Journals (Sweden)

    Keita Emura

    2014-01-01

    Full Text Available If there are many displaced workers in a company, then a person who goes for job hunting might not select this company. That is, the number of members who quit is quite negative information. Similarly, in revocable group signature schemes, if one knows (or guesses the number of revoked users (say r, then one may guess the reason behind such circumstances, and it may lead to harmful rumors. However, no previous revocation procedure can achieve hiding r. In this paper, we propose the first revocable group signature scheme, where r is kept hidden, which we call r-hiding revocable group signature. To handle this property, we newly define the security notion called anonymity with respect to the revocation which guarantees the unlinkability of revoked users.

  8. 基于匿名化流表的网络数据分组实时匿名方法%Online trace anonymization based on anonymous flow table

    Institute of Scientific and Technical Information of China (English)

    韩春静; 葛敬国; 谢高岗; 李亮雄; 李佟; 刘韵洁

    2016-01-01

    A real-time network packet anonymous method named Fad-Pan (online trace anonymization based on the anonymous flow table) was proposed. The Fad-Pan algorithm was studied and an online trace anonymization prototype system based on DPDK library was developed. The experimental results prove that the Fad-Pan algorithm is faster more than 20 times than the existing method, and a single server can handle the real-time IPv4 and IPv6 traffic of the 10 Gbit/s link used by the Fad-Pan.%提出了基于匿名化流表的网络数据分组实时匿名方法(Fad-Pan,online trace anonymization based on the anonymous flow table),主要研究Fad-Pan算法以及研发基于DPDK的Fad-Pan原型系统。实验结果表明,Fad-Pan算法比已有的方法在匿名化速度上提高了20倍以上,单个普通服务器可以实时处理万兆链路的IPv4和IPv6流量数据。

  9. Papers on medical disputes-induced group events in 2006-2013:A bibliometric analysis%2006-2013年“医闹”类群体性事件研究论文的调查分析

    Institute of Scientific and Technical Information of China (English)

    李娜; 卢青; 戎文慧

    2014-01-01

    Objective To study the countermeasures for preventing medical disputes-induced group events by ana-lyzing the related papers.Methods Distributions of publication years, institutions of authors, and subjects in pa-pers on medical disputes-induced group events in 2006-2013 covered in Wanfang Data Knowledge Service Platform and CNKI were analyzed by bibliometrics.Results A total of 676 papers on medical disputes-induced group events were published in 2006-2013 .Their authors were mainly from medical educational institutions or medical and health institutions.The number of papers on medical tangles, relation between physicians and patients, legal con-struction, reasons for medical disputes was significantly larger than that of those on the "third party"mechanism and medical liability insurance .Conclusion Certain advances have been achieved in study on medical disputes-induced group events.However, there is a room for their improvement, further studies are thus needed.%目的:通过统计分析“医闹”类群体性事件研究论文,探讨“医闹”类群体性事件的防范对策。方法:选用万方数据知识服务平台和CNKI中国知网,采用文献计量方法,对2006-2013年“医闹”类群体性事件研究论文的年代分布、作者所属机构分布、研究主题等进行统计分析。结果:2006-2013年共发表相关研究论文676篇,作者所属机构以医学院校及医疗卫生机构居多,研究内容以医疗纠纷、医患关系、法律建设、“医闹”原因和防范对策居多,研究“第三方”机制和医疗责任保险的论文较少。结论:相关研究取得了一定进展,但尚存在待改进之处。

  10. Identification of genes in anonymous DNA sequences. Final report: Report period, 15 April 1993--15 April 1994

    Energy Technology Data Exchange (ETDEWEB)

    Fields, C.A.

    1994-09-01

    This Report concludes the DOE Human Genome Program project, ``Identification of Genes in Anonymous DNA Sequence.`` The central goals of this project have been (1) understanding the problem of identifying genes in anonymous sequences, and (2) development of tools, primarily the automated identification system gm, for identifying genes. The activities supported under the previous award are summarized here to provide a single complete report on the activities supported as part of the project from its inception to its completion.

  11. Anonymous Sojourners: Mapping the Territory of Caribbean Experiences of Immersion for Language Learning

    Science.gov (United States)

    Craig, Ian

    2010-01-01

    This paper presents findings of a pilot qualitative study of Caribbean students undertaking overseas immersion primarily for the purpose of perfecting their knowledge of a language and understanding of a culture other than their own. The participants were a group of eleven University of the West Indies (UWI), Cave Hill (Barbados) graduates, five…

  12. Simple parametric survival analysis with anonymized register data: A cohort study with truncated and interval censored event and censoring times

    Directory of Open Access Journals (Sweden)

    Kristiansen Ivar S

    2011-08-01

    Full Text Available Abstract Background To preserve patient anonymity, health register data may be provided as binned data only. Here we consider as example, how to estimate mean survival time after a diagnosis of metastatic colorectal cancer from Norwegian register data on time to death or censoring binned into 30 day intervals. All events occurring in the first three months (90 days after diagnosis were removed to achieve comparability with a clinical trial. The aim of the paper is to develop and implement a simple, and yet flexible method for analyzing such interval censored and truncated data. Methods Considering interval censoring a missing data problem, we implement a simple multiple imputation strategy that allows flexible sensitivity analyses with respect to the shape of the censoring distribution. To allow identification of appropriate parametric models, a χ2-goodness-of-fit test--also imputation based--is derived and supplemented with diagnostic plots. Uncertainty estimates for mean survival times are obtained via a simulation strategy. The validity and statistical efficiency of the proposed method for varying interval lengths is investigated in a simulation study and compared with simpler alternatives. Results Mean survival times estimated from the register data ranged from 1.2 (SE = 0.09 to 3.2 (0.31 years depending on period of diagnosis and choice of parametric model. The shape of the censoring distribution within intervals did generally not influence results, whereas the choice of parametric model did, even when different models fit the data equally well. In simulation studies both simple midpoint imputation and multiple imputation yielded nearly unbiased analyses (relative biases of -0.6% to 9.4% and confidence intervals with near-nominal coverage probabilities (93.4% to 95.7% for censoring intervals shorter than six months. For 12 month censoring intervals, multiple imputation provided better protection against bias, and coverage probabilities

  13. Blinded Anonymization: a method for evaluating cancer prevention programs under restrictive data protection regulations.

    Science.gov (United States)

    Bartholomäus, Sebastian; Hense, Hans Werner; Heidinger, Oliver

    2015-01-01

    Evaluating cancer prevention programs requires collecting and linking data on a case specific level from multiple sources of the healthcare system. Therefore, one has to comply with data protection regulations which are restrictive in Germany and will likely become stricter in Europe in general. To facilitate the mortality evaluation of the German mammography screening program, with more than 10 Million eligible women, we developed a method that does not require written individual consent and is compliant to existing privacy regulations. Our setup is composed of different data owners, a data collection center (DCC) and an evaluation center (EC). Each data owner uses a dedicated software that preprocesses plain-text personal identifiers (IDAT) and plaintext evaluation data (EDAT) in such a way that only irreversibly encrypted record assignment numbers (RAN) and pre-aggregated, reversibly encrypted EDAT are transmitted to the DCC. The DCC uses the RANs to perform a probabilistic record linkage which is based on an established and evaluated algorithm. For potentially identifying attributes within the EDAT ('quasi-identifiers'), we developed a novel process, named 'blinded anonymization'. It allows selecting a specific generalization from the pre-processed and encrypted attribute aggregations, to create a new data set with assured k-anonymity, without using any plain-text information. The anonymized data is transferred to the EC where the EDAT is decrypted and used for evaluation. Our concept was approved by German data protection authorities. We implemented a prototype and tested it with more than 1.5 Million simulated records, containing realistically distributed IDAT. The core processes worked well with regard to performance parameters. We created different generalizations and calculated the respective suppression rates. We discuss modalities, implications and limitations for large data sets in the cancer registry domain, as well as approaches for further

  14. The general alcoholics anonymous tools of recovery: the adoption of 12-step practices and beliefs.

    Science.gov (United States)

    Greenfield, Brenna L; Tonigan, J Scott

    2013-09-01

    Working the 12 steps is widely prescribed for Alcoholics Anonymous (AA) members although the relative merits of different methods for measuring step work have received minimal attention and even less is known about how step work predicts later substance use. The current study (1) compared endorsements of step work on an face-valid or direct measure, the Alcoholics Anonymous Inventory (AAI), with an indirect measure of step work, the General Alcoholics Anonymous Tools of Recovery (GAATOR); (2) evaluated the underlying factor structure of the GAATOR and changes in step work over time; (3) examined changes in the endorsement of step work over time; and (4) investigated how, if at all, 12-step work predicted later substance use. New AA affiliates (N = 130) completed assessments at intake, 3, 6, and 9 months. Significantly more participants endorsed step work on the GAATOR than on the AAI for nine of the 12 steps. An exploratory factor analysis revealed a two-factor structure for the GAATOR comprising behavioral step work and spiritual step work. Behavioral step work did not change over time, but was predicted by having a sponsor, while Spiritual step work decreased over time and increases were predicted by attending 12-step meetings or treatment. Behavioral step work did not prospectively predict substance use. In contrast, spiritual step work predicted percent days abstinent. Behavioral step work and spiritual step work appear to be conceptually distinct components of step work that have distinct predictors and unique impacts on outcomes. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  15. Multi-Dimensional Trajectory Anonymity in Collecting Personal Mobility Data%个人移动数据收集中的多维轨迹匿名方法

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 彭瑞卿; 赵雨辰; 陈栋

    2013-01-01

    在情景感知位置服务中,移动互联网络的开放性使得个人移动数据面临巨大的安全风险,移动数据的时空关联特性对个人数据的隐私保护提出重大挑战。针对基于时空关联的背景知识攻击,本文提出了一种多维的轨迹匿名隐私保护方法。该方法在匿名轨迹数据收集系统的基础上,基于多用户协作的隐私保护模式,通过时间匿名和空间匿名算法,实现用户的隐私保护。实验结果表明,该方法可以有效的对抗基于位置和移动方式的背景知识攻击,满足了 k-匿名的隐私保护要求。%In the Context-Aware location services ,the opening characteristic of the mobile network brings some security risks for personal mobility data .The spatial-temporal correlation of the mobility data is a great challenge for protecting privacy of the users .To solve the background knowledge attack based on the spatial-temporal correlation ,we proposed a privacy protection method based on multi-dimensional trajectory anonymity in this paper .This method is built on the anonymous trajectory data collection sys-tem and achieves the protection of user privacy through spatial-temporal anonymity algorithm based on the multi-user collaboration privacy protection mode .The experimental results demonstrated that this method can prevent the background knowledge attack based on the position and moving mode effectively and meets the demands of the privacy protect of k-Anonymity .

  16. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.

    Science.gov (United States)

    Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-06-23

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.

  17. A Qualitative Analysis of Medical Students' Reflection on Attending an Alcoholics Anonymous Meeting: Insights for Future Addiction Curricula.

    Science.gov (United States)

    Kastenholz, Kurt J; Agarwal, Gaurava

    2016-06-01

    This paper describes medical students' views of alcoholism and their response to attending an Alcoholics Anonymous (AA) meeting during their psychiatry clerkship. This may assist other educators in planning their addiction curricula. Medical students were required to attend an AA meeting during their psychiatry clerkship and then to write a reflection piece on this experience. We selected a random sample of 40 pieces and performed a qualitative analysis to identify the prominent ideas and themes in this sample. Medical students found their experience attending an AA meeting to be educationally valuable. They reported their familiarity with AA prior to this experience was largely limited to popular media depictions. Students reported understanding alcoholism as a disease with both biological and psychosocial components. They were often concerned with the presence of religiosity and spirituality at the meetings. Following the experience, students felt more comfortable referring patients to AA and identified empathy, honesty, and openness as crucial contributors to the efficacy of AA. Students felt that attending an AA meeting during their psychiatry clerkship was an educationally valuable experience. Medical students' familiarity with addiction treatment is limited, and attending an AA meeting may be helpful in increasing their comfort with treating addicted patients in the future. In addition, educators may want to explicitly address the spirituality issue related to some treatment programs to increase the likelihood that future physicians feel comfortable referring their patients to recovery programs.

  18. Community-Acquired Pneumonia Case Validation in an Anonymized Electronic Medical Record-Linked Expert System.

    Science.gov (United States)

    Mukhopadhyay, Amartya; Maliapen, Mahendran; Ong, Venetia; Jakes, Rupert W; Mundy, Linda M; Jialiang, Li; Tambyah, Paul A

    2017-05-15

    An electronic anonymized patient portal analysis using radiographic reports and admission and discharge diagnoses had sensitivity, specificity, positive predictive value, and negative predictive value of 84.7%, 78.2%, 75%, and 87%, respectively, for community-acquired pneumonia validated against a blinded expert medical review. This approach can help to track antimicrobial use and resistance. © The Author 2017. Published by Oxford University Press for the Infectious Diseases Society of America. All rights reserved. For permissions, e-mail: journals.permissions@oup.com.

  19. An improved biometrics-based remote user authentication scheme with user anonymity.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-01-01

    The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.

  20. The Impact of Alcoholics Anonymous on other substance abuse related Twelve Step programs

    Science.gov (United States)

    Laudet, Alexandre B.

    2008-01-01

    This chapter explores the influence of the AA model on self-help fellowships addressing problems of drug dependence. Fellowships that have adapted the 12-step recovery model to other substances of abuse are reviewed; next similarities and differences between AA and drug-recovery 12-step organizations are examined; finally, we present empirical findings on patterns of attendance and perceptions of AA and Narcotics Anonymous (NA) among polydrug dependent populations, many of whom are cross-addicted to alcohol. Future directions in 12-step research are noted in closing. PMID:19115764

  1. The impact of alcoholics anonymous on other substance abuse-related twelve-step programs.

    Science.gov (United States)

    Laudet, Alexandre B

    2008-01-01

    This chapter explores the influence of the AA model on self-help fellowships addressing problems of drug dependence. Fellowships that have adapted the twelve-step recovery model to other substances of abuse are reviewed; next similarities and differences between AA and drug-recovery twelve-step organizations are examined; finally, we present empirical findings on patterns of attendance and perceptions of AA and Narcotics Anonymous (NA) among polydrug-dependent populations, many of whom are cross-addicted to alcohol. Future directions in twelve-step research are noted in closing.

  2. The Anexo in Northern California: An Alcoholics Anonymous-Based Recovery Residence in Latino Communities.

    Science.gov (United States)

    Garcia, Victor; Pagano, Anna; Recarte, Carlos; Lee, Juliet P

    2017-01-01

    Our ethnographic study on help-seeking pathways of Latino immigrants in northern California reveals that they turn to anexos in their treatment and recovery quest. Anexos are linguistically- and culturally-specific recovery houses with origins in Mexico and Alcoholics Anonymous and a long history in Latino communities across the United States. Drawing on the findings of our study, we characterize the anexos and compare them to other recovery residences using National Alliance for Recovery Residences (NARR) criteria. The description and comparison reveal that anexos cannot be placed into a single NARR residence category. We discuss why this is the case.

  3. SOA架构下协同式自动化组卷系统的设计与实现%Design and Implementation of Collaboration Automated Grouping Paper System Based on SOA

    Institute of Scientific and Technical Information of China (English)

    梁胜彬; 楚广琳

    2013-01-01

    Schools now promote the separation of teaching and testing, and an automation test paper grouping system is neces-sary. But the organizational structure of schools and informationization level are different, these factors are restricting the develop-ment of information technology in schools. This article discusses an scheme of collaborative automated grouping paper system that SOA-based architecture, multi-user collaborative participation and collaboration, the article analyzes the system of steps and methods, gives a solution based on SOA and collaborative work ethic Automated Grouping System and loosely coupled, distribut-ed, flexible business stream has a high practical value.%学校实行教考分离,推进科学化、信息化的自动化组卷系统势在必行,而各学校的组织结构、信息化程度不尽相同,这些内在和外在因素制约着学校信息化的发展。该文讨论以一种基于SOA架构,实现多用户协同参与和协作的自动化组卷系统,文中分析了系统实现的步骤和方法,给出了一种基于SOA和协同工作理念的自动化组卷系统解决方案,并且具有松耦合、分布式、业务流灵活等特点,具有较高的实用价值。

  4. Paper based electronics platform

    KAUST Repository

    Nassar, Joanna Mohammad

    2017-07-20

    A flexible and non-functionalized low cost paper-based electronic system platform fabricated from common paper, such as paper based sensors, and methods of producing paper based sensors, and methods of sensing using the paper based sensors are provided. A method of producing a paper based sensor can include the steps of: a) providing a conventional paper product to serve as a substrate for the sensor or as an active material for the sensor or both, the paper product not further treated or functionalized; and b) applying a sensing element to the paper substrate, the sensing element selected from the group consisting of a conductive material, the conductive material providing contacts and interconnects, sensitive material film that exhibits sensitivity to pH levels, a compressible and/or porous material disposed between a pair of opposed conductive elements, or a combination of two of more said sensing elements. The method of sensing can further include measuring, using the sensing element, a change in resistance, a change in voltage, a change in current, a change in capacitance, or a combination of any two or more thereof.

  5. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong

    2015-11-01

    The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.

  6. The long path to pregnancy: early experience with dual anonymous gamete donation in a European in vitro fertilisation referral centre

    LENUS (Irish Health Repository)

    Sills, Eric Scott

    2010-08-11

    Abstract Background This investigation describes features of patients undergoing in vitro fertilisation (IVF) and embryo transfer (ET) where both gametes were obtained from anonymous donors. Methods Gamete unsuitability or loss was confirmed in both members of seven otherwise healthy couples presenting for reproductive endocrinology consultation over a 12-month interval in Ireland. IVF was undertaken with fresh oocytes provided by anonymous donors in Ukraine; frozen sperm (anonymous donor) was obtained from a licensed tissue establishment. For recipients, saline-enhanced sonography was used to assess intrauterine contour with endometrial preparation via transdermal estrogen. Results Among commissioning couples, mean±SD female and male age was 41.9 ± 3.7 and 44.6 ± 3.5 yrs, respectively. During this period, female age for non dual anonymous gamete donation IVF patients was 37.9 ± 3 yrs (p < 0.001). Infertility duration was ≥3 yrs for couples enrolling in dual gamete donation, and each had ≥2 prior failed fertility treatments using native oocytes. All seven recipient couples proceeded to embryo transfer, although one patient had two transfers. Clinical pregnancy was achieved for 5\\/7 (71.4%) patients. Non-transferred cryopreserved embryos were available for all seven couples. Conclusions Mean age of females undergoing dual anonymous donor gamete donation with IVF is significantly higher than the background IVF patient population. Even when neither partner is able to contribute any gametes for IVF, the clinical pregnancy rate per transfer can be satisfactory if both anonymous egg and sperm donation are used concurrently. Our report emphasises the role of pre-treatment counselling in dual anonymous gamete donation, and presents a coordinated screening and treatment approach in IVF where this option may be contemplated.

  7. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

    Directory of Open Access Journals (Sweden)

    Sowmiya Murthy

    2014-10-01

    Full Text Available We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.

  8. The Anonymous Plotter in the Routines of Renaissance Theatre and Drama

    Directory of Open Access Journals (Sweden)

    Paola Pugliatti

    2012-03-01

    Full Text Available Renaissance theatre, both in England and Italy, was a commercial enterprise and, therefore, it utilized procedures of division of labour to meet the challenge of the market. One of these procedures was the compilation of preparatory texts of various kinds. But, while about one thousand scenari of the commedia dell’arte (some anonymous, some with the author’s name survive, of the ‘plots’ compiled by the English ‘plotters’ in preparation of plays to be written only one incomplete specimen and a few fragments have been preserved; their nature, therefore, remains dubious. Furthermore, anonymous documents of a different nature, also confusingly called ‘plots’, but compiled as reminders for the actors’ entrances during performance, have survived in six, mostly fragmentary, manuscripts. This article discusses these three kinds of preparatory texts in order to characterize their different nature and argues that, although suggestive, the idea of a derivation of the two kinds of English ‘plots’ from the scenari appears unconvincing; indeed, the compilation, in both contexts, of preparatory texts was simply an obvious and necessary measure in order to speed up procedures.

  9. No Evidence for Moral Reward and Punishment in an Anonymous Context.

    Science.gov (United States)

    Clavien, Christine; Mersch, Danielle P; Chapuisat, Michel

    2016-01-01

    Human social interactions are regulated by moral norms that define individual obligations and rights. These norms are enforced by punishment of transgressors and reward of followers. Yet, the generality and strength of this drive to punish or reward is unclear, especially when people are not personally involved in the situation and when the actual impact of their sanction is only indirect, i.e., when it diminishes or promotes the social status of the punished or rewarded individual. In a real-life study, we investigated if people are inclined to anonymously punish or reward a person for her past deeds in a different social context. Participants from three socio-professional categories voted anonymously for early career violinists in an important violin competition. We found that participants did not punish an immoral violin candidate, nor did they reward another hyper-moral candidate. On the contrary, one socio-professional category sanctioned hyper-morality. Hence, salient moral information about past behavior did not elicit punishment or reward in an impersonal situation where the impact of the sanction was indirect. We conclude that contextual features play an important role in human motivation to enforce moral norms.

  10. No Evidence for Moral Reward and Punishment in an Anonymous Context.

    Directory of Open Access Journals (Sweden)

    Christine Clavien

    Full Text Available Human social interactions are regulated by moral norms that define individual obligations and rights. These norms are enforced by punishment of transgressors and reward of followers. Yet, the generality and strength of this drive to punish or reward is unclear, especially when people are not personally involved in the situation and when the actual impact of their sanction is only indirect, i.e., when it diminishes or promotes the social status of the punished or rewarded individual. In a real-life study, we investigated if people are inclined to anonymously punish or reward a person for her past deeds in a different social context. Participants from three socio-professional categories voted anonymously for early career violinists in an important violin competition. We found that participants did not punish an immoral violin candidate, nor did they reward another hyper-moral candidate. On the contrary, one socio-professional category sanctioned hyper-morality. Hence, salient moral information about past behavior did not elicit punishment or reward in an impersonal situation where the impact of the sanction was indirect. We conclude that contextual features play an important role in human motivation to enforce moral norms.

  11. The development and initial evaluation of the survey of readiness for alcoholics anonymous participation.

    Science.gov (United States)

    Kingree, J B; Simpson, Alpha; Thompson, Martie; McCrady, Barbara; Tonigan, J Scott; Lautenschlager, Gary

    2006-12-01

    This article presents 5 studies related to the development and initial evaluation of the Survey of Readiness for Alcoholics Anonymous Participation (SYRAAP). The SYRAAP is a brief, multidimensional, self-administered instrument that assesses beliefs associated with Alcoholics Anonymous (AA) participation. Study 1 generated 239 candidate items for potential inclusion in the instrument. Study 2 assessed the content validity of these items according to 3 criteria and identified a subset of 60 with the highest values on the criteria for further consideration. Study 3 produced a shorter version of the SYRAAP and evaluated its structure, internal reliability, and validity. Study 4 reevaluated the structure and internal reliability of the SYRAAP and yielded findings that were generally consistent with those from Study 3. Study 5 established stability reliability for the instrument. The collective findings indicated the SYRAAP can reliably and validly assess individual-level beliefs associated with AA participation. The potential use of the SYRAAP for researchers and clinicians, along with limitations of the work presented here, are discussed. (c) 2006 APA, all rights reserved

  12. Applying the nursing theory of human relatedness to alcoholism and recovery in alcoholics anonymous.

    Science.gov (United States)

    Strobbe, Stephen; Hagerty, Bonnie; Boyd, Carol

    2012-12-01

    Alcohol misuse is a global health risk, and Alcoholics Anonymous (AA) is the largest and most popular mutual-help program for individuals with alcohol-related problems. In recent years, researchers and clinicians have become increasingly interested in specific mechanisms of action that may contribute to positive outcomes through involvement with this 12-step program for recovery, yet few have applied a theoretical framework to these efforts. We examined the phenomena of alcoholism and recovery in AA, using the nursing Theory of Human Relatedness (THR). THR addresses a pervasive human concern: "establishing and maintaining relatedness to others, objects, environments, society and self." The theory describes four states of relatedness (connectedness, disconnectedness, parallelism, and enmeshment) and four relatedness competencies (sense of belonging, reciprocity, mutuality, and synchrony). Both alcoholism and recovery in AA can be viewed primarily in terms of relatedness. In active alcoholism, an individual's involvement with alcohol (enmeshment) can limit, impair, or preclude healthy or adaptive relatedness toward virtually all other referents, including self. As a program of recovery, each of the 12 Steps of Alcoholics Anonymous addresses an individual's relatedness to one or more identified referents while simultaneously enhancing and expanding each of the four relatedness competencies. THR provides a theoretical framework to help direct patient care, research, and education and has the potential to serve as a unifying theory in the study of alcoholism and recovery in AA.

  13. Does sponsorship improve outcomes above Alcoholics Anonymous attendance? A latent class growth curve analysis.

    Science.gov (United States)

    Witbrodt, Jane; Kaskutas, Lee; Bond, Jason; Delucchi, Kevin

    2012-02-01

    To construct Alcoholics Anonymous (AA) attendance, sponsorship and abstinence latent class trajectories to test the added benefit of having a sponsor above the benefits of attendance in predicting abstinence over time. Prospective with 1-, 3-, 5- and 7-year follow-ups. Alcoholic-dependent individuals from two probability samples, one from representative public and private treatment programs and another from the general population (n = 495). Individuals in the low attendance class (four classes identified) were less likely than those in the high, descending and medium attendance classes to be in high (versus low) abstinence class (three classes identified). No differences were found between the other attendance classes as related to abstinence class membership. Overall, being in the high sponsor class (three classes identified) predicted better abstinence outcomes than being in either of two other classes (descending and low), independent of attendance class effects. Although declining sponsor involvement was associated with greater likelihood of high abstinence than low sponsor involvement, being in the descending sponsor class also increased the odds of being in the descending abstinence class. Any pattern of Alcoholics Anonymous attendance, even if it declines or is never high for a particular 12-month period, is better than little or no attendance in terms of abstinence. Greater initial attendance carries added value. There is a benefit for maintaining a sponsor over time above that found for attendance. © 2012 The Authors, Addiction © 2012 Society for the Study of Addiction.

  14. A position paper of the EFLM Committee on Education and Training and Working Group on Distance Education Programmes/E-Learning: developing an e-learning platform for the education of stakeholders in laboratory medicine.

    Science.gov (United States)

    Gruson, Damien; Faure, Gilbert; Gouget, Bernard; Haliassos, Alexandre; Kisikuchin, Darya; Reguengo, Henrique; Topic, Elizabeta; Blaton, Victor

    2013-04-01

    The progress of information and communication technologies has strongly influenced changes in healthcare and laboratory medicine. E-learning, the learning or teaching through electronic means, contributes to the effective knowledge translation in medicine and healthcare, which is an essential element of a modern healthcare system and for the improvement of patient care. E-learning also represents a great vector for the transfer knowledge into laboratory practice, stimulate multidisciplinary interactions, enhance continuing professional development and promote laboratory medicine. The European Federation of Laboratory Medicine (EFLM) has initiated a distance learning program and the development of a collaborative network for e-learning. The EFLM dedicated working group encourages the organization of distance education programs and e-learning courses as well as critically evaluate information from courses, lectures and documents including electronic learning tools. The objectives of the present paper are to provide some specifications for distance learning and be compatible with laboratory medicine practices.

  15. Anonymity versus privacy in the dictator game: revealing donor decisions to recipients does not substantially impact donor behavior.

    Directory of Open Access Journals (Sweden)

    Jeffrey Winking

    Full Text Available Anonymity is often offered in economic experiments in order to eliminate observer effects and induce behavior that would be exhibited under private circumstances. However, anonymity differs from privacy in that interactants are only unaware of each others' identities, while having full knowledge of each others' actions. Such situations are rare outside the laboratory and anonymity might not meet the requirements of some participants to psychologically engage as if their actions were private. In order to explore the impact of a lack of privacy on prosocial behaviors, I expand on a study reported in Dana et al. (2006 in which recipients were left unaware of the Dictator Game and given donations as "bonuses" to their show-up fees for other tasks. In the current study, I explore whether differences between a private Dictator Game (sensu Dana et al. (2006 and a standard anonymous one are due to a desire by dictators to avoid shame or to pursue prestige. Participants of a Dictator Game were randomly assigned to one of four categories-one in which the recipient knew of (1 any donation by an anonymous donor (including zero donations, (2 nothing at all, (3 only zero donations, and (4 and only non-zero donations. The results suggest that a lack of privacy increases the shame that selfish-acting participants experience, but that removing such a cost has only minimal effects on actual behavior.

  16. Do women differ from men on Alcoholics Anonymous participation and abstinence? A multi-wave analysis of treatment seekers.

    Science.gov (United States)

    Witbrodt, Jane; Delucchi, Kevin

    2011-12-01

    Given the widespread use of Alcoholics Anonymous (AA) and other similar groups in the United States and the increasing membership of women, this study compares women with men on their meeting attendance and AA-prescribed behaviors, factors associated with that AA participation, and tests how these relate to women's and men's abstinence across time. All consecutive new admissions (age ≥ 18) from county-wide public and private treatment programs representing the larger population of treatment seekers were approached to be in the study at treatment entry. Those consenting at baseline (n = 926) were sought for follow-up interviews 1, 3, 5, and 7 years later. Generalized linear models were used to test whether various help-seeking factors were associated with AA participation differentially by gender and, controlling for AA and other confounders, whether women differ from men on abstinence. At each follow-up interview, women and men attended AA at similar rates and similarly practiced specific AA behaviors, and they were alike on most factors associated with AA participation and abstention across time including abstinence goal, drink volume, negative consequences, prior treatment, and encouragement to reduce drinking. Relative to men, women with higher drug severity were less likely to participate in AA. Although higher AA participation was a predictor of abstinence for both genders, men were less likely to be abstinent across time. Men were also more likely to reduce their AA participation across time. These findings add to an emerging literature on how women compare with men on factors related to AA participation and subsequent drinking outcomes across time. Findings have clinical implications for service providers referring clients to such groups. Copyright © 2011 by the Research Society on Alcoholism.

  17. Group morphology

    NARCIS (Netherlands)

    Roerdink, Jos B.T.M.

    2000-01-01

    In its original form, mathematical morphology is a theory of binary image transformations which are invariant under the group of Euclidean translations. This paper surveys and extends constructions of morphological operators which are invariant under a more general group TT, such as the motion group

  18. Anonymous HIV workplace surveys as an advocacy tool for affordable private health insurance in Namibia

    Directory of Open Access Journals (Sweden)

    de Beer Ingrid

    2009-11-01

    Full Text Available Abstract Background With an estimated adult HIV prevalence of 15%, Namibia is in need of innovative health financing strategies that can alleviate the burden on the public sector. Affordable and private health insurances were recently developed in Namibia, and they include coverage for HIV/AIDS. This article reports on the efficacy of HIV workplace surveys as a tool to increase uptake of these insurances by employees in the Namibian formal business sector. In addition, the burden of HIV among this population was examined by sector. Methods Cross-sectional anonymous HIV prevalence surveys were conducted in 24 private companies in Namibia between November 2006 and December 2007. Non-invasive oral fluid-based HIV antibody rapid tests were used. Anonymous test results were provided to the companies in a confidential report and through presentations to their management, during which the advantages of affordable private health insurance and the available insurance products were discussed. Impact assessment was conducted in October 2008, when new health insurance uptake by these companies was evaluated. Results Of 8500 targeted employees, 6521 were screened for HIV; mean participation rate was 78.6%. Overall 15.0% (95% CI 14.2-15.9% of employees tested HIV positive (range 3.0-23.9% across companies. The mining sector had the highest percentage of HIV-positive employees (21.0%; the information technology (IT sector had the lowest percentage (4.0%. Out of 6205 previously uninsured employees, 61% had enrolled in private health insurance by October 2008. The majority of these new insurances (78% covered HIV/AIDS only. Conclusion The proportion of HIV-positive formal sector employees in Namibia is in line with national prevalence estimates and varies widely by employment sector. Following the surveys, there was a considerable increase in private health insurance uptake. This suggests that anonymous HIV workplace surveys can serve as a tool to motivate

  19. Suicide prevention by online support groups: an action theory-based model of emotional first aid.

    Science.gov (United States)

    Gilat, Itzhak; Shahar, Golan

    2009-01-01

    In the last two decades, online support groups have become a valuable source of help for individuals in suicidal crisis. Their attractiveness is attributed to features that enhance help-seeking and self-disclosure such as availability, anonymity, and use of written communication. However, online support groups also suffer from limitations and potential risks as agents of suicide prevention. The Israeli Association for Emotional First Aid (ERAN) has developed a practical model that seeks to maximize the benefits and minimize the risks of online suicide prevention. The model applies the Action Theory concepts whereby individuals shape their own environment. The present paper presents the model, which is based on an online support group combined with personal chat and a telephonic help line. The online support group is moderated by paraprofessionals who function as both process regulators and support providers. The principles and practice of the model are described, the theoretical rationale is presented, and directions for future research are suggested.

  20. A Comparison of the Effects of K-Anonymity on Machine Learning Algorithms

    Directory of Open Access Journals (Sweden)

    Hayden Wimmer

    2014-11-01

    Full Text Available While research has been conducted in machine learning algorithms and in privacy preserving in data mining (PPDM, a gap in the literature exists which combines the aforementioned areas to determine how PPDM affects common machine learning algorithms. The aim of this research is to narrow this literature gap by investigating how a common PPDM algorithm, K-Anonymity, affects common machine learning and data mining algorithms, namely neural networks, logistic regression, decision trees, and Bayesian classifiers. This applied research reveals practical implications for applying PPDM to data mining and machine learning and serves as a critical first step learning how to apply PPDM to machine learning algorithms and the effects of PPDM on machine learning. Results indicate that certain machine learning algorithms are more suited for use with PPDM techniques.